Joint Concept of Operations for Global Information Grid NetOps

Transcription

Joint Concept of Operations for Global Information Grid NetOps
10 August 2005
Joint Concept of Operations for
Global Information Grid NetOps
i
UNCLASSIFIED
ii
UNCLASSIFIED
Executive Summary
Introduction
The Unified Command Plan (UCP) assigns the missions of Information Operations (IO) and
Global Command, Control, Communications, Computers, Intelligence, Surveillance, and
Reconnaissance (C4ISR) to Commander, US Strategic Command (CDRUSSTRATCOM).
Included in these missions is the responsibility to operate and defend the Global Information
Grid (GIG). NetOps is the operational construct that the CDRUSSTRATCOM will use to operate
and defend the GIG. The goal of NetOps is to provide assured and timely net-centric services
across strategic, operational and tactical boundaries in support of DOD’s full spectrum of war
fighting, intelligence and business missions. The desired effects of NetOps are: assured system
and network availability, assured information protection and assured information delivery. This
Concept of Operations (CONOPS) provides a high level description of the key attributes of
NetOps: Essential Tasks, Command and Control Operating Principles, Command and Control
Structure and Relationships, and the Collaborative Command and Control Process.
NetOps Essential Tasks – NetOps is an integrated approach to accomplishing the three
interdependent tasks necessary to operate the GIG — GIG Enterprise Management (GEM), GIG
Network Defense (GND) and Information Dissemination Management / Content Staging
(IDM/CS). NetOps is not simply GEM and GND and IDM/CS tacked together. Rather, it is the
methodical integration of individual capabilities and the resultant synergy.
NetOps Command and Control Operating Principles – Starting in the late 1990’s, the DoD
began evaluating the benefits that Information Age technology can bring to military operations.
The vast improvements in information sharing realized by applying Information Age technology
to military Command and Control (C2) significantly improve our agility and speed of command.
These ideas evolved into the concept of Net-Centric Operations and Warfare (NCOW). NetOps
is a net-centric operation, and faces the same set of C2 challenges as any other Joint Force
Operation. As a critical enabling capability to achieving net-centricity, NetOps must adopt
Information Age C2 structures and processes. For DoD to achieve net-centricity, the GIG must
be operated net-centrically. The NetOps Community of Interest (COI) must lead the way in
adopting collaborative C2. The NetOps COI must be able to operate and defend the GIG in a
net-centric manner, in order for the DoD to realize the benefits of NCOW.
NetOps Command and Control Structure and Relationships – The NetOps COI is the term
used to describe the collaborative group of organizations responsible for operating and defending
the GIG. The NetOps COI must exchange relevant information in pursuit of their shared
objective and mission to operate and defend the GIG. Under the authority vested in the
Commander, USSTRATCOM, the NetOps COI consists of organizations from the Office of the
Secretary of Defense, Joint Chiefs of Staff, Combatant Commands, Military Services, Defense
Agencies, Other US Government Agencies, Intelligence Community, coalition partners and NonGovernment Organizations (NGO) that must interact to accomplish NetOps in support of the
DoD mission. This CONOPS applies to the entire NetOps COI and will govern their operational
iii
UNCLASSIFIED
conduct. It will be used to develop deliberate plans, support crisis action planning, and orders
production. Non-DoD organizations connecting to the GIG will comply with this CONOPS.
Collaborative NetOps Command and Control Process – C2 is the ability to recognize what
needs to be done in a situation and to ensure that effective actions are taken to achieve the
desired effect with minimum adverse impact. At its core, C2 is about decision-making and the
individuals who make decisions. NetOps C2 must be a joint decision-making process that is
dynamic, decentralized, distributed, and highly adaptive. Enabled by a robust, secure, integrated
network, and through the employment of Collaborative Information Environments (CIEs), the
NetOps COI will possess a seamless C2 capability. Supported by skilled personnel trained in
joint NetOps and standardized NetOps Tactics, Techniques, and Procedures (TTPs), the NetOps
COI will be able to create desired GIG effects at the right time and place to accomplish the
mission.
iv
UNCLASSIFIED
Table of Contents
Executive Summary ..................................................................................................................... iii
Table of Contents .......................................................................................................................... v
List of Figures............................................................................................................................. viii
1
2
NetOps.................................................................................................................................... 1
1.1
Overview......................................................................................................................... 1
1.2
Mission............................................................................................................................ 2
1.3
Effects ............................................................................................................................. 2
NetOps Essential Tasks ........................................................................................................ 5
2.1
Overview......................................................................................................................... 5
2.2
GIG Enterprise Management .......................................................................................... 5
2.2.1
Information Technology Services........................................................................... 5
2.2.2
Critical Capabilities ................................................................................................ 6
2.2.3
Effects Enablers ...................................................................................................... 6
2.3
GIG Network Defense .................................................................................................... 7
2.3.1
Fundamental Attributes........................................................................................... 7
2.3.2
Critical Capabilities ................................................................................................ 8
2.3.3
Effects Enablers ...................................................................................................... 8
2.4
Information Dissemination Management / Content Staging .......................................... 9
2.4.1
Core Services .......................................................................................................... 9
2.4.2
Critical Capabilities ................................................................................................ 9
2.4.3
Effects Enablers .................................................................................................... 10
3
NetOps Command and Control Operating Principles .................................................... 11
3.1
Overview....................................................................................................................... 11
3.2
Net-Centric Operation and Defense of the GIG ........................................................... 12
3.2.1
Self-Synchronization of NetOps ........................................................................... 12
3.3
C2 and NetOps Decision Making ................................................................................. 13
3.3.1
Theater & Global NetOps Events ......................................................................... 13
3.3.1.1 Theater NetOps Events ..................................................................................... 14
3.3.1.2
Global NetOps Events...................................................................................... 14
3.3.2
Principles of NetOps Command and Control ....................................................... 14
4
NetOps C2 Structure & Relationships.............................................................................. 16
v
UNCLASSIFIED
4.1
NetOps Community of Interest..................................................................................... 16
4.2
Organizational Roles and Capabilities.......................................................................... 16
4.2.1
Commander, US Strategic Command................................................................... 16
4.2.1.1 Commander, Joint Functional Component Command for Network Warfare... 17
4.2.1.2 Commander, Joint Task Force-Global Network Operations ............................ 18
4.2.1.2.1 Global NetOps Center ..................................................................................... 19
4.2.1.2.2 JTF-GNO Operational Forces and Service Components .................................... 21
4.2.1.2.2.1 Commander, Global NetOps Support Center ...................................... 21
4.2.1.2.2.2 Commander, Theater NetOps Center................................................... 22
4.2.1.2.2.3 Commander, GIG Infrastructure Services Management Center.......... 23
4.2.1.2.3 JTF-GNO Service Component Commands ....................................................... 25
4.2.1.2.3.1 Service Global Network Operations and Security Centers and
Computer Emergency / Incident Response Teams ................................................... 25
4.2.2
Combatant Commands.......................................................................................... 27
4.2.2.1 Geographic Combatant Commands .................................................................. 27
4.2.2.1.1 Theater NetOps Control Center........................................................................ 27
4.2.2.1.2 Service Theater Network Operations and Security Centers ................................ 28
4.2.2.1.2.1 United States Army.............................................................................. 30
4.2.2.1.2.2 United States Navy .............................................................................. 32
4.2.2.1.2.3 United Sates Marine Corps .................................................................. 33
4.2.2.1.2.4 United States Air Force........................................................................ 34
4.2.2.2 Functional Combatant Commands.................................................................... 35
4.2.2.2.1 Global NetOps Control Center ......................................................................... 35
4.2.2.3 Sub-Unified....................................................................................................... 35
4.2.2.3.1 Sub-Unified NetOps Control Center ................................................................. 35
4.2.2.4 Joint Task Force................................................................................................ 36
4.2.2.4.1 Joint NetOps Control Center ............................................................................ 36
4.2.3
Defense Agencies.................................................................................................. 36
4.2.3.1 DoD Agency Theater Network Operations and Security Centers .................... 36
4.2.3.2 DoD Agency Global Network Operations and Security Center ....................... 37
4.2.3.2.1 Defense Information Systems Agency .............................................................. 38
4.2.4
Interagency............................................................................................................ 38
4.2.4.1 Director of National Intelligence ...................................................................... 39
4.2.4.1.1 Intelligence Community Incident Response Center ........................................... 39
4.2.4.1.2 National Security Agency................................................................................ 39
4.2.4.1.3 The Defense Intelligence Agency..................................................................... 40
4.2.4.2 National Communications System.................................................................... 41
4.3
NetOps C2 Structure ..................................................................................................... 41
4.3.1
Global NetOps C2................................................................................................. 41
4.3.2
Theater NetOps C2 ............................................................................................... 43
5
Collaborative NetOps C2 Process...................................................................................... 44
5.1
Overview....................................................................................................................... 44
5.2
NetOps C2 Process ....................................................................................................... 45
5.2.1
The Basic NetOps C2 Process and Its Component Functions .............................. 45
vi
UNCLASSIFIED
5.2.1.1 Monitor and collect data on the situation.......................................................... 46
5.2.1.2 Develop an understanding of the situation........................................................ 46
5.2.1.3 Develop a course(s) of action and select one & Develop a plan to execute the
selected course of action ................................................................................................... 47
5.2.1.4 Execute the plan, to include providing direction and leadership to subordinates. 47
5.2.1.5 Monitor execution of the plan and adapt as necessary ..................................... 48
5.3
Collaboration................................................................................................................. 48
5.3.1
Collaborative C2 Functions .................................................................................. 48
5.4
Linking the Basic and Collaborative NetOps C2 Processes ......................................... 50
5.5
NetOps Shared Situational Awareness ......................................................................... 51
5.5.1
Overview............................................................................................................... 51
5.5.2
NetOps Situational Awareness Capability............................................................ 51
5.5.3
NetOps Situational Awareness Content................................................................ 53
5.5.4
NetOps Situational Awareness Responsibilities................................................... 53
5.5.4.1 Combatant Commander Responsibilities.......................................................... 54
5.5.4.2 Component, Service, Agency, Sub-Unified, and JTF Responsibilities ............ 54
Appendix A:
References........................................................................................................ 55
Appendix B:
Glossary ........................................................................................................... 58
Appendix C:
Acronyms ......................................................................................................... 63
vii
UNCLASSIFIED
List of Figures
Figure 1: NetOps Essential Tasks and Effects............................................................................... 3
Figure 2: USSTRATCOM Operational C2 Structure.................................................................. 17
Figure 3: JTF-GNO Staff Organization ....................................................................................... 19
Figure 4: JTF-GNO Operational Forces ...................................................................................... 21
Figure 5: JTF-GNO Service Components.................................................................................... 25
Figure 6: US Army NetOps Forces.............................................................................................. 31
Figure 7: US Navy NetOps Forces .............................................................................................. 32
Figure 8: US Marine Corps NetOps Forces................................................................................. 33
Figure 9: US Air Force NetOps Forces........................................................................................ 34
Figure 10: Global NetOps C2 ...................................................................................................... 42
Figure 11: Theater NetOps C2..................................................................................................... 43
Figure 12: The Basic C2 Functions and Process ......................................................................... 46
Figure 13: Collaborative C2 Process ........................................................................................... 50
Figure 14: Linking the Basic and Collaborative C2 Processes.................................................... 51
Figure 15: GIG SA Reporting Flow............................................................................................. 52
viii
UNCLASSIFIED
1
NetOps
“We must change the paradigm in which we talk and think about the network; we must ‘fight’
rather than ‘manage’ the network and operators must see themselves as engaged at all times,
ensuring the health and operation of this critical weapons system.”
~ Secretary of Defense Donald Rumsfeld
1.1
Overview
NetOps is defined as the operational construct consisting of the essential tasks, Situational
Awareness (SA), and C2 that CDRUSSTRATCOM will use to operate and defend the GIG.
This document explains how NetOps is essential for enabling net-centric operations. NetOps
operators are responsible for performing the functions to sustain the operational readiness of the
GIG. NetOps operators are defined as those people that are performing and managing NetOps
functions as discussed in this document. As a result of this CONOPS, these operators will be
better able to:
•
•
•
•
•
•
Monitor the performance and capabilities of the GIG.
Optimize the GIG.
Manage risk of service disruption.
Collaborate worldwide.
Defend the GIG.
Provide SA of the GIG.
The following terms are used throughout this CONOPS and require a universal understanding.
• Global Information Grid. The GIG and its assets are defined in Department of Defense
(DoD) Directive 8100.1, as follows:
Globally interconnected, end-to-end set of information capabilities, associated processes,
and personnel for collecting, processing, storing, disseminating, and managing
information on demand to warfighters, policy makers, and support personnel. The GIG
includes all owned and leased communications and computing systems and services,
software (including applications), data security services, and other associated services
necessary to achieve Information Superiority. It also includes National Security Systems
(NSS) as defined in section 5142 of the Clinger-Cohen Act of 1996. The GIG supports
all DoD, National Security, and related Intelligence Community (IC) missions and
functions (strategic, operational, tactical, and business) in war and in peace. The GIG
provides capabilities from all operating locations (bases, posts, camps, stations, facilities,
mobile platforms, and deployed sites). The GIG provides interfaces to coalition, allied,
and non-DoD users and systems.
