The Global Information Grid (GIG), now referred to as the Department of Defense Information Network (DODIN),
[ refers to the entire network of information transmission and processing capabilities maintained by the ]United States Department of Defense
The United States Department of Defense (DoD, USDOD, or DOD) is an United States federal executive departments, executive department of the federal government of the United States, U.S. federal government charged with coordinating and superv ...
. It is a worldwide network of information transmission, of associated processes, and of personnel serving to collect, process, safeguard, transmit, and manage this information. It is an all-encompassing communications project of the United States Department of Defense
The United States Department of Defense (DoD, USDOD, or DOD) is an United States federal executive departments, executive department of the federal government of the United States, U.S. federal government charged with coordinating and superv ...
. The GIG makes this immediately available to military personnel, to those responsible for military politics, and for support personnel. It includes all infrastructure, bought or loaned, of communications, electronics, informatics (including software and databases), and security. It is the most visible manifestation of network-centric warfare
Network-centric warfare, also called network-centric operations or net-centric warfare, is a military doctrine or theory of war that aims to translate an information advantage, enabled partly by information technology, into a competitive advantag ...
. It is the combination of technology and human activity that enables warfighters to access information on demand.
It is defined as a "globally interconnected, end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel".
The GIG includes owned and leased communications and computing systems and services, software (including applications), data, security services, other associated services, and National Security Systems. Non-GIG Information Technology (IT) includes stand-alone, self-contained, or embedded IT that is not, and will not be, connected to the enterprise network.
This new definition removes references to the National Security Systems as defined in section 5142 of the Clinger-Cohen Act of 1996. Further, this new definition removes the references to the GIG providing capabilities from all operating locations (bases, posts, camps, stations, facilities, mobile platforms, and deployed sites). And lastly, this definition removes the part of the definition that discusses the interfaces to coalition, allied, and non-Department of Defense users and systems.[Global Information Grid (GIG) Overarching Policy, dated September 19, 2002]
The DoD's use of the term "GIG" is undergoing changes as the Department deals with new concepts such as Cyberspace Operations, GIG 2.0 (A Joint Staff J6 Initiative), and the Department of Defense Information Enterprise (DIE).
The GIG is managed by a construct known as NetOps. NetOps is defined as the operational framework consisting of three essential tasks, Situational Awareness (SA), and Command & Control (C2) that the Commander (CDR) of United States Strategic Command
The United States Strategic Command (USSTRATCOM) is one of the eleven unified combatant commands in the United States Department of Defense. Headquartered at Offutt Air Force Base, Nebraska, USSTRATCOM is responsible for Strategic_nuclear_weap ...
(USSTRATCOM), in coordination with DoD and Global NetOps Community, employs to operate and defend the GIG to ensure information superiority.[Joint Concept of Operations (CONOPS) for Global Information Grid (GIG) NetOps Version 3, dated August 4, 2006]
In the past
The specifications for the GIG were published by the DoD on 22 September 1999, and the assistant secretary of defense officially mandated it on 19 September 2002 to carry out the project. Although in 2008, the ambitious objectives of the program had not been realized, informatic communications between soldiers and commanders on the battlefield had been successfully realized, the most well-known examples having occurred during the 2003 invasion of Iraq.
The GIG underwent a severe cyberattack
A cyberattack (or cyber attack) occurs when there is an unauthorized action against computer infrastructure that compromises the confidentiality, integrity, or availability of its content.
The rising dependence on increasingly complex and inte ...
in 2008, in the form of a computer virus
A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and Code injection, inserting its own Computer language, code into those programs. If this replication succeeds, the affected areas ...
which spread through military computer networks. As a result, the US Strategic Command banned all forms of removable media
In computing, a removable media is a data storage media that is designed to be readily inserted and removed from a system. Most early removable media, such as floppy disks and optical discs, require a dedicated read/write device (i.e. a drive) ...
, including thumb drives, DVDs
The DVD (common abbreviation for digital video disc or digital versatile disc) is a digital optical disc data storage format. It was invented and developed in 1995 and first released on November 1, 1996, in Japan. The medium can store any kin ...
