Global Information Grid
Encyclopedia
The Global Information Grid (GIG) is an all-encompassing communications project of the United States Department of Defense
.
It is defined as a "globally interconnected, end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel."
The GIG includes owned and leased communications and computing systems and services, software (including applications), data, security services, other associated services, and National Security Systems
. Non-GIG IT includes stand-alone, self contained, or embedded IT that is not, and will not be, connected to the enterprise network.
This new definition removes references to the National Security Systems as defined in section 5142 of the Clinger-Cohen Act of 1996. Further, this new definition removes the references to the GIG providing capabilities from all operating locations (bases, posts, camps, stations, facilities, mobile platforms, and deployed sites). And lastly, this definition removes the part of the definition that discusses the interfaces to coalition, allied, and non-Department of Defense users and systems.
The DoD's use of the term "GIG" is undergoing changes as the Department deals with new concepts such as Cyberspace Operations, GIG 2.0 (A Joint Staff J6 Initiative), and the Department of Defense Information Enterprise (DIE).
The GIG is managed by a construct known as NetOps
. NetOps is defined as the operational framework consisting of three essential tasks, Situational Awareness (SA)
, and Command & Control (C2) that the Commander (CDR) of US Strategic Command (USSTRATCOM), in coordination with DoD and Global NetOps Community, employs to operate and defend the GIG to ensure information superiority.
It includes: (a) the information itself and the Department’s management over the information life cycle; (b) the processes, including risk management, associated with managing information to accomplish the DoD mission and functions; (c) activities related to designing, building, populating, acquiring, managing, operating, protecting, and defending the information enterprise; and (d) related information resources such as personnel, funds, equipment, and IT, including national security systems.
doctrine represents a fundamental shift in military culture, away from powerful compartmentalized war machines and toward interconnected units operating cohesively. The tenets of Network Centric Warfare are:
At the enterprise level, forging new paths with whom components of the military communicate will ease logistics
burdens, improve communication and combat effectiveness of the war fighter, decrease instances of confusion-related fratricide
, accelerate the trend in minimizing collateral damage, and hasten the flow of business. For the warfighter, situational awareness would be improved tremendously by linking what he sees with what an overhead satellite sees.
The fog of war
would be lifted by seamless communication between unit members, off site detection devices, and commanders operating behind the line. Improved coordination may also assist in delivering appropriate firepower or other tangible assets to first responders during domestic attacks and natural disasters worldwide.
United States Department of Defense
The United States Department of Defense is the U.S...
.
It is defined as a "globally interconnected, end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel."
The GIG includes owned and leased communications and computing systems and services, software (including applications), data, security services, other associated services, and National Security Systems
Committee on National Security Systems
The Committee on National Security Systems is a United States intergovernmental organization that sets policy for the security of the US security systems.-Charter, mission, and leadership:...
. Non-GIG IT includes stand-alone, self contained, or embedded IT that is not, and will not be, connected to the enterprise network.
This new definition removes references to the National Security Systems as defined in section 5142 of the Clinger-Cohen Act of 1996. Further, this new definition removes the references to the GIG providing capabilities from all operating locations (bases, posts, camps, stations, facilities, mobile platforms, and deployed sites). And lastly, this definition removes the part of the definition that discusses the interfaces to coalition, allied, and non-Department of Defense users and systems.
The DoD's use of the term "GIG" is undergoing changes as the Department deals with new concepts such as Cyberspace Operations, GIG 2.0 (A Joint Staff J6 Initiative), and the Department of Defense Information Enterprise (DIE).
The GIG is managed by a construct known as NetOps
Netops
NetOps is defined as the operational framework consisting of three essential tasks, Situational Awareness , and Command & Control that the Commander of US Strategic Command , in coordination with DoD and Global NetOps Community, employs to operate, manage and defend the Global Information Grid ...
. NetOps is defined as the operational framework consisting of three essential tasks, Situational Awareness (SA)
Situation awareness
Situation awareness, situational awareness, or SA, is the perception of environmental elements with respect to time and/or space, the comprehension of their meaning, and the projection of their status after some variable has changed, such as time...
