Global Information Grid
   HOME

TheInfoList



OR:

The Global Information Grid (GIG) is a network of information transmission and processing maintained by the
United States Department of Defense The United States Department of Defense (DoD, USDOD or DOD) is an executive branch department of the federal government charged with coordinating and supervising all agencies and functions of the government directly related to national sec ...
. More descriptively, it is a worldwide network of information transmission, of associated processes, and of personnel serving to collect, process, safeguard, transmit, and manage this information. It is an all-encompassing communications project of the
United States Department of Defense The United States Department of Defense (DoD, USDOD or DOD) is an executive branch department of the federal government charged with coordinating and supervising all agencies and functions of the government directly related to national sec ...
. The GIG makes this immediately available to military personnel, to those responsible for military politics, and for support personnel. It includes all infrastructure, bought or loaned, of communications, electronics, informatics (including software and databases), and security. It is the most visible manifestation of network-centric warfare. It is the combination of technology and human activity that enables warfighters to access information on demand. It is defined as a "globally interconnected, end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel". The GIG includes owned and leased communications and computing systems and services, software (including applications), data, security services, other associated services, and National Security Systems. Non-GIG Information Technology (IT) includes stand-alone, self-contained, or embedded IT that is not, and will not be, connected to the enterprise network. This new definition removes references to the National Security Systems as defined in section 5142 of the Clinger-Cohen Act of 1996. Further, this new definition removes the references to the GIG providing capabilities from all operating locations (bases, posts, camps, stations, facilities, mobile platforms, and deployed sites). And lastly, this definition removes the part of the definition that discusses the interfaces to coalition, allied, and non-Department of Defense users and systems.Global Information Grid (GIG) Overarching Policy, dated September 19, 2002
The DoD's use of the term "GIG" is undergoing changes as the Department deals with new concepts such as Cyberspace Operations, GIG 2.0 (A Joint Staff J6 Initiative), and the Department of Defense Information Enterprise (DIE). The GIG is managed by a construct known as NetOps. NetOps is defined as the operational framework consisting of three essential tasks, Situational Awareness (SA), and Command & Control (C2) that the Commander (CDR) of
United States Strategic Command United States Strategic Command (USSTRATCOM) is one of the eleven unified combatant commands in the United States Department of Defense. Headquartered at Offutt Air Force Base, Nebraska, USSTRATCOM is responsible for strategic nuclear deter ...
(USSTRATCOM), in coordination with DoD and Global NetOps Community, employs to operate and defend the GIG to ensure information superiority.Joint Concept of Operations (CONOPS) for Global Information Grid (GIG) NetOps Version 3, dated August 4, 2006


In the past

The specifications for the GIG were published by the DoD on 22 September 1999, and the
assistant secretary of defense Assistant Secretary of Defense is a title used for many high-level executive positions in the Office of the Secretary of Defense within the U.S. Department of Defense. The Assistant Secretary of Defense title is junior to Under Secretary of Defe ...
officially mandated it on 19 September 2002 to carry out the project. Although in 2008, the ambitious objectives of the program had not been realized, informatic communications between soldiers and commanders on the battlefield had been successfully realized, the most well-known examples having occurred during the
2003 invasion of Iraq The 2003 invasion of Iraq was a United States-led invasion of the Republic of Iraq and the first stage of the Iraq War. The invasion phase began on 19 March 2003 (air) and 20 March 2003 (ground) and lasted just over one month, including ...
. The GIG underwent a severe
cyberattack A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricte ...
in 2008, in the form of a
computer virus A computer virus is a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code. If this replication succeeds, the affected areas are then said to be "infected" with a comput ...
which spread through military computer networks. As a result, the US Strategic Command banned all forms of
removable media Expandable storage is a form of computer storage that is designed to be inserted and removed from a system. Some forms of removable media, such as optical discs, require a reader to be installed in the computer, while others, such as USB flash dr ...
, including thumb drives,
DVDs The DVD (common abbreviation for Digital Video Disc or Digital Versatile Disc) is a digital optical disc data storage format. It was invented and developed in 1995 and first released on November 1, 1996, in Japan. The medium can store any kind ...
, and floppy disks. At the time, the GIG contained about 17 million military computers, and it was scanned millions of times daily.