The GIG includes any system, equipment, software, or service that meets one or more of
the following criteria:
♦ Transmits information to, receives information from, routes information among, or
interchanges information among other equipment, software, and services.
1
UNCLASSIFIED
♦
Provides retention, organization, visualization, information assurance, or disposition
of data, information, and/or knowledge received from or transmitted to other
equipment, software, and services.
♦ Processes data or information for use by other equipment, software, and services.
• Net-Centric Services. Net-centric services will provide DoD organizations access to
reliable, decision-quality information through net-based services infrastructure and
applications to bridge a real-time or near-real-time COI. The services will empower the edge
user to pull information from any available source, with minimal latency, to support the
mission. Its capabilities will allow GIG users to task, post, process, use, store, manage and
protect information resources on demand for warriors, policy makers and support personnel.
1.2
Mission
The NetOps mission is to operate and defend the GIG. Unlike many missions that are deemed
successful at a defined completion date, the NetOps mission is perpetual, requiring continual
support to be successful. NetOps will provide assured net-centric services in support of DoD’s
full spectrum of war fighting, intelligence, and business missions throughout the GIG,
seamlessly, end-to-end.
An objective of net-centric services is to quickly get information to decision-makers, with
adequate context, to make better decisions affecting the mission and to project their decisions
forward to their forces for action. If the decision maker is not getting the needed net-centric
services, the GIG NetOps community must collaboratively determine who must take action and
how information flow can be optimized. This requires NetOps personnel to have a shared SA as
well as the technologies, procedures, and collaborative organizational structures to rapidly assess
and respond to system and network degradations, outages, or changes in operational priorities.
All functions required to most effectively support GIG operations will be holistically managed.
The effectiveness of NetOps will be measured in terms of availability and reliability of netcentric services, across all domains, in adherence to agreed-upon service levels and policies. The
method for service assurance in a net-centric collaborative environment is to establish
operational thresholds, compliance monitoring, and a clear understanding of the capabilities
between enterprise service/resource providers and consumers through Service Level Agreements
(SLAs). Proper instrumentation of the GIG will enable monitoring of adherence to these SLAs,
as well as enable timely decision-making, service prioritization, resource allocation, root cause,
and mission impact assessment. Subsequent TTPs and SLAs will be formalized with appropriate
implementation policies to enforce compliance.
1.3
Effects
An effect is a result or impact created by the application of military or other power.1 The desired
effects of NetOps are Assured System and Network Availability, Assured Information
Protection, and Assured Information Delivery. These effects are all required to achieve and
sustain assurance of the NetOps mission. Adhering to the NetOps mission and performing the
1
Smith, Edward A. Effects Based Operations: Applying Network Centric Warfare in Peace, Crisis, and War.
Washington, DC; DoD Command and Control Research Program. P.111, 2003.
2
UNCLASSIFIED
three NetOps essential tasks (GEM2, GND3, and IDM/CS) in a standard discipline will provide
the war fighter with the desired NetOps effects. The three NetOps essential tasks are discussed
further in chapter two. Integration of the NetOps essential tasks must be performed at the
strategic, operational, and tactical levels and across all DoD war fighting, intelligence, and
business domains for the effects to be successful.
Figure 1: NetOps Essential Tasks and Effects
Figure 1, titled NetOps Essential Tasks and Effects, was developed to establish a common
understanding of the technical composition that must be considered to provide and sustain the
effects of NetOps. The center of the diagram illustrates the three NetOps essential tasks, their
relationships, and the desired effects once they are transformed into a tightly integrated NetOps
capability.
The three desired effects are further discussed below.
• Assured System and Network Availability. Provide visibility and control over the system
and network resources. Resources are effectively managed and problems are anticipated and
mitigated. Proactive actions are taken to ensure the uninterrupted availability and protection
of the system and network resources. This includes providing for graceful degradation, selfhealing, fail over, diversity, and elimination of critical failure points.
2
Note: The concept of GIG NetOps has evolved since its last iteration. The naming convention GIG Enterprise
Management (GEM) has replaced what was previously known as Enterprise Services Management/Network
Management (ESM/NM) in an effort to more clearly define the parts that make up this NetOps essential task
3
Note: For the purpose of this CONOPS and to convey the global dimension of STRATCOM’s mission to defend
the GIG, the term GIG Network Defense (GND) is used in this document to encompass Information Assurance (IA),
Computer Network Defense (CND), Critical Infrastructure Protection (CIP) and other GIG defense tasks in an effort
to more clearly define the scope of this NetOps essential task. This is not intended to replace the terms of IA and
CND.
3
UNCLASSIFIED
• Assured Information Protection. Provide protection for the information passing over
networks from the time it is stored and catalogued until it is distributed to the users, operators
and decision makers.
• Assured Information Delivery. Provide information to users, operators, and decision
makers in a timely manner. The networks are continuously monitored to ensure the
information is transferred with the correct response time, throughput, availability, and
performance that meet user needs.
4
UNCLASSIFIED
2
NetOps Essential Tasks
“All operations, while regional in execution, have global
consequence and therefore require a global perspective.”
~ Gen J.E. Cartwright, CDRUSSTRATCOM
2.1
Overview
NetOps integrates three interdependent tasks - GEM, GND, and IDM/CS. NetOps is not simply
GEM and GND and IDM/CS tacked together. Rather, it is the methodical integration of each
task’s individual capabilities and the resultant synergy. The three NetOps essential tasks are
discussed in the following sections.
2.2
GIG Enterprise Management
GEM is defined as the technology, processes, and policy necessary to effectively operate the
systems and networks that comprise the GIG. This essential task merges Information
Technology (IT) services with the NetOps critical capabilities.
2.2.1 Information Technology Services
There are five major IT services within GEM. They manage the GIG services and technologies
to ensure the effective and efficient operations, performance, availability, and security of GIG
information systems, elements of systems, and services. These services must be employed at the
strategic, operational, and tactical levels across all DoD warfighting, intelligence, and business
domains.
• Enterprise Services Management. Provides the services for end-user applications, webbased services, remote hosted applications, discovery, storage, operating systems and other
IT components of applications.
• Systems Management. Provides the day-to-day management of computer-based
information systems, elements of systems, and services to include software applications,
operating systems, databases, and hosts of the end-users. System management comprises all
the measures necessary to ensure the effective and efficient operations of GIG information
systems, elements of systems, and services.
• Network Management. Provides the services of a networked system with the desired level
of quality and guaranteed availability. Networks included within GEM are located on all
three means of communication (terrestrial, airborne, or Satellite Communications
(SATCOM)) and they include: switched networks, data networks, Video Teleconferencing
(VTC) networks, SATCOM networks, and wireless networks.
• Satellite Communications Management. SATCOM management is the day-to-day
operational management of all apportioned and non-apportioned SATCOM resources, to
include appropriate support when disruption of service occurs; provides global SATCOM
system status; maintaining global SA to include each Combatant Command’s (COCOM’s)
current and planned operations as well as Space, Control, and Terminal Segment asset and
operational configuration management; radio frequency interference resolution management;
satellite anomaly resolution and management; and SATCOM interference to the GIG.
5
• Electromagnetic Spectrum Management. Spectrum planning and management involves
the efficient employment of the electromagnetic spectrum including: international planning;
frequency allocation; coordination with civilian and other government departments, agencies,
military services and components, and allies; frequency assignment, allotment, and approval;
protection; frequency deconfliction; interference resolution; and coordination with electronic
warfare activities. Spectrum management ensures that the Combatant Commanders and
subordinate Commanders have cognizance of all spectrum management decisions that impact
accomplishment of their missions.
2.2.2 Critical Capabilities
GEM involves the following NetOps critical capabilities to support the IT services previously
discussed. These capabilities for GEM must be employed along with the IT services at the
strategic, operational, and tactical levels across all DoD war fighting, intelligence, and business
domains.
• FCAPS. Fault, Configuration, Accounting, Performance, and Security (FCAPS) are required
•
•
•
•
•
•
for computing hosts, software applications and connected transmission systems, both wired
and wireless, that carry voice, video, data, and imagery.
Visibility. Visibility involves knowing the status of the networks and systems that comprise
the GIG.
Monitoring and Analysis. Monitoring and analysis involves receiving and viewing relevant
fault and performance data to determine the impact on current operations and provide trend
analysis.
Planning. Planning occurs in establishing the computer and communications configurations
for an operation: allocating circuits, calculating loads, ensuring spectrum non-interference,
and establishing applications to be used in the operation. Contingency planning including
backup resources and restoration resources is a critical aspect of GEM planning.
Coordinating and Responding.
Receives, compiles, and disseminates fault and
performance data for systems and networks to create a common network picture and
coordinates response to major network outages that could have an operational impact.
Management and Administration. Management and administration includes establishing
restoration priorities for assigned systems and networks, and developing and overseeing
implementation of policies, procedures, and special instructions to subordinate network
control centers. It involves planning, coordinating, and approvals for frequency allotments
and assignments, SATCOM access, Request for Service (RFS) release, Telecommunication
Service Request (TSR), tactical Telecommunication Service Order (TSO) preparation and
release, and Communications System tasking.
Control. Control involves the ability to perform FCAPS management over all assigned
systems and networks.
2.2.3 Effects Enablers
This essential task enables Assured System and Network Availability and Assured Information
Delivery as indicated in Figure 1. The effects of this essential task are achieved by:
6
• Configuring and allocating GIG system and network resources.
• Ensuring effective, efficient and timely processing, connectivity, routing, and information
•
•
•
•
2.3
flow.
Accounting for resource usage.
Maintaining robust GIG capabilities in the face of component or system failure and/or attack.
Rapid, flexible deployment of networked resources.
Planning for increased network utilization.
GIG Network Defense
To convey the global dimension of STRATCOM’s mission to defend the GIG, the term GND is
used in this document to encompass USSTRATCOM’s operational responsibilities for
Information Assurance (IA), Computer Network Defense (CND), Critical Infrastructure
Protection (CIP) and other GIG defense tasks in an effort to more clearly define the scope of this
NetOps essential task. This is not intended to replace the terms of IA and CND. Additionally,
GIG constituent systems that meet the definition of a NSS must follow the appropriate IA
guidelines and policies for NSS. Other GIG systems not designated NSS must be provided
adequate IA so as not to jeopardize the security of GIG NSS systems.
2.3.1 Fundamental Attributes
There are five major fundamental attributes within GND. These fundamental attributes help to
protect friendly information and information systems while denying adversaries access to the
same information and information systems.
• Protection. Prior actions taken to counter vulnerabilities in GIG information transport,
•
•
•
•
processing, storage, service providers, and operational uses. Protection activities include
Emission Security (EMSEC), Communications Security (COMSEC), Computer Security
(COMPUSEC), Information Security (INFOSEC), and CIP incorporating physical
protection, access control, cryptography, network guards, and firewall systems.
Monitoring. The monitoring of information systems to sense and assess abnormalities, the
use of anomaly and intrusion detection systems.
Detection. Timely detection, identification, and location of abnormalities—to include attack,
damage, or unauthorized modification—is key to initiating system response and restoration
actions.
Analyzing. Assess pertinent information to determine indications and warnings, SA,
evaluate system status, identify root cause, define Courses of Action (COA), prioritize
response and recovery actions, and conduct necessary reconfiguration of GIG assets as
needed.
Responding. Directed actions taken to mitigate the operational impact of an attack, damage,
or other incapacitation of an information system. Response also includes “restoration”-- the
prioritized return of essential information systems, elements of systems, or services to preevent capability. Computer Network Defense Response Actions (CND RA) include
defensive and restoration actions. Response Actions (RAs) are deliberate, authorized
defensive measures or activities that protect and defend DoD computer systems and networks
under attack or targeted for attack or exploitation by adversary computer systems/networks.
7
RAs expand DoD’s layered defense-in-depth capabilities and increase DoD’s ability to
withstand adversary attacks or exploitations. Objectives for using CND RAs include:
Strengthening DoD’s defensive posture and operational readiness.
Halting or minimizing attack and exploitation effects or damage.
Supporting rapid, complete attack or exploitation characterization.
2.3.2 Critical Capabilities
GND involves the following NetOps critical capabilities to support the fundamental attributes
previously discussed. These capabilities for GND must be employed along with the fundamental
attributes at the strategic, operational, and tactical levels across all DoD war fighting,
intelligence, and business domains.
• Visibility. Visibility involves knowing the status of the security of the GIG to include the
•
•
•
•
•
configuration of each device and current threats to the GIG.
Monitoring and Analysis. Monitoring and analysis involves receiving and viewing all
GND events and incidents to determine the impact on current operations and provide trend
analysis.
Planning. Planning occurs in establishing defense-in-depth configurations, assigning
monitoring responsibilities, anticipating contingency operations for a given set of cyber
attacks/failures and coordinating NetOps Priority Information Requirements (PIR) with
COCOM PIRs.
Coordinating and Responding. Receives, compiles, and disseminates GND events and
incidents to create a common GND picture and coordinates and directs response to major
GND events and incidents that could have an operational impact.
Management and Administration. Management and administration involves collecting and
consolidating intrusion detection reports and data, assessing the compiled data, and reporting
the results to the appropriate command authorities. Management involves coordinating the
efforts of subordinate network control and operations centers to detect, isolate, and contain
GND events and incidents. Management establishes policies and procedures to govern GND
Rules of Engagement (ROE) for subordinate centers. It also maintains and oversees
implementation of network defense initiatives and compliance with Information Assurance
Vulnerability Alerts (IAVA) procedures.
Control. Control involves the ability to maintain and direct automated intrusion detection
systems and devices. It also involves the implementation of IAVA on systems.
2.3.3 Effects Enablers
This essential task enables Assured Information Protection and Assured System and Network
Availability as indicated in Figure 1. The effects of this essential task are achieved by:
• Instituting agile capabilities to resist adversarial attacks, through recognition of such attacks
as they are initiated or are progressing.
• Efficient and effective RAs to counter the attack, and, safely and securely recover from such
attacks.
8
• Reconstituting capabilities from reserve or reallocated assets when original capabilities are
destroyed.
• Maintaining correlation activities between user elements to ascertain hostile GND events
from other system outages or degradations.
2.4
Information Dissemination Management / Content Staging4
IDM/CS is defined as the technology, processes, and policy necessary to provide awareness of
relevant, accurate information; automated access to newly discovered or recurring information;
and timely, efficient and assured delivery of information in a usable format. As IDM/CS
becomes more mature, the complete complement of its services will be available for use by all
authorized DoD GIG users as a net-centric service. This essential task merges core services with
the NetOps critical capabilities.
2.4.1 Core Services
The core services necessary to implement Information Dissemination Management / Content
Staging are Content Discovery, Content Delivery, and Content Storage. These core services are
envisioned to be enterprise wide services used by the entire DoD to ensure our information is
available to all authorized users. The GIG Enterprise Service effort and the Net-Centric
Enterprise Services program will deliver these core services.
• Content Discovery.
Content Discovery provides the ability to quickly search for
information throughout the GIG. Using any web browser, whether on a desktop computer or
wireless device, operational staffs can search across multiple sources from one place, vice
making several attempts. Once the product is located, the access service permits the users to
pull in the needed product.
• Content Delivery. Information that is received in the Area of Responsibility (AOR) by the
Information Manager (IM) is delivered using the IDM/CS delivery service. Content Delivery
provides the user the capability to replicate files and directives, publish, and subscribe to
information based on roles and responsibilities, and provide assured, timely transport of the
information, to include notification of when the information was read by a distant user. Items
are delivered across multiple, heterogeneous communication systems with delivery and read
receipt notifications, providing assured delivery of information products.
• Content Storage. Content Storage provides physical and virtual places to host data on the
network with varying degrees of persistence. These information storage capabilities will be
located throughout the GIG.
2.4.2 Critical Capabilities
IDM/CS involves the following NetOps critical capabilities to support the core services
previously discussed. These capabilities for IDM/CS must be employed along with the core
4
This section discusses the concept of Information Dissemination management / Content Staging. This is not
synonymous with the DISA Content Staging system currently being fielded. While DISA’s Content Staging system
is an implementation of the concept of Content Staging, this concept is much broader than capabilities of the current
system.
9
services at the strategic, operational, and tactical levels across all DoD war fighting, intelligence,
and business domains.
• Visibility. Visibility involves knowing the status of the information flowing across the GIG
•
•
•
•
•
and of those systems used to store, catalog, discover and transport information.
Monitoring and Analysis. Monitoring and analysis involves viewing information flows and
access, determining impact to network capacity, and ensuring that user profiles are being
satisfied with a reasonable quality of service.
Planning. Planning occurs in establishing prioritized information requirements, sources
responsible for providing that information, and staging of information content throughout the
GIG in support of a given operation. Contingency planning for disseminating information is
a critical aspect of IDM/CS operational planning.
Coordinating and Responding. Tracks and maintains knowledge of the various requests
and user profiles for information; coordinates changes in the operating parameters of GIG
assets; identifies new products; reviews and validates user-profile database; and develops
joint policies and procedures governing information. The GIG Integrated Architecture will
enable user data pulls, which will minimize the need for central coordination and
administration.
Management and Administration. Management and administration includes establishing
the priorities for information gathering and reporting through the Commander's critical
information requirements; emerging intelligence from the Commander’s operations area,
emerging operational information, and public affairs guidance; developing policy and
procedures to govern information flow; directing subordinate forces to develop mission
information exchange requirements and user profiles; and incorporating expected
information requirements into communications capacity planning.
Control. Control involves developing mission information exchange requirements,
developing user profiles, and updating and customizing standing user profiles.
2.4.3 Effects Enablers
This essential task enables Assured Information Delivery and Assured Information Protection as
indicated in Figure 1. The effects of this essential task are achieved by:
• Permitting commanders to adjust information delivery methods and priorities for enhanced
•
•
•
•
SA.
Allowing information producers to advertise, publish and distribute information to the war
fighter.
Enabling users to define and set information needs (profiles) to facilitate timely and efficient
information delivery and/or search information databases to retrieve desired products as
required.
Improving bandwidth utilization.
Enhancing all aspects of the GIG transport capabilities.
10
3
NetOps Command and Control Operating Principles
“The Department is transitioning to a global force management process. This will allow us to
source our force needs from a global, rather than regional, perspective and to surge capabilities
when needed into crisis theaters from disparate locations worldwide. Our global presence will
be managed dynamically, ensuring that our joint capabilities are employed to the greatest effect.
Under this concept, Combatant Commanders no longer “own” forces in their theaters. Forces
are allocated to them as needed-sourced from anywhere in the world. This allows for greater
flexibility to meet rapidly changing operational circumstances.”
~ The National Defense Strategy, March 2005
3.1
Overview
Most existing C2 philosophy, doctrine, and practices were developed and perfected during the
Industrial Age.5 Industrial Age C2 emphasizes highly centralized planning and uses a linear and
sequential process in planning and executing military operations. The underlying principles of
Industrial Age C2 resulted in military organizations whose:
• Hierarchy with numerous layers of command affected the commander’s ability to react to
changing operational situations.
• Information flow process depended upon the organizational hierarchy, which led to stovepiped systems and approaches to information management.
• Minimal sharing of information with other organizations prevented them from taking full
advantage of all the available information.
The result is a Joint C2 system that lacks agility and is largely inadequate to deal with the
challenges of the future operating environment. Sharing information, SA, and understanding of
the operating environment is slow and difficult. It employs command by direction or command
by plan methodologies that lack sufficient responsiveness to deal with the complexities and
uncertainties of the future operating environment.6
Starting in the late 1990’s, the DoD began evaluating the benefits that Information Age
technology can bring to military operations. The vast improvements in information sharing
realized by applying Information Age technology to military C2 will significantly improve our
agility and speed of command. These ideas evolved into the concept of NCOW. Initially
defined as Network Centric Warfare, the concept evolved to include the Business and
Intelligence operations of DoD and is now NCOW. NCOW is “… the best term developed to
date to describe the way we will organize and fight in the Information Age.”7
5
Toffler, Alvin. War and Anti-War. Boston, MA: Warner Books. 1993.
Joint Command and Control Functional Concept, February 2004, pp. 9-10.
7
Alberts, Garstka and Stein. Network Centric Warfare: Developing and Leveraging Information Superiority. 2nd
Edition (Revised). 1999, p. 2.
6
11
NCOW is the application of Information Age technology to military C2 resulting in an
information superiority-enabled concept of operations that generates increased combat power by
networking sensors, decision makers and shooters to achieve shared awareness, increased speed
of command, higher tempo of operations, greater lethality, increased survivability, and a degree
of self-synchronization. In essence, NCOW translates information superiority into combat power
by effectively linking knowledgeable entities in the battlespace.8
NCOW represents a powerful set of war fighting concepts and associated military capabilities
that allow warfighters to take full advantage of all available information and bring all available
assets to bear in a rapid and flexible manner.
The tenets of NCOW that dramatically increase mission effectiveness9 are:
• A robustly networked force improves information sharing.
• Information sharing enhances the quality of information and shared SA.
• Shared SA enables collaboration and self-synchronization, and enhances sustainability and
speed of command.
3.2
Net-Centric Operation and Defense of the GIG
NetOps, as a net-centric operation, faces the same set of C2 challenges as any other Joint Force
Operation. As a critical enabling capability to achieving net-centricity, NetOps must adopt
Information Age C2 structures and processes. For DoD to achieve net-centricity, the GIG must
be operated net-centrically. The NetOps COI (discussed further in section 4.1) must lead the
way in adopting collaborative C2. The NetOps COI must be able to operate and defend the GIG
in a net-centric manner, in order for the DoD to realize the benefits of NCOW.
3.2.1 Self-Synchronization of NetOps
Key to the NCOW concept is the objective of conducting self-synchronizing operations. Selfsynchronized operations are the collaborative and decentralized initiation and execution of
actions by elements of a joint force in support of the desired end state. Also defined as the
interaction between two or more entities to operate in the absence of hierarchical mechanisms for
Joint C2, self-synchronized operations are a mechanism for communicating the ongoing
dynamics of the operational situation and triggering the desired value-added interaction.
The requirements for achieving self-synchronization are:
•
•
•
•
A clear and consistent understanding of command intent.
High quality information and shared SA.
Competence at all levels of the force.
Trust in the information, subordinates, superiors, peers, and equipment.
8
Alberts, Garstka and Stein. Network Centric Warfare: Developing and Leveraging Information Superiority. 2nd
Edition (Revised). 1999.
9
Ibid, pp. i.
12
The command function is not absent in self-synchronized forces; however, it does depend on
achieving congruent command intent, shared SA, authoritative resource allocation, and
appropriate ROE, as well as similar measures that guide but do not dictate details to
subordinates. Moreover, the tenets of NCOW do not assume that self-synchronization is the only
way Information Age forces will operate. They argue only that they will be capable of such
operations and that those operations will be more effective (greater likelihood of mission
accomplishment) and efficient (few forces able to do more). Unless the conditions necessary for
self-synchronized operations are met, there is no assumption that it should be employed.
The objective of NetOps C2 activities is self-synchronized operation and defense of the GIG. It
is impossible to effectively operate and defend the GIG from one centralized headquarters.
Effective operation and defense of the GIG requires competent NetOps Operators at all levels
that understand the Commander’s intent for the GIG and have SA about the GIG. Achieving this
objective will:
• Increase the opportunity for lower-level NetOps organizations to operate nearly
•
•
•
•
3.3
autonomously and to re-task themselves through exploitation of shared awareness and the
commander’s intent.
Increase the value of subordinate initiative to produce a meaningful increase in GIG
performance and responsiveness.
Assist in the execution of the “commander’s intent for the GIG.”
Exploit the advantages of a highly trained, professional NetOps workforce.
Rapidly adapt when important developments occur in the GIG.
C2 and NetOps Decision Making
The NetOps COI will organize itself and conduct its operations on the basis of the following
principles and command relationships. Both are derived from joint war fighting doctrine and
guided by the joint operating concepts. USSTRATCOM, in conjunction with other COCOMs,
will later establish procedures that provide specifics associated with supported relationships
within the NetOps C2 structure.
3.3.1 Theater & Global NetOps Events
A NetOps event is a collective term for all NetOps activities that have the potential to impact the
operational readiness of the GIG. To effectively operate the GIG as a global enterprise while
realizing the Geographic Combatant Command (GCC) requirements to direct GIG operations in
their theaters, CDRUSSTRATCOM developed an event based C2 structure. C2 of GIG
operations will be based on the situation at the time. The two possible circumstances that
determine the C2 of NetOps are known as Theater NetOps Events and Global NetOps Events.
The preponderance of NetOps Events are Theater NetOps Events and are under the control of the
GCC and its Service Components. Global NetOps Events occur less frequently but when they do
occur, USSTRATCOM will direct the global response. USSTRATCOM, in conjunction with
other COCOMs, will establish tactics, techniques and procedures for executing the supported
relationships within the NetOps C2 structure.
13
3.3.1.1 Theater NetOps Events
Theater NetOps Events are those NetOps activities occurring within a theater that have the
potential to impact the operations in the theater.
The GCC is the supported commander for Theater NetOps Events. USSTRATCOM and Joint
Task Force – Global Network Operations (JTF-GNO) provide support to the GCC for Theater
NetOps Events. JTF-GNO Service Component Commands provide support for Theater NetOps
Events through the Theater Service Component Command if established. Functional Combatant
Commands (FCCs) are the supporting commands for NetOps activities that affect or have the
potential to affect the GCC’s area of operations or mission. Non-DoD activities may also
provide support per intra-governmental agreements.
3.3.1.2 Global NetOps Events
Global NetOps Events are those activities that have the potential to impact the operational
readiness of the GIG and require a coordinated response amongst affected Combatant
Commanders, Military Services, Defense Agencies and other members of the NetOps COI.
CDRUSSTRATCOM is the supported commander for Global NetOps Events and will issue
orders and direction through JTF-GNO to the Combatant Commands, Services, Agencies
(CC/S/As) and other members of the NetOps COI. GCCs are responsible for leading the Theater
response to Global NetOps Events within their theater in accordance with USSTRATCOM &
JTF-GNO direction. JTF-GNO Service Component Commands will support the execution of
Global NetOps. FCCs are the supported commands where NetOps activities affect or have the
potential to affect execution of their assigned missions.
3.3.2 Principles of NetOps Command and Control
These guiding principles apply to all levels of NetOps execution.
• The objective of NetOps C2 activities is Self-synchronized operation of the GIG.
• NetOps activities will be executed at the lowest level of command possible.
• DoD NetOps direction will be executed through the Unified Command chain of command
•
•
•
•
•
using supporting/supported command relationships.
The supported commander has the authority to take whatever NetOps action is deemed
necessary to support the mission and has final decision responsibility.
All Commanders must continually consider the possible global impact of their actions.
Commanders must be fully aware of GIG resource allocations to DoD missions.
If a NetOps action has potential global impact, the supported commander must initiate
collaboration with the NetOps COI.
In time critical situations, such as immediate Computer Network Defense (CND) actions to
defend the GIG within an AOR, action may be initiated prior to collaborating or
collaboration may be abbreviated. Collaboration must then follow in order to mitigate or
remediate global affects, if any.
14
• NetOps activities affecting Sensitive Compartmented Information (SCI) networks will be
executed in accordance with joint procedures defined by the Secretary of Defense (SECDEF)
and the Director of National Intelligence (DNI) or their designees.10
• Non-DoD NetOps activities will be executed per memorandum of agreement with the DoD.
10
Secretary of Defense Memorandum, “Assignment and Delegation of Authority to Director, Defense Information
Systems Agency (DISA), 18 Jun 2004.
15
4
NetOps C2 Structure & Relationships
“The GIG will help enable Network Centric Warfare by improving information sharing among
all elements of a Joint Force, and with allied and coalition partners.”
~ Network Centric Warfare, DoD Report to Congress, 27 July 2001
4.1
NetOps Community of Interest
The NetOps COI is the term used to describe the collaborative group of organizations
responsible for operating and defending the GIG. The NetOps COI must exchange relevant
information in pursuit of their shared objective and mission to operate and defend the GIG.
Under the authority vested in the Commander, USSTRATCOM, the NetOps COI consists of
organizations from the Office of the Secretary of Defense, Joint Chiefs of Staff, Combatant
Commands, Military Services, Defense Agencies, Other US Government Agencies, IC, coalition
partners and NGO that must interact to accomplish NetOps in support of the DoD mission.
The NetOps COI is divided into two general components: DoD and non-DoD. Within the DoD,
the NetOps COI includes the Military Departments, all Combatant Commands, Services,
Defense Agencies and Field Activities. Outside the DoD, the NetOps COI includes allies,
coalition partners, other US Government Agencies, state and local governments, commercial and
NGO, multinational partners, and regional and international organizations. The NetOps COI is
linked together by its need to exchange information in pursuit of common mission
accomplishment, shared SA and understanding, planning and decision-making, and who
therefore must have a common vocabulary for the information they exchange.11 As described in
DoD Net-Centric Data Strategy, the NetOps COI can be considered a ubiquitous institutional
COI that supports the formation of warfighting, intelligence, and business institutional and
expedient COIs.12
This CONOPS applies to the entire NetOps COI and will govern their operational conduct. It
will be used to develop deliberate plans, support crisis action planning, and orders production.
Non-DoD organizations connecting to the GIG will comply with this CONOPS.
It is also applicable to Program Managers (PM) and Program Management Offices (PMO),
responsible for net-centric programs supporting both the NetOps COI and NCOW as a whole.
4.2
Organizational Roles and Capabilities
4.2.1 Commander, US Strategic Command
In addition to other missions, the UCP 2004, dated March 2005, assigns CDRUSSTRATCOM as
the Combatant Commander for IO and Global C4ISR. CDRUSSTRATCOM has determined
11
Ibid, p. 4.
Ibid, pp. 4-7. Communities of interest are also described as permanent and temporary, as well as formal and
informal, in the Net-Centric Environment Joint Functional Concept, Version 9.5, 30 Dec 2004, pp. 16-17. See
further discussion of Communities of interest in DoD CIO IM Directorate’s “Communities of Interest in the NetCentric DoD FAQs,” 19 May 04, v1.0.
12
16
that this mission includes directing Global NetOps operations; advocating the NetOps
requirements for all COCOMs; and planning and developing national requirements.
In order to operationalize missions assigned to USSTRATCOM, the commander delegated
operational and tactical level planning, force execution, and day-to-day management of forces to
Joint Functional Component Commands (JFCC) (Figure 2). These JFCCs will conduct
operations for USSTRATCOM while the Headquarters focuses on strategic-level integration and
advocacy of its assigned missions.13 At the request of CDRUSSTRATCOM, the SECDEF
assigned the Director, DISA as the Deputy Commander for Global Network Operations and
Defense, with authorities and responsibilities for Global Network Operations and Defense and as
the Commander of JTF-GNO.
Figure 2: USSTRATCOM Operational C2 Structure
NetOps is conducted by JTF-GNO, unless otherwise directed by CDRUSSTRATCOM. Such
operations include apprising CDRUSSTRATCOM on NetOps matters impacting the GIG’s
integrity and support of DoD missions. CDRUSSTRATCOM manages the apportionment and
allocation of GIG system and network resources. Competing resource requirements that cannot
be resolved will be forwarded through CDRUSSTRATCOM, to the CJCS for adjudication.
CDRUSSTRATCOM identifies and advocates for COCOM NetOps requirements through the
Planning, Programming, Budgeting, and Execution System (PPBES) process.
4.2.1.1 Commander, Joint Functional Component Command for Network Warfare
Joint Functional Component Command for Network Warfare (JFCC-NW) is responsible for
planning, integrating and coordinating computer network warfare capabilities and integrating
with all necessary computer network defense and exploitation capabilities. Network warfare is
13
Commander, US Strategic Command Memorandum “Establishment of Joint functional Component Command for
Network Warfare”, 20 January 2005.
17
defined as the employment of Computer Network Operations (CNO) with the intent of denying
adversaries the effective use of their computers, information systems, and networks, while
ensuring the effective use of our own computers, information systems, and networks. This
includes development of information / intelligence support and information assurance
requirements for supporting network warfare, the integration of Computer Network Attack
(CNA) and Computer Network Exploitation (CNE) capabilities and direct coordination with
JTF-GNO.14
4.2.1.2 Commander, Joint Task Force-Global Network Operations
JTF-GNO directs the operation and defense of the GIG to assure timely and secure net-centric
capabilities across strategic, operational, and tactical boundaries in support of DoD's full
spectrum of warfighting, intelligence, and business domains.
The Commander, JTF-GNO (Cdr, JTF-GNO) will exercise Operational Control (OPCON) of the
GIG for Global NetOps issues. Under the authority of CDRUSSTRATCOM, JTF-GNO issues
the orders and directives necessary to maintain the assured service of the GIG, ensuring that the
President, SECDEF, CC/S/As can accomplish their missions. The CC/S/As execute JTF-GNO’s
directives within their respective areas and report compliance.
To achieve this mission, CDRUSSTRATCOM assigned these tasks to the Cdr, JTF-GNO:
1.
2.
3.
4.
Direct Operations and Defense of the GIG.
Maintain GIG availability and integrity; ensure efficient traffic management.
Establish and oversee SA of the GIG readiness and defensive posture.
Assist CDRUSSTRATCOM in developing tools, monitoring threats, verifying policy
compliance, and controlling network access for consistent Information Assurance
Vulnerability Management.
5. Direct and oversee network defense and information services.
6. Assist in establishing and maintaining standards for network, component, and defensive
requirements.
7. Conduct network defense planning, preparation, and operations employment for normal
operations and for crisis and deliberate planning. When directed, support deliberate and
crisis action planning requested by other COCOMs.
8. Develop, coordinate, integrate, direct and oversee specific network defense COA in
support of GIG network operations and defense. Coordinate with CDRUSSTRATCOM
for approval authority on Tier 2.1 CND RAs.
9. Support USSTRATCOM participation in exercises and experiments involving GIG
network management and defense.
10. Provide intelligence requirements in support of network defense.
11. Provide assessments and recommendations to USSTRATCOM for WATCHCON
changes dictated in network threat warning.
12. Provide recommendations to USSTRATCOM for Information Operations Condition
(INFOCON) changes.
14
Commander, US Strategic Command Memorandum “Establishment of Joint functional Component Command for
Network Warfare”, 20 January 2005. Pending SECDEF approval.
18
13. Direct and oversee the establishment and maintenance of standards for technical testing,
evaluation, and measures of effectiveness of network operations and defense capabilities.
14. Direct and oversee establishing procedures to provide Department measures of
effectiveness and battle damage assessment during and following network defense
operations.
15. Assist in formulating guidance for training network operations and defense forces.
16. Assist in developing and promulgating joint TTPs for network operations and defense
activities.
17. Identify desired characteristics and capabilities for network operations and defense.
The JTF-GNO staff assists the Cdr, JTF-GNO in executing the NetOps mission. (Figure 3)
Figure 3: JTF-GNO Staff Organization
4.2.1.2.1
Global NetOps Center
The Global NetOps Center (GNC) is the JTF-GNO Command Center responsible for executing
the daily operation and defense of the GIG. The GNC directs, manages, controls, monitors, and
reports on essential elements and applications of the GIG in order to ensure its availability to
support the needs of the President, SECDEF, CC/S/As, warfighting, business, and intelligence
domains.
The GNC provides the overall management, control and technical direction for GIG NetOps and
oversees a collaborative coordination process involving all CC/S/As. The responsibilities of the
GNC include:
• Direct the operation and defense of the GIG.
• Collaborate with the NetOps COI to ensure effective operation and defense of the GIG.
• Advise JTF-GNO and CDRUSSTRATCOM on matters regarding the allocation and
adjudication of GIG resources.
19
• Advise JTF-GNO and CDRUSSTRATCOM of any matters impacting the GIG’s integrity
•
•
•
•
•
•
•
•
•
•
and/or NetOps issues affecting DoD missions.
In coordination with CC/S/A, establish and maintain the technical and operational standards
by which the GIG SA will be generated across the GIG.
Perform global incident/intrusion monitoring and detection, strategic vulnerability analysis,
computer forensics, and responses to GND-related activity. Direct COA and coordinate the
CND incident RAs across DoD to defend networks under attack.
Determine COA and direct restoral of GIG capabilities and services when required.
Maintain GIG SA in support of each COCOM’s current and near term operations as well as
deliberate plans.
Maintain visibility, to include security monitoring of the GIG, through an integrated GIG SA
view. This is achieved through the integration of Theater NetOps Center (TNC) and
Service/Agency collected and shared GIG SA data. This shared SA view includes wireless,
terrestrial, and space based systems; enterprise services; and both the logical and physical
infrastructure views of the network.
Identify, localize, and resolve GIG security anomalies that affect the GIG’s ability to support
senior military leadership at the national level, JS, and supported COCOMs.
Coordinate GND support to the COCOMs.
Coordinate with and receive support from the DoD Law Enforcement and CounterIntelligence (LE&CI) Center.
Manage electromagnetic spectrum interference resolution, satellite anomaly resolution, and
global SATCOM systems.
The GNC establishes procedures facilitating the ability of adjacent commanders who share a
common GIG boundary to:
Consider the impact of one’s own actions or inactions on adjacent commanders and
related business and intelligence communities.
Provide access to timely information among adjacent commanders regarding others’
intentions and actions, as well as those of non-military agencies or the enemy, which may
influence adjacent activity.
Support adjacent commanders, as required, by establishing a common aim and
monitoring the unfolding situation.
Coordinate the support provided and received.
20
4.2.1.2.2
JTF-GNO Operational Forces and Service Components
In order to effectively conduct Global NetOps, JTF-GNO was given OPCON over Defense
Information System Agency (DISA) NetOps organizations and Service Components.
Figure 4: JTF-GNO Operational Forces
4.2.1.2.2.1
Commander, Global NetOps Support Center
The Global NetOps Support Center (GNSC) provides the day-to-day technical operation, control
and management of the portions of the GIG that support Global Operations but are not assigned
to a COCOM. The GNSC conducts GIG backbone NetOps, Standard Tactical Entry Point
(STEP) mission support, Teleport, provisioning of provided services, network engineering,
circuit implementation, and inter-theater connectivity among USNORTHCOM, USPACOM,
USEUCOM, USSOUTHCOM, and USCENTCOM areas of responsibility. The GNSC provides
general support to the GCCs and TNCs. The GNSC provides direct support to the FCCs.
The GNSC provides full-time (24-hour/7-day), near real-time, correlated visibility, monitoring,
coordination, control, and management support of the global backbone portions of the GIG. The
Commander of the GNSC develops, monitors, and maintains a GIG SA view for the global
backbone.
To carry out its mission, the GNSC will:
•
•
•
•
Operate and maintain the backbone services of the GIG.
Collaborate with the NetOps COI to ensure effective operation and defense of the GIG.
Issue technical directives to ensure compliance with JTF-GNO direction.
Provide SA information of GIG backbone services.
21
• Monitor and collect performance data continuously for those information resources deemed
•
•
•
•
•
•
•
important by JTF-GNO.
Provide system and network status (fault and performance) information as part of the SA
view.
Assist in determining the technical and operational mission impacts caused by degradations,
outages, and GND events.
Perform incident/intrusion monitoring and detection, strategic vulnerability analysis,
computer forensics, and responses to GND-related activity. Direct COA and coordinate the
CND incident RAs across DoD to defend networks under attack.
Determine COA and direct restoral of capabilities and services when required.
Maintain SA in support of each FCC's current and near term operations as well as deliberate
plans, as required.
Maintain security monitoring through an integrated GIG backbone SA view.
Until the USSOUTHCOM TNC is established, the GNSC will provide direct support to the
USSOUTHCOM TNCC.
4.2.1.2.2.2
Commander, Theater NetOps Center
The Commander of each TNC is responsible for the effective operation and defense of the GIG
within the theater and for providing support to the GCC. The TNC develops, monitors and
maintains a GIG SA view for the theater. The theater GIG SA view is aggregated and segmented
based on requirements provided by the Theater NetOps Control Center (TNCC). It will include
pertinent theater, operational, and tactical-level system and network, GND, and IDM/CS status.
To carry out its mission, the TNC will:
• Operate and maintain the backbone services of the GIG assets located in their theater.
• Collaborate with the NetOps COI to ensure effective operation and defense of the GIG.
• Issue technical directives to Service Theater Network Operations and Security Centers
•
•
•
•
•
(STNOSCs)/Agency Theater Network Operations and Security Centers (ATNOSCs) to
ensure compliance with TNCC and / or JTF-GNO direction.
Receive SA information in order to monitor all Theater, Service and/or Service Component,
and Agency systems and networks designated as mission critical.
Support the CC/S/A by creating, disseminating, and making available the NetOps SA views
for the Theater, Service and/or Service Component, and Agency. This is accomplished by
integrating NetOps event and status information received from those elements within the
TNC AOR that have NetOps reporting requirements. This shared SA view includes wireless,
terrestrial, space-based systems, and enterprise services.
Coordinate with the TNCC regarding reporting requirements (input data) and view
specifications for NetOps SA.
Monitor and collect performance data continuously for those information resources deemed
important by the COCOM’s TNCC or Global NetOps Control Center (GNCC).
Provide system and network status (fault and performance) information as part of the SA
view.
22
• Provide the TNCC or GNCC with information security products and services to include the
•
•
•
•
•
•
•
•
•
monitoring and reporting of intrusions, physical threats and analysis and correlation of
intrusion incidents with Components, Sub-Unified Commands and Joint Task Forces.
Assist in determining the technical and operational mission impacts caused by degradations,
outages, and GND events.
Perform incident/intrusion monitoring and detection, strategic vulnerability analysis,
computer forensics, and responses to GND-related activity. Direct COA and coordinate the
CND incident RAs across DoD to defend networks under attack.
Determine COA and direct restoral of capabilities and services when required.
Maintain SA in support of each COCOM's current and near term operations as well as
deliberate plans, as required.
Maintain security monitoring through an integrated GIG SA theater view. This is achieved
through integration of TNC and Service/Agency collected and shared GIG SA data. This
shared SA view includes wireless, terrestrial, space-based systems and enterprise services.
Identify and resolve computer security anomalies that affect the GIG assets located in their
theater.
Coordinate theater GND support as directed by the TNCC.
Coordinate with and receive support from LE&CI.
Manage theater electromagnetic spectrum interference resolution, satellite anomaly
resolution, and SATCOM systems.
4.2.1.2.2.3
Commander, GIG Infrastructure Services Management Center
The GIG Infrastructure Services Management Center (GISMC) is the primary DoD enterprise
level applications services NetOps center that supports the GNC, GNSC and TNCs with
applications layer FCAPS, visibility, monitoring, analysis, planning, management and control.
The center facilitates the net-centric transformation of DoD-level enterprise services by
optimizing the consolidation and integrated NetOps of the existing and emerging applications
networks and services. The applications services infrastructure that the GISMC is responsible for
will include DoD’s Active Directory, IDM/CS, computing services, GIG DMZ services, NCES,
multinational information sharing, and other new and legacy global application services. The
GISMC will provide the day-to-day technical operation, control and management of the GIG’s
infrastructure services that are Global network enablers. It will serve as the NetOps focal point
for all critical GIG infrastructure services. The GISMC is under the operational control of JTFGNO, providing general support to the NetOps COI.
The GISMC will facilitate the sharing of enterprise level infrastructure technical and related
information across NetOps COIs, thus providing Combatant Commanders, Services, and TNCs
SA of infrastructure services outside their span of control, but critical to their mission. Where the
GNSC provides day-to-day overall technical NetOps of the GIG backbone, the GISMC will
provide applications layer focused day-to-day technical operations, control, and management of
the GIG’s enterprise-level application-based infrastructure services. The GISMC and the GNSC
will coordinate related technical operations, control, and management issues to ensure that GIG
NetOps tasks are integrated as shown in Figure 4.
23
The GISMC will execute the FCAPS functions IAW JTF-GNO policies as supported by current
NetOps tools and processes to ensure consistency. The day-to-day administration will consist of
a combination of GISMC based NetOps Support Teams and linked-in Enterprise Services
Management Centers. This combination will track, manage, and report status of their assigned
infrastructure services. The GISMC will evolve over time as the GIG evolves into a more Netcentric architecture with robust COCOM support capabilities at TNCs.
The GISMC will provide full-time (24-hour/7-day), near real-time, correlated visibility,
monitoring, coordination, control, and management support of the global infrastructure
application services on the GIG. The GISMC will develop, monitor and maintain a GIG SA
view of the global infrastructure services to ensure timely and efficient delivery of global
information across the GIG.
To carry out its mission, the GISMC will:
• Collaborate with the NetOps COI to ensure effective operation and defense of GIG
•
•
•
•
•
•
•
•
•
•
infrastructure application services.
Work closely with the GNSC to correlate related degradations, outages and GND events to
identify and resolve root causes.
Issue technical directives to ensure compliance with JTF-GNO direction.
Provide SA information of infrastructure application services.
Monitor and collect performance data continuously for those information infrastructure
services deemed important by JTF-GNO.
Provide system and service status (availability, fault, and performance) information as part of
the SA view.
Assist in determining the technical and operational mission impacts caused by degradations,
outages, and GND events.
Perform incident/intrusion monitoring and detection, strategic vulnerability analysis,
computer forensics, and responses to GND-related activity. Direct courses of action and
coordinate the GND incident response actions across DoD to defend infrastructure services
under attack.
Determine courses of action and direct restoral of capabilities and services when required.
Maintain SA in support of each COCOM’s current and near term operations as well as
deliberate plans, as required.
Maintain security monitoring through an integrated GIG infrastructure services SA view.
24
4.2.1.2.3
JTF-GNO Service Component Commands
The JTF-GNO Service Component Commanders are the Commander, US Army Space and
Missile Defense Command (USA SMDC), the US Air Force Commander for USAF NetOps
(USAF NetOps / CC), Commander, US Navy Network Warfare Command (USN
NETWARCOM) and Commander, US Marine Corps Network Operations and Security
Command (MCNOSC). Each of these Service Component Commanders exercises OPCON over
their SGNOSC (Figure 5).
Figure 5: JTF-GNO Service Components
4.2.1.2.3.1
Service Global Network Operations and Security Centers and Computer Emergency /
Incident Response Teams15
The Service Global Network Operations and Security Centers (SGNOSCs) and Computer
Emergency / Incident Response Teams (CERT / CIRT) serve as a part of the Service Component
to JTF-GNO. The SGNOSC and CERT / CIRT mission is to provide the Service-specific
NetOps reporting and SA for the Service’s portions of the GIG. The SGNOSC and CERT /
CIRT provides worldwide operational and technical support to the Service’s portions of the GIG
across the strategic, operational, and tactical levels leveraging collaboration of the STNOSCs if
established. The Service CERT / CIRT is responsible for executing GND and ensuring the
Service’s portions of the GIG are secure.
15
It is the intent of the NetOps Concept that the distinction between NOSCs and CERTs be eliminated and that all
NetOps functions be performed in integrated Network Operations and Security Centers (NOSCs). However, this
idea has not been universally adopted by all Services and the Joint Chiefs of Staff have directed different command
relationships between JTF-GNO and the SGNOCs and CERTs / CIRTs. Therefore, the CONOPS must retain the
distinction between NOSCs and CERTs / CIRTs.
25
CDRUSSTRATCOM exercises OPCON of Service Global Network Operations and Security
Centers (SGNOSCs) through the JTF-GNO Component commands. In response to network
events or activities, as determined by CDRUSSTRATCOM or Cdr, JTF-GNO, Service Chiefs or
Secretaries shall instantaneously attach Service CERT / CIRT to Commander, JTF-GNO who
will exercise Tactical Control (TACON) upon contact with service CERT / CIRT until such time
that the responses to the events or activities are declared complete by Cdr, JTF-GNO. Upon
completion, Service Secretaries will resume control of the CERT / CIRT. In this context,
TACON includes the authority for Cdr, JTF-GNO to direct network reconfiguration and
defensive actions across the GIG. Cdr, JTF-GNO has the authority to task the Service CERT /
CIRT directly, without being required to access the CERT / CIRT through the USSTRATCOM
assigned NetOps Service Component. Cdr, JTF-GNO will establish procedures with service
CERT / CIRT command elements to coordinate and deconflict low density/high utilization
CERT/CIRT resources.16
The SGNOSC and CERT / CIRT roles and responsibilities include:
• Provide Service-specific NetOps support to CDRUSSTRATCOM, JTF-GNO and other
•
•
•
•
•
•
•
•
•
•
•
•
•
•
16
COCOMs.
Provide direct support to GCCs for theater issues when a Service elects not to establish a
STNOSC in a GCC’s AOR.
Collaborate with the NetOps COI to ensure effective operation and defense of the GIG.
Ensure implementation of approved DoD/Service policies and procedures for NetOps.
Provide near-real time global SA of Service network and system issues to JTF-GNO and
Service leadership.
Coordinate problem resolution actions within the Service that effect operations in two or
more theaters.
Coordinate, execute and/or direct support troubleshooting and restoral actions for Service
enterprise, business functions (Personnel, Logistics, Finance etc.) and Title 10
responsibilities in collaboration with JTF-GNO, TNCC/GNCC and STNOSCs.
Implement JTF-GNO directed policy and operational measures to ensure near real time,
worldwide defense for the Service’s portion of the GIG.
Report status of Service worldwide terrestrial, space and wireless transmission systems and
enterprise services and facilities to JTF-GNO and Service leadership.
Maintain Direct Liaison Authority (DIRLAUTH) with other SGNOSCs and AGNOSCs.
Establish, in coordination with USSTRATCOM, procedures for dissemination of advisories,
alerts, and warning notices, including those originating outside the Service and DoD.
Ensure Service-wide compliance with issued IAVAs and INFOCON changes.
Coordinate with Service IC to refine Priority Information Requirements in support of GND
operations.
Through NetOps TTP ensure the effective operation, management, and protection of the
Service portions of the GIG in support of net-centric warfare.
Provide STNOSC support to GCCs if STNOCS have not been established.
Joint Chiefs of Staff Standing CND EXORD, 19 May 2005.
26
4.2.2 Combatant Commands
4.2.2.1 Geographic Combatant Commands
The GCC exercises OPCON over the GIG assets in their theater and Component NetOps forces
and exercises TACON over the TNC for Theater NetOps matters. To accomplish this, all GCCs
established a TNCC through which they will maintain SA and exercise OPCON and/or TACON
of their apportioned, allocated, or assigned network assets. GCCs have the authority to direct
efforts and actions that affect the portions of the GIG in their AORs.
4.2.2.1.1
Theater NetOps Control Center
The primary mission of the TNCC is to lead, prioritize, and direct Theater GIG assets and
resources to ensure they are optimized to support the GCC’s assigned missions and operations,
and to advise the COCOM of the ability of the GIG to support current and future operations. In
performing its mission, the TNCC exercises OPCON over all Theater systems and networks
operated by forces assigned to the COCOM. The TNCC also exercises TACON over the TNC
for Theater NetOps issues. The specific roles of the TNCC include monitoring of the GIG assets
in their theater, determining operational impact of major degradations and outages, leading and
directing responses to degradations and outages that affect joint operations, and directing GIG
actions in support of changing operational priorities. The TNCC also responds to JTF-GNO
direction when required to correct or mitigate a Global NetOps issue.
The TNCC, in advising the COCOM of the GIG’s ability to support assigned missions and
operations, must remain cognizant of all current, future or contemplated operations involving the
GIG. This requires continual contact and coordination with the COCOM’s Joint Operations
Center. Serving as an operational extension to the COCOM’s command center, the TNCC
provides GIG SA and operational impact assessments to the Commander and the Joint
Operations Center.
The TNCC uses the GIG SA view provided by their TNC, component NetOps organizations, and
theater Joint NetOps Control Centers (JNCCs) to maintain SA over the portion of the GIG
necessary for the success of their COCOM’s assigned missions. Although the NetOps SA
software application will be a part of an enterprise-wide software capability, the input data
requirements and output products (picture/view, reports, etc.) will be user customizable, based on
built-in options, to meet the needs of each COCOM. The TNCC is responsible for coordinating
the definition and development of the content and scope of the GIG SA information/view for the
theater, based on DoD parameters to assure complete integration. This will be based on the
Commander’s guidance and requirements submitted by subordinate commands.
The
specifications will be submitted to the TNC, which is responsible for producing and
disseminating the GIG SA view. Some level of minimum SA “view” shall be defined to ensure
that all NetOps facilities provide a consistent set of information and to make it easier to integrate
and roll-up SA views generated by different theaters or organizations.
The TNCCs direct and prioritize required operational actions through their supporting TNC and
assigned NetOps forces. System and network management activities, in response to NetOps
decisions made by the TNCC, are accomplished through the COCOM’s TACON authority over
the TNC and through OPCON over forces assigned to the COCOM. By translating the
27
COCOM’s guidance into information priorities, engaging in NetOps planning, assessing theaterwide network resource readiness, and coordinating network defense, the TNCC provides the
expertise to advise senior leadership and provide recommendations on COA concerning NetOps
issues having an operational impact on mission accomplishment.
To carry out its mission, the TNCC will:
• Establish uniform 24x7 visibility into the status of the GIG SA view from/to TNC and
•
•
•
•
•
•
•
•
assigned NetOps organizations.
Collaborate with the NetOps COI to ensure effective operation and defense of the GIG.
Establish and retain visibility of system and network outages and customer service shortfalls.
Receive, consolidate, and analyze all available reports from the Components, Agencies,
JTFs, and deployed units.
Direct reporting of NetOps events, conduct analysis of the impact of such events on the
operational mission, develop alternate COA, and advise the Commander and other senior
decision makers on the status of GIG degradations, outages, GND events, and areas requiring
improvement.
Prioritize the installation and restoration of system and network services for the TNC and
subordinate organizations in the form of a Critical Customer (i.e., decision-maker) listing.
Direct, coordinate, and integrate RAs to computer network attacks and significant intrusions
affecting the COCOM’s portion of the GIG.
Direct the theater’s response to JTF-GNO directives for correcting or mitigating Global
NetOps issues.
Coordinate with JTF-GNO to de-conflict the COCOM’s Theater NetOps priorities with the
Global NetOps priorities of JTF-GNO and USSTRATCOM.
Deconflict issues between the TNC and STNOSC/ATNOSC.
4.2.2.1.2
Service Theater Network Operations and Security Centers
Service Components supporting a GCC may establish STNOSCs based on the size and topology
of their NetOps responsibilities to provide and manage systems and network services. The
STNOSC will serve as a single point of contact for their theater elements for systems and
network services; GEM, GND & IDM/CS capabilities; and operational reporting. The STNOSC
provides GIG SA information to the TNC and the TNCC. In the absence of a STNOSC, the
SGNOSC will perform the function of the STNOSC. To facilitate end-to-end management, and
maintain the accuracy of the GIG SA information/view, each STNOSC will:
• Exercise routine, day-to-day management, control, and defense of system and network
services provided as part of the GIG.
• Collaborate with the NetOps COI to ensure effective operation and defense of the GIG.
• Comply with GIG SA (visibility and status) reporting requirements for their portion of the
GIG as determined by the COCOM.
• Provide GIG SA information specifically from the TNC Points of Presence (POP) to the
Component’s deployed forces.
28
• Provide the TNCC / GNCC and TNC current (near real-time) SA of systems and networks
under their control and within their portion of the GIG for retrieval and use by other NetOps
centers IAW this CONOPS.
• Assist the TNC and the TNCC / GNCC in tracking the status of NetOps events and
determining the technical and operational mission impacts caused by NetOps events.
• Respond to a variety of threats using a range of response measures to preclude, or detect, and
counter, any threat.
• Exercise TACON over the system and network resources of their subordinate NOSCs,
Network Service Centers (NSCs), and Systems Administrators.
The concept of an STNOSC does not imply that each Service must create a physical STNOSC in
each theater. Each Service has implemented this concept of a STNOSC in a different way. The
following paragraphs describe each Service’s method of supporting Theater NetOps.
29
4.2.2.1.2.1
United States Army
The Army, through SMDC (Space Missile Defense Command) / ARSTRAT, the Army Service
Component Command to STRATCOM, and with support from Intelligence and Security
Command (INSCOM), directed NETCOM/9th ASC (Network Enterprise Technology
Command/9th Army Signal Command) to operate, manage, and defend the network at the
enterprise level infrastructure. Army NetOps applies ‘centralized management, decentralized
execution’ through a tiered NetOps force structure supporting seven Army Service Component
Commands: ARSTRAT, USARPAC, USAREUR, USARSO, USARCENT, EUSA and
ARNORTH.
The Army’s three tiered NetOps operational structure consists of: the Army Network Operations
and Security Center (ANOSC); Theater Network Operations and Security Center (TNOSC); and
the Regional Network Operations and Security Center (RNOSC). The ANOSC is integrated
with the 1st Information Operations Command (1st IO CMD - LAND) Army Computer
Emergency Response Team (ACERT) to create a consolidated NetOps Center called
ANOSC/ACERT Tactical Operations Center (A2TOC), and each TNOSC is integrated with a
Regional Computer Emergency Response Team (RCERT). This alignment of organizations has
provided a critical synergism of effectiveness and efficiency to receive, distribute, and analyze
information in order to integrate, synchronize, and coordinate CNO. For purposes of this
CONOPS, only the top two tiers of the Army NetOps structure are presented. In this CONOPS
the ANOSC is referred to as the SGNOSC and the TNOSC is referred to as the STNOSC.
Serving as the single Army service NetOps authority, the ANOSC directs, operates, manages,
and defends the Army’s portion of the GIG network infrastructure at the enterprise level. The
ANOSC provides worldwide operational and technical support to the LandWarNet across the
tactical and strategic levels. It provides to decision makers a comprehensive, integrated, near
real-time, situational awareness, operational reporting capability and SA; operationally integrates
GEM, GND, and IDM/CS technologies and procedures. The ANOSC interfaces with JTF-GNO
through an OPCON relationship, other service NOSC’s through a Supporting relationship, and
with all Army TNOSC’s through a technical control (TECHCON) relationship.
The Army TNOSC assists the ANOSC in managing the service’s portion of the GIG network
and acts a single point of contact for Army network services, operational status, and anomalies in
the theater and to other Services operating in the theater. The TNOSC is the single point of
contact that provides visibility and status information to the ANOSC, Component Command
TNCC, and the JTF-GNO’s TNC on NetOps issues/events for the Army’s portion of the GIG
network.
30
Figure 6: US Army NetOps Forces
31
4.2.2.1.2.2
United States Navy
The US Navy is transforming their Naval Telecommunications Master Station (NTCMS)
construct to support the STNOSC concept. NETWARCOM will create two RNOSCs that will
provide STNOSC support to the GCCs. The RNOSC-East will support USEUCOM,
USSOUTHCOM and USNORTHCOM. The RNOSC-West will support USPACOM and
USCENTCOM. The STNOSC provides direct support to the GCC’s TNCC, TNC, and Navy
Forces (NAVFOR) for theater NetOps issues and events.
Figure 7: US Navy NetOps Forces
32
4.2.2.1.2.3
United Sates Marine Corps
Service Theater Network Operations and Security Center services for Marine Corps components
are provided virtually/remotely by the Marine Corps Network Operations and Security
Command (MCNOSC) from Quantico, Virginia. The MCNOSC, as the Marine Corps’
SGNOSC, is currently assigned OPCON as a component to the JTF-GNO. Therefore, it will not
be assigned OPCON to the Service components of the GCCs. Rather, the MCNOSC provides
direct support to the GCC’s TNCC, TNC and Marine Forces (MARFOR) for theater NetOps
issues and events. The MCNOSC in its entirety is potentially available to fulfill its direct support
responsibilities. However, the MCNOSC Command Center is the point of entry to the
MCNOSC for theater NetOps requirements and requests for support. The Command Center will
allocate available internal resources and coordinate delivery of MCNOSC direct support.
Figure 8: US Marine Corps NetOps Forces
33
4.2.2.1.2.4
United States Air Force
The USAF designed their Network Operations and Security Center (NOSC) construct around
their Major Commands (MAJCOMS). This construct puts an Air Force STNOSC in each
deployed theater as part of the Theater Air Force. In CONUS, there are several MAJCOM
NOSCs, all reporting to the USAF NOSC at Barksdale Air Force Base. However, the critical
MAJCOM NOSC in CONUS is the Air Combat Command NOSC supporting US Northern
Command.
Figure 9: US Air Force NetOps Forces
34
4.2.2.2 Functional Combatant Commands
FCCs have a global mission, often providing support to the GCCs, and, as such, have a global
requirement for NetOps support. Some FCCs operate their own specific functional global
networks (e.g., SCAMPI, Joint National Training Capability, Global Transportation Network,
Ballistic Missile Defense). As such, the FCCs will receive direct support from the GNSC and
general support from USSTRATCOM, JTF-GNO, and all TNCs. FCCs will exercise OPCON
over their portions of the GIG through their GNCC, which will coordinate the FCC’s NetOps
requirements with the GNSC and the TNCCs.
4.2.2.2.1
Global NetOps Control Center
The primary mission of a GNCC is to advise the FCC and ensure the portion of the GIG
resources supporting that Commander’s assigned missions and operations are optimized. To be
effective, each GNCC must remain cognizant of all current, future, or contemplated operations in
which their portions of the GIG will play a role.
The GNCCs monitor the COCOM’s GIG assets, determine operational impact of major
degradations and outages, and coordinate responses to degradations and outages that affect joint
operations. Each GNCC will coordinate with the GNC and supporting TNC any mission or
operational impacts that are associated with system/network anomalies or resource limitations.
Additionally, the GNCC has DIRLAUTH with the TNCCs. This authorization gives the GNCCs
and TNCCs the ability to directly coordinate scheduled changes in the GIG or troubleshoot
outages. The GNCC collaborates with the NetOps COI to ensure effective operation and defense
of the GIG.
4.2.2.3 Sub-Unified
COCOMs may organize a Sub-Unified Command and assign tailored forces from among the
four Service components and Special Operations Forces (SOF) to the Sub-Unified Commander.
The COCOM assigns the Sub-Unified Commander OPCON of designated forces.
Sub-Unified Commands may establish Sub-Unified NetOps Control Centers (XNCCs) with
responsibilities and relationships similar to a STNOSC. The Sub-Unified Command’s NOSC
will serve as a single point of contact for their subordinate elements for systems, network
services, and reporting.
4.2.2.3.1
Sub-Unified NetOps Control Center
XNCCs will provide GIG visibility and status information to the GCC’s TNCC and TNC to
facilitate end-to-end management and maintain accuracy of the NetOps SA view.
XNCCs will:
• Exercise routine, day-to-day management and control of those system and network services
provided as part of the GIG.
• Collaborate with the NetOps COI to ensure effective operation and defense of the GIG.
• Comply with GIG SA (visibility and status) reporting requirements for that portion of the
GIG as determined by the COCOM.
35
• Provide the GCC’s TNCC and TNC current (near real-time) SA of systems and networks
under their control and within their portion of the GIG.
• Provide the TNCC with mission impact assessments of system and network events.
4.2.2.4 Joint Task Force
The JTF Commander shall exercise OPCON of the joint force systems and networks through a
JNCC as detailed in Chairman, Joint Chiefs of Staff Manual (CJCSM) 6231.01 and CJCSM
6231.07.
CJCSM 6231.07 details the responsibilities of the JTF Commander and the JNCC with respect to
NetOps. This CONOPS may duplicate portions of CJCSM 6231.07, in the interest of
completeness.
4.2.2.4.1
Joint NetOps Control Center
The JNCC manages the tactical communications of the joint force, serving as the NOSC for the
deployed portion of the GIG supporting a JTF. It exercises staff supervision over C4 NSCs
belonging to deployed components and subordinate commands.
The JNCC provides the GCC’s TNCC and TNC with:
•
•
•
•
Deployed network SA information.
Mission impact assessments of system and network events.
GIG requirements beyond the JTF’s current assets or authority.
Collaboratation with the NetOps COI to ensure effective operation and defense of the GIG.
4.2.3 Defense Agencies
The Defense Agencies provide, operate, and maintain a large portion of the equipment,
personnel, and other resources that make up the GIG. Execution of these functions requires the
Agencies to be actively engaged in NetOps of the GIG. To execute these functions, most
Agencies have established NOSCs which maintain SA of their portions of the GIG. In this
CONOPS these organizations are called Agency Global NOSCs (AGNOSC). These AGNOSCs
serve as a central point of contact for matters concerning the resources they provide to the GIG.
DoD Agencies will align their AGNOSCs to provide USSTRATCOM visibility and insight of
their GIG status and will follow the orders and directives issued by JTF-GNO. Agencies will
maintain a global perspective of their GIG assets and provide Agency specific support to the
Global NetOps mission. This Global SA is necessary for the Agency to properly provide the
equipment, personnel, and other resources they contribute to the GIG.
4.2.3.1 DoD Agency Theater Network Operations and Security Centers
DoD Agencies supporting a COCOM may establish ATNOSCs based on the size and topology
of their NetOps responsibilities to provide and manage systems and network services. The
ATNOSC will serve as a single point of contact for their theater elements for systems and
network services, NetOps capabilities, and operational reporting. The ATNOSC will provide
GIG SA information to the TNC and the TNCC. To facilitate end-to-end management and
maintain the accuracy of the GIG SA information/view, each ATNOSC will:
36
• Exercise routine, day-to-day management, control, and defense of system and network
•
•
•
•
•
•
•
services provided as part of the GIG.
Collaborate with the NetOps COI to ensure effective operation and defense of the GIG.
Comply with GIG SA (visibility and status) reporting requirements for their portion of the
GIG as determined by the COCOM.
Provide GIG SA information specifically from the TNC POPs to the Component’s deployed
forces.
Provide the TNCC / GNCC and TNC current (near real-time) SA of systems and networks
under their control and within their portion of the GIG for retrieval and use by other NetOps
centers IAW this CONOPS.
Assist the TNC and the TNCC / GNCC in tracking the status of NetOps events and
determining the technical and operational mission impacts caused by NetOps events.
Respond to a variety of threats using a range of response measures to preclude, detect, or
counter any threat.
Exercise TACON over the system and network resources of their assigned NOSCs, NSCs,
and Systems Administrators.
4.2.3.2 DoD Agency Global Network Operations and Security Center
The DoD Agencies that are not part of the IC operate enterprise-wide systems as part of the GIG.
These systems provide critical support to the DoD, COCOMs, and Military Services.
Maintaining SA of these systems is key to operating and securing the GIG.
Non-IC DoD Agencies will designate an Agency Global Network Operations and Security
Center (AGNOSC) or other agency organization to execute global network operations and
defense actions for their agency, under the direction of CDRUSSTRATCOM.
Responsibilities of DoD AGNOSCs include:
•
•
•
•
•
•
•
•
•
Ensure implementation of approved DoD policies and procedures for NetOps.
Collaborate with the NetOps COI to ensure effective operation and defense of the GIG.
Provide near-real time global SA of Agency networks and systems to JTF-GNO.
Coordinate, execute and/or direct support troubleshooting and restoral actions for Agency
networks and systems.
Implement policy and operational measures to ensure near real time, worldwide defense for
the agency’s portion of the GIG.
Report status of Agency worldwide terrestrial, space and wireless transmission systems,
enterprise services, and facilities.
Maintain DIRLAUTH with other SGNOSCs and AGNOSCs.
Establish, in coordination with USSTRATCOM, procedures for disseminating GND and
related advisories, alerts, and warning notices.
Monitor Agency compliance with issued IAVAs and INFOCON changes.
37
4.2.3.2.1
Defense Information Systems Agency
DISA performs significant NetOps support functions. Under the direction of
CDRUSSTRATCOM, DISA manages operational control over information services, IT
environments, and computing processing centers for all DoD Components. DISA will:
• Ensure visibility of the GIG DISN, DISA computing services, and DISA applications to
•
•
•
•
•
•
•
•
•
provide status and performance and infrastructure data for the NetOps SA view.
Collaborate with the NetOps COI to ensure effective operation and defense of the GIG.
Establish, develop, and implement the NetOps SA technical backbone under the guidance of
CDRUSSTRATCOM.
Coordinate with the Heads of the DoD Components to establish NetOps in their GIG
architectures and IT standards.
Act as the DoD single point of contact for the GIG and DoD IT standards development
(including information processing and information transfer).
Collect, evaluate, and share NetOps-relevant, GIG metrics and performance measurements
following the guidance of CDRUSSTRATCOM.
Exercise operational authority for NetOps in support of USSTRATCOM operations.
Manage and monitor NetOps operational control of the IT environment and computing
processing centers following the guidance of CDRUSSTRATCOM.
Staff and train TNC personnel to operate TNC facilities in accordance with USSTRATCOM
policy and directives.
Support CDRUSSTRATCOM, identification and tracking of activities that affect security
and performance to include real-time alerts and warnings for anomalies and real-time
response to detected attack activities.
4.2.4 Interagency
One of the key elements in future NCOW is integrating U.S. military relationships with
interagency, coalition, multinational, and NGO actors over the course of an operation.
USNORTHCOM has a large, new role involving multinational, NGO, interagency, and
intergovernmental partnerships and relationships. This integration will require cooperation,
coordination, and synchronization among the U.S. military components and their partners. As
their interactions will be dictated by a combination of policy and capability, they may have both
significant positive and negative impacts on the agility of the organizations and processes
supporting C2 and the behavior of the mission network overall.17
Joint C2 will need to provide a mechanism for organizations, regardless of location, level, or
function, to rapidly integrate physically or virtually. To do this, joint teams that regularly train
together and have a foundation of common TTPs must be created. C2 processes will need to be
developed that allow for multiple players, distributed globally, to form communities of interest
as necessary, and to manipulate information based on their individual and collective
requirements.
17
Joint Command and Control Functional Concept, February 2004, p. 32.
38
The NetOps COI must be able to rapidly link the GIG to other organizations as required to share
information. We must develop NetOps TTPs that allow commanders to connect the GIG to other
organization’s networks in an interoperable yet secure manner. The NetOps COI must be
prepared to work with the following types of organizations:
•
•
•
•
•
•
Non-DoD USG Organizations
Intergovernmental Organizations
Nongovernmental Organizations
Multinational Military Commands (Alliances and Coalitions)
State and Local Governments
Commercial and Research Communities
4.2.4.1 Director of National Intelligence
The DNI, through the Intelligence Community-Chief Information Officer (IC-CIO), will develop
joint procedures with the DoD CIO for NetOps and status information sharing of the IC
Networks.18 The IC-CIO oversees the Intelligence Community-Incident Response Center (ICIRC). The IC-IRC is the IC’s single focal point for IC network incident reporting and
management and represents the IC in the NetOps COI.
4.2.4.1.1
Intelligence Community Incident Response Center
JTF-GNO will collaborate with the IC-IRC, a key interagency organization. The IC-IRC is the
IC’s single focal point for IC network incident reporting and management. As per the SECDEF
Memorandum, June 18, 2004, activities involving IC networks, specifically SCI networks, will
be coordinated in accordance with joint procedures approved by the SECDEF and the DNI. Due
to the close inter-dependencies that DoD and IC components have on each other’s networks, it is
essential that reporting procedures be in place to ensure rapid coordination and defense of DoD
and IC networks.
4.2.4.1.2
National Security Agency
NSA performs significant NetOps support functions. NSA provides IA products, solutions, and
services, as well as the operational attack sensing and warning (AS&W) mission NSA executes
in support of defending the GIG. NSA will:
• Serve as the National Manager responsible to the Secretary of Defense for the security of
telecommunications and information systems that are defined as NSS per 44 U.S.C.
• As National Manager, operate and maintain the National Security Incident Response Center
that serves as the coordination point for all National Security Incidents.
• Responsible for Communications Security (COMSEC), specifically, IA in general and CND
in accordance with NSD–42, DoDD C-5200.5, 8500.1 and 8530.
• Ensure availability of IA products and technology.
18
Secretary of Defense Memorandum, “Assignment and Delegation of Authority to Director, Defense Information
Systems Agency (DISA), 18 Jun 2004.
39
• Continual monitoring of DoD and its contractor’s telecommunications and developing all•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
source assessments of adversarial threat.
Establish business processes for identifying and acquiring approved IA technology.
Review the budgets, and resource allocation for IA activities of the DoD.
Conduct research and development activities to generate IA techniques and solutions.
Develop the IA technical framework.
Plan and manage the DoD PKI.
Provide layered protection for DoD cryptologic SCI systems.
Certify and Support CND Services for Special Enclaves.
Coordinate the design development and maintenance of Special Enclave information systems
and databases.
Provide network AS&W support to DoD component.
Provide tailored, all-source, current and long-term analysis addressing the threat of intrusions
into the GIG.
Collaborate with the NetOps COI in the effective operation and defense of the GIG.
Provide network AS&W support to JTF-GNO and USSTRATCOM.
Develop architectural standards, policy, and information systems security engineering (ISSE)
guidance, IA products, Defensive Information Operations (DIO) services, and key
management products and services.
Provide GIG SA of the NSA/CSS secure communications network and external GIG
connectivity points to IC-IRC.
Provide analytical and operational support for any CND RA being evaluated.
Develop the Information Assurance components of the GIG architecture at the direction of
ASD-NII.
Provide Signals Intelligence relevant to Indications and Warning on Foreign Threats to the
GIG and on capabilities and intentions of potential adversaries.
4.2.4.1.3
The Defense Intelligence Agency
The Defense Intelligence Agency (DIA) performs significant NetOps functions. DIA will:
• Be responsible for developing, implementing, and managing the configuration of
•
•
•
•
information, data, and communications standards for intelligence systems, in coordination
with the Joint Staff, Services, other agencies, and OSD.
Establish defense-wide intelligence priorities for attaining interoperability between tactical,
theater, and national intelligence related systems and between intelligence related systems
and tactical, theater, and national elements of the GIG.
Exercise operational management of JWICS via the JWICS Network Operations Center.
Provide required reports to the IC IRC as defined in paragraph 4.2.4.1.1.
Provide GIG situational awareness of the JWICS and external GIG connectivity points to
JTF-GNO.
40
• Assign IP addresses for DoD SCI users. DIA shall coordinate IP address assignments with
DISA to preclude establishing duplicate IP addresses.
4.2.4.2 National Communications System
The National Communications System (NCS) coordinates National Security/Emergency
Preparedness communications for the Federal Government as well as the Communication
Emergency Support Function under the National Response Plan. The National Coordinating
Center (NCC) within the NCS serves as the Information Sharing and Analysis Center (ISAC) for
the telecommunications industry. As such, the NCS/NCC functions as an important link for the
JTF-GNO and USNORTHCOM with the telecommunications industry. This link can be
exploited to assist in commercial circuit restoration. Additionally, the NCS provides the JTFGNO access to all Federal Government Priority communications systems including the
Government Emergency Telecommunications Service (GETS), the Wireless Priority System
(WPS) and the Telecommunications Service Priority (TSP) system. The NCS, as the lead for the
National CIP Telecommunications Sector, can also assist on critical infrastructure analysis of the
commercial telecommunications assets upon which the DoD depends.
4.3
NetOps C2 Structure
4.3.1 Global NetOps C2
Figure 10 graphically portrays the C2 relationships for Global NetOps. CDRUSSTRATCOM is
the Supported Commander for Global NetOps. The other COCOMs are Supporting
Commanders to USSTRATCOM for Global NetOps.