, and Command & Control (C2) that the Commander (CDR) of US Strategic Command (USSTRATCOM), in coordination with DoD and Global NetOps Community, employs to operate and defend the GIG to ensure information superiority.
Defense Information Enterprise
The Department of Defense Information Enterprise is defined as the DoD information resources, assets, and processes required to achieve an information advantage and share information across the Department of Defense and with mission partners.It includes: (a) the information itself and the Department’s management over the information life cycle; (b) the processes, including risk management, associated with managing information to accomplish the DoD mission and functions; (c) activities related to designing, building, populating, acquiring, managing, operating, protecting, and defending the information enterprise; and (d) related information resources such as personnel, funds, equipment, and IT, including national security systems.
Vision
The Network-Centric Warfare (NCW)Network-centric warfare
Network-centric warfare, also called network-centric operations, is a military doctrine or theory of war pioneered by the United States Department of Defense in the 1990's....
doctrine represents a fundamental shift in military culture, away from powerful compartmentalized war machines and toward interconnected units operating cohesively. The tenets of Network Centric Warfare are:
- A robustly networked force improves information sharing;
- Information sharing enhances the quality of information and shared situational awareness;
- Shared situational awareness enables collaboration and self-synchronization and enhances sustainability and speed of command;
- Speed of command, in turn, dramatically increases mission effectiveness.
At the enterprise level, forging new paths with whom components of the military communicate will ease logistics
Logistics
Logistics is the management of the flow of goods between the point of origin and the point of destination in order to meet the requirements of customers or corporations. Logistics involves the integration of information, transportation, inventory, warehousing, material handling, and packaging, and...
burdens, improve communication and combat effectiveness of the war fighter, decrease instances of confusion-related fratricide
Fratricide
Fratricide is the act of a person killing his or her brother....
, accelerate the trend in minimizing collateral damage, and hasten the flow of business. For the warfighter, situational awareness would be improved tremendously by linking what he sees with what an overhead satellite sees.
The fog of war
Fog of war
The fog of war is a term used to describe the uncertainty in situation awareness experienced by participants in military operations. The term seeks to capture the uncertainty regarding own capability, adversary capability, and adversary intent during an engagement, operation, or campaign...
would be lifted by seamless communication between unit members, off site detection devices, and commanders operating behind the line. Improved coordination may also assist in delivering appropriate firepower or other tangible assets to first responders during domestic attacks and natural disasters worldwide.
See also
- JTF-GNOJoint Task Force-Global Network OperationsJoint Task Force-Global Network Operations was a subordinate command of United States Strategic Command whose mission is to: direct the operation and defense of the Global Information Grid across strategic, operational, and tactical boundaries in support of the US Department of Defense's full...
- United States Strategic Command
- Defense Information Systems AgencyDefense Information Systems AgencyThe Defense Information Systems Agency is a United States Department of Defense agency that provides information technology and communications support to the President, Vice President, Secretary of Defense, the military Services, and the Combatant Commands.As part of the Base Realignment and...
- GINA : Global Information Network ArchitectureGINA : Global Information Network ArchitectureThe concept for the Global Information Network Architecture evolved from a realization that the current technologies provided an unprecedented opportunity to create a useful Global Information Grid that could transform the possibilities for Net-Centric Operations.The Global Information Network...
- Joint Battlespace InfosphereJoint Battlespace InfosphereThe Joint Battlespace Infosphere is a project funded by the AFRL intended to provide management for network-centric systems that utilize the GIG .- External links :*...
- Information Assurance Vulnerability AlertInformation Assurance Vulnerability AlertAn information assurance vulnerability alert is an announcement of a computer application software or operating system vulnerability notification in the form of alerts, bulletins, and technical advisories identified by DoD-CERT, a division of the United States Cyber Command...
External links
- United States Strategic Command Official Website
- Joint Task Force Global Network Operations (JTF GNO) - Requires PKI/CAC
- Defense Information Systems Agency (DISA) Official Website
- National Security Agency (NSA) on GIG Information Assurance
- GIG Bandwidth Expansion
- DoD IA Policy Chart - Build and Operate a Trusted GIG