, and floppy disks
A floppy disk or floppy diskette (casually referred to as a floppy, a diskette, or a disk) is a type of disk storage composed of a thin and flexible disk of a magnetic storage medium in a square or nearly square plastic enclosure lined with a ...
. At the time, the GIG contained about 17 million military computers, and it was scanned millions of times daily.
Defense Information Enterprise
The Department of Defense Information Enterprise is defined as the DoD information resources, assets, and processes required to achieve an information advantage and share information across the Department of Defense and with mission partners.
It includes:
*the information itself and the Department's management over the information life cycle
*the processes, including risk management, associated with managing information to accomplish the DoD mission and functions
*activities related to designing, building, populating, acquiring, managing, operating, protecting, and defending the information enterprise
*related information resources such as personnel, funds, equipment, and IT, including national security systems
Vision
The Network-Centric Warfare (NCW) doctrine represents a fundamental shift in military culture, away from compartmentalized war machines and toward interconnected units operating cohesively. The tenets of Network Centric Warfare are:
* A robustly networked force improves information sharing;
* Information sharing enhances the quality of information and shared situational awareness;
* Shared situational awareness
Situational awareness or situation awareness, often abbreviated as SA is the understanding of an environment, its elements, and how it changes with respect to time or other factors. It is also defined as the perception of the elements in the envi ...
enables collaboration and self-synchronization and enhances sustainability and speed of command;
* Speed of command, in turn, dramatically increases mission effectiveness.
At the enterprise level, forging new paths with whom components of the military communicate will ease logistics
Logistics is the part of supply chain management that deals with the efficient forward and reverse flow of goods, services, and related information from the point of origin to the Consumption (economics), point of consumption according to the ...
burdens, improve communication and combat effectiveness of the war fighter, decrease instances of confusion-related fratricide
Fratricide (; – the assimilated root of 'to kill, cut down') is the act of killing one's own brother.
It can either be done directly or via the use of either a hired or an indoctrinated intermediary (an assassin). The victim need not be ...
, accelerate the trend in minimizing collateral damage, and hasten the flow of business. For the warfighter
A soldier is a person who is a member of an army. A soldier can be a Conscription, conscripted or volunteer Enlisted rank, enlisted person, a non-commissioned officer, a warrant officer, or an Officer (armed forces), officer.
Etymology
The wo ...
, situational awareness
Situational awareness or situation awareness, often abbreviated as SA is the understanding of an environment, its elements, and how it changes with respect to time or other factors. It is also defined as the perception of the elements in the envi ...
would be improved tremendously by linking what he sees with what an overhead satellite sees.
The fog of war
The fog of war is the uncertainty in situational awareness experienced by participants in military operations. The term seeks to capture the uncertainty regarding one's own capability, adversary capability, and adversary Intent (Military), inten ...
would be lifted by seamless communication between unit members, off site detection devices, and commanders operating behind the line. Improved coordination may also assist in delivering appropriate firepower or other tangible assets to first responders during domestic attacks and natural disasters worldwide.
See also
* Defense Information Systems Agency
The Defense Information Systems Agency (DISA), known as the Defense Communications Agency (DCA) until 1991, is a United States Department of Defense (DoD) combat support agency. It is composed of military, federal civilians, and contractors. D ...
* Global Information Network Architecture
Global Information Network Architecture (GINA) is a software framework that bridges the symbolic and the connectionist representations of the world through executable conceptual models. Declarative contextual, causal, behavioral, and adaptive model ...
* Information Assurance Vulnerability Alert
* Joint Battlespace Infosphere
* JTF-GNO
* Software Defined Perimeter
* Skynet (Terminator)
Skynet is a fictional artificial neural network-based conscious group mind and artificial general superintelligence system that serves as the main antagonist of the ''Terminator'' franchise. Skynet is an AGI, an ASI and a Singularity.
In ...
References
External links
National Security Agency (NSA) on GIG Information Assurance
{{Webarchive, url=https://web.archive.org/web/20110906012808/http://iac.dtic.mil/iatac/ia_policychart.html , date=2011-09-06
Grid computing
Military communications
United States Strategic Command
21st-century conflicts