This relationship gives
CDRUSSTRATCOM the authority to direct the CC/S/As to take action to ensure the availability
and integrity of the GIG. While this Supported relationship gives CDRUSSTRATCOM global
authority, it does not take away the COCOM’s authority over their assigned NetOps forces. For
Global NetOps issues, USSTRATCOM will issue orders and alerts through JTF-GNO to the
CC/S/A. COCOMs will direct compliance with these directives using their inherent authority
over their AOR. This construct will allow USSTRATCOM to exercise its global authority while
strengthening the responsibilities of the other COCOMs. The TNCs fall under the OPCON of
JTF-GNO for Global NetOps issues. This will allow the JTF-GNO to immediately direct action
by the TNCs when necessary to protect the GIG. JTF-GNO will ensure that the Combatant
Commanders are informed about all Global NetOps issues. However, on occasions when
immediate responses are necessary, the Combatant Commanders will be notified concurrently as
the response actions are being made. This OPCON relationship gives JTF-GNO the authority to
issue immediate directives when necessary. However, the TNCs will provide direct support to
the TNCCs and general support to the GNCCs in executing JTF-GNO Global NetOps directives.
JTF-GNO will exercise OPCON of Service NetOps units, to include NOSCs and CERTs, as
assigned by CDRUSSTRATCOM. Defense agencies will follow the NetOps orders and
directives issued by USSTRATCOM and JTF-GNO. Service and Agency Systems Management
Centers (SMC) and Central Design Authorities (CDA) are in general support of JTF-GNO
ensuring that the systems they operate or provide as parts of the GIG are compliant with JTFGNO guidance.
41
Figure 10: Global NetOps C2
42
4.3.2 Theater NetOps C2
Figure 11 graphically portrays the C2 relationships for Theater NetOps. GCCs are the Supported
Commander for Theater NetOps. GCCs have the authority to direct efforts and actions that
affect the portions of the GIG in their AORs. The GCC exercises OPCON of all assigned
NetOps forces and GIG assets in their theater. The USSTRATCOM TNC is under the TACON
of the GCC for Theater NetOps issues. The GCC TNCC is responsible for the operation of the
GIG assets in their theater and issues directives to the TNC and Component NetOps
organizations to ensure that the GIG assets in their theater supports the theater mission.
USSTRATCOM and JTF-GNO are in support of the GCC and ensure that the GIG is capable of
supporting the GCC’s requirements. When there are conflicts or resource contention between
COCOMs’ requirements, JTF-GNO will de-conflict resource requirements. Competing resource
requirements that cannot be resolved will be forwarded through CDRUSSTRATCOM to the
CJCS for adjudication. The Services and Agencies may establish theater-level NOSCs or provide
24x7 theater level responsiveness to GCC direction, requests for information, and SA. Either the
global or theater NOSC will provide theater GIG visibility to the TNC and other DoD
Component NOSCs as required. This Service/Agency NOSC will also serve as a central point of
contact for operational matters and emergency provisioning for a supported COCOM. This will
enable improved GIG SA at all levels of the command structure and facilitate end-to-end GIG
management.
Figure 11: Theater NetOps C2
43
5
Collaborative NetOps C2 Process
“The source of flexibility is the synergy of the core competencies of the individual Services,
integrated into the joint team.”
~ Joint Vision 2020
5.1
Overview
C2 is the ability to recognize what needs to be done in a situation and to ensure that effective
actions are taken to achieve the desired effect with minimum adverse impact. At its core, C2 is
about decision-making and the individuals who make decisions. NetOps C2 must be a joint
decision-making process that is dynamic, decentralized, distributed, and highly adaptive.
Enabled by a robust, secure, integrated network, and through the employment of CIEs, the
NetOps COI will possess a seamless C2 capability. Supported by skilled personnel trained in
joint NetOps and standardized NetOps TTPs, the NetOps COI will be able to create desired GIG
effects at the right time and place to accomplish the mission.
As discussed in the Joint Command and Control Functional Concept, the Joint C2 process is
envisioned as the way that net-centric forces will execute C2. The Joint C2 approach applies to
all echelons of command, across all military functions, and encompasses the full range of
military operations. It consists of a combination of both the basic C2 and the collaborative C2
processes. The basic C2 process is the systematic and continuous process that commanders
perform in order to recognize what needs to be done and to ensure appropriate actions are taken.
Collaboration is defined as joint problem solving for the purpose of achieving shared
understanding, making a decision, or creating a product. In the context of Joint C2, collaboration
is enabled by the CIE and is used to coordinate, accelerate, and ground in an expanded
information resource base, the development of decisions and actions across multiple basic C2
process loops.
As a net-centric operation, the Joint C2 and Net-Centric Environment Joint Functional Concepts
as well as joint doctrine19guide the design of the NetOps C2 process that is described in this
CONOPS. The NetOps C2 process will allow the NetOps COI, an extremely diverse and
dispersed community, to interact with directness, informality, and flexibility typical of small
cohesive teams. It will allow the NetOps COI to rapidly adjust its C2 system to the situation at
hand rather than rely on “one size fits all” procedures. And it will allow the NetOps COI to
exploit the benefits of decentralization – initiative, adaptability, and tempo – without sacrificing
coordination and unity of command.
As the COCOM responsible for Global NetOps, CDRUSSTRATCOM influences NetOps
outcomes by:
• Defining the commander’s intent
• Designating the priority effort(s)
19
JP 0-2 Unified Action Armed Forces, 10 Jul 2001, pp. III-14 thru III-17.
44
•
•
•
•
•
Prioritizing and allocating resources
Assessing risks
Deciding when and how to make adjustments
Committing reserves
Staying attuned to the needs of the NetOps COI
Within CDRUSSTRATCOM’s intent, commanders at all levels make similar NetOps decisions
to ensure that the GIG supports their mission requirements.
5.2
NetOps C2 Process
NetOps C2 processes will be performed collaboratively to improve the speed and quality of the
individual decisions and allow for the rapid and continuous synchronization of multiple decisions
to achieve unity of effort for the GIG. Commanders will rapidly tailor their C2 capabilities to
any situation and will be able to exploit the benefits of decentralization—initiative, adaptability,
and tempo—and achieve flexible synchronization of NetOps without sacrificing unity of
command. This will be achieved through a CIE that enables cohesive teams, regardless of
location, to develop a shared understanding of the commander’s intent and the status of the GIG,
thereby enabling superior NetOps decision-making.
5.2.1 The Basic NetOps C2 Process and Its Component Functions
The basic NetOps C2 process is the systematic execution of the functions that an individual
commander is required to perform in order to recognize what needs to be done and to ensure that
the GIG operates effectively. Each commander, regardless of echelon or function, performs the
same basic NetOps C2 process20 (see Figure 13).
The basic C2 functions are listed below.
•
•
•
•
•
•
Monitor and collect data on the GIG.
Develop an understanding of the status of the GIG.
Develop a course(s) of action and select one.
Develop a plan to execute the selected course of action.
Execute the plan, to include providing direction and leadership to subordinates.
Monitor execution of the plan and adapt as necessary.
20
Boyd, John, COL (ret). Patterns of Conflict. Briefing on competitive organizations; December 1986. The ObserveOrient-Decide-Act model of C2 (OODA Loop) captures the continuous and cyclical nature of C2 and illustrates the
basic process. Though Boyd’s model is intended to deal with decision making by individuals and groups, it is only
being referenced here to the decision making by individuals.
45
Develop and
Select a
Course of
Action
Develop a
Plan
Develop an
Understanding
Of the Situation
Execute
the Plan
Monitor
Execution and
Adapt as
Necessary
Monitor and
Collect Data
Figure 12: The Basic C2 Functions and Process
5.2.1.1 Monitor and collect data on the situation
The ultimate objective of this step in the NetOps C2 process is to discover unresolved NetOps
Events and the detrimental effect they have on the network. These events could be anything from
a very short network outage that corrects itself to a large catastrophic outage. Events range in
severity from small probes of our networks to full scale network attacks. Detecting a NetOps
Event is often done using automated monitoring systems. But network users or administrators
noticing unusual behavior of the network also detect NetOps Events.
Knowing that networks are experiencing unresolved NetOps Events, requires alert system
administrators and network managers with properly configured network monitoring and intrusion
detection software. This is in many respects the most important aspect of Network Operations
because “you don’t know what you don’t know.” The majority of the effort of organizations that
monitor the networks is spent looking for unresolved NetOps Events. This phase of the NetOps
C2 Process requires great diligence and attention to detail. If network-monitoring personnel do
not pay close attention to their monitoring systems and user complaints, NetOps Events can go
unnoticed and can significantly degrade the performance of the GIG.
5.2.1.2 Develop an understanding of the situation
Once a NetOps Event is identified, the next step is to determine the nature, extent, severity, and
impact for the purpose of characterizing, informing, and responding. In general, the objective of
this step is to answer the following questions.
• What is the nature of the NetOps Event?
• What is the impact to the GIG?
• Who or what is causing the problem and why?
46
• What is the impact on current and planned operations?
Of these four questions, determining the Operational Impact is by far the most important. For
example, a large, technically complex, network outage that has no Operational Impact is much
less significant than a small, simple outage that has a significant Operational Impact.
Determining the Operational Impact of a NetOps Event is the critical result of this stage of the
C2 Process, requiring knowledge of the networks and systems associated and the users affected.
Additionally, determining the Operational Impact must not preclude timely notification of a
NetOps Event.
When a NetOps Event has been identified and an initial assessment is complete, the identifying
organization is responsible for expeditiously informing higher, lower and lateral organizations.
Some NetOps Events are so critical that they require real-time information required to alert,
mitigate or respond to the potential damage caused. Other NetOps Events are less critical and
can be reported using less timely means. It is imperative that network operators are aware of the
reporting requirements and methods for each type of NetOps Event and rapidly inform the
higher, lower and lateral organizations. Also of key importance here, is informing the affected
organization(s) as soon as possible.
5.2.1.3 Develop a course(s) of action and select one & Develop a plan to execute the selected
course of action
Once the commander gains an understanding of the NetOps Event, the commander decides on a
course of action. Deciding on a course of action in structured or analytic decision-making
consists of developing several alternatives, assessing the alternatives and then selecting the best
one. 21 In the case of well-understood or rapidly unfolding situations, the decision is made
quickly, with little consideration of developing or assessing alternative courses, in a more
intuitive decision-making style.
These two steps of the NetOps C2 Process are often conducted simultaneously and consist of
developing response options and COA, as well as coordination of those decisions to halt and/or
mitigate the effects of the NetOps Event on the GIG.
The objective of this phase is to determine those actions that will defeat intrusions and/or
mitigate the effects. This phase includes:
• Identification of response options.
• Development of COA based on one or more response options.
• Coordination with the GNC, TNC, TNCC/GNCC, NOSC and other organizations.
5.2.1.4 Execute the plan, to include providing direction and leadership to subordinates
Once the decision is made, the commander puts the decision into action or instructs others to act
in support of the chosen course of action and exercises leadership to motivate others in executing
the decision. This step includes:
21
A course of action may seek to manipulate the adversary’s level of uncertainty and understanding of the operating
environment.
47
• Issuing appropriate orders and direction to the NetOps COI.
• Execution of the selected COA.
5.2.1.5 Monitor execution of the plan and adapt as necessary
Monitoring the execution of the plan allows the commander to observe the results of the
decisions and to adapt as the process starts again.
As this Operational Process is cyclical, it may often take several iterations of the cycle to fully
resolve the NetOps Event. For significant NetOps Events, this continuous cycle could span days
or weeks until the event is resolved.
This process is very generic, but it outlines the general technique for responding to any type of
NetOps Event. However, each NetOps Event will be different and will require attentive
personnel in each NetOps organization that can quickly recognize the unique characteristics of
each event.
5.3
Collaboration
Collaboration is joint problem solving for the purpose of achieving shared understanding,
making a decision or creating a product. It allows experts to integrate their perspectives to better
interpret situations and problems, identify candidate actions, formulate evaluation criteria, and
decide what to do. In the context of NetOps C2, collaboration is used to coordinate the
development of decisions and actions across multiple basic NetOps C2 process loops.
Commanders need to be able to share their observations, understanding, decisions and actions
regarding a situation with other commanders. Collaborating allows commanders to get better
GIG SA, a deeper understanding of the GIG environment, to better comprehend how their
decisions will effect the GIG environment and to coordinate their limited resources with others to
achieve maximum effect in the pursuit of mission success. Collaboration is enabled through a
CIE.
5.3.1 Collaborative C2 Functions
The collaborative C2 functions tie together the basic C2 process loops across echelons and
functions through collaboration. The collaborative C2 functions give the C2 system its agility
and give the commander flexibility in choosing a command methodology.22 They support the
basic C2 functions by providing the commander with access to the observations, understandings,
decisions, and actions of other friendly force commanders. They help a large dispersed group
that is governed by explicit rules and procedures to behave more like a small close group whose
relationships are implicit and informal. The collaborative C2 functions allow teams, such as the
NetOps COI, to be formed quickly from across the echelons and functions to work on specific
issues. They support the decentralization of C