Defense Information Enterprise

The Department of Defense Information Enterprise is defined as the DoD information resources, assets, and processes required to achieve an information advantage and share information across the Department of Defense and with mission partners. It includes: *the information itself and the Department's management over the information life cycle *the processes, including risk management, associated with managing information to accomplish the DoD mission and functions *activities related to designing, building, populating, acquiring, managing, operating, protecting, and defending the information enterprise *related information resources such as personnel, funds, equipment, and IT, including national security systems


Vision

The Network-Centric Warfare (NCW) doctrine represents a fundamental shift in military culture, away from compartmentalized war machines and toward interconnected units operating cohesively. The tenets of Network Centric Warfare are: * A robustly networked force improves information sharing; * Information sharing enhances the quality of information and shared situational awareness; * Shared
situational awareness Situational awareness or situation awareness (SA) is the perception of environmental elements and events with respect to time or space, the comprehension of their meaning, and the projection of their future status. An alternative definition is tha ...
enables collaboration and self-synchronization and enhances sustainability and speed of command; * Speed of command, in turn, dramatically increases mission effectiveness. At the enterprise level, forging new paths with whom components of the military communicate will ease
logistics Logistics is generally the detailed organization and implementation of a complex operation. In a general business sense, logistics manages the flow of goods between the point of origin and the point of consumption to meet the requirements of ...
burdens, improve communication and combat effectiveness of the war fighter, decrease instances of confusion-related
fratricide Fratricide (, from the Latin words ' "brother" and the assimilated root of ' "to kill, to cut down") is the act of killing one's own brother. It can either be done directly or via the use of either a hired or an indoctrinated intermediary (a ...
, accelerate the trend in minimizing collateral damage, and hasten the flow of business. For the
warfighter A soldier is a person who is a member of an army. A soldier can be a conscripted or volunteer enlisted person, a non-commissioned officer, or an officer. Etymology The word ''soldier'' derives from the Middle English word , from Old French ...
,
situational awareness Situational awareness or situation awareness (SA) is the perception of environmental elements and events with respect to time or space, the comprehension of their meaning, and the projection of their future status. An alternative definition is tha ...
would be improved tremendously by linking what he sees with what an overhead satellite sees. The
fog of war The fog of war (german: links=no, Nebel des Krieges) is the uncertainty in situational awareness experienced by participants in military operations. The term seeks to capture the uncertainty regarding one's own capability, adversary capability, ...
would be lifted by seamless communication between unit members, off site detection devices, and commanders operating behind the line. Improved coordination may also assist in delivering appropriate firepower or other tangible assets to first responders during domestic attacks and natural disasters worldwide.


See also

*
Defense Information Systems Agency The Defense Information Systems Agency (DISA), known as the Defense Communications Agency (DCA) until 1991, is a United States Department of Defense (DoD) combat support agency composed of military, federal civilians, and contractors. DISA pro ...
*
Global Information Network Architecture Global Information Network Architecture (GINA) is a software framework that bridges the symbolic and the connectionist representations of the world through executable conceptual models. Declarative contextual, causal, behavioral, and adaptive model ...
*
Information Assurance Vulnerability Alert {{Unreferenced, date=August 2010 An information assurance vulnerability alert (IAVA) is an announcement of a computer application software or operating system vulnerability notification in the form of alerts, bulletins, and technical advisories iden ...
* Joint Battlespace Infosphere * JTF-GNO *
Software Defined Perimeter A software-defined perimeter (SDP), also called a "black cloud", is an approach to computer security which evolved from the work done at the Defense Information Systems Agency (DISA) under the Global Information Grid (GIG) Black Core Network init ...
* Skynet (Terminator)


References


External links


National Security Agency (NSA) on GIG Information Assurance




{{Webarchive, url=https://web.archive.org/web/20110906012808/http://iac.dtic.mil/iatac/ia_policychart.html , date=2011-09-06 Grid computing Military communications Warfare post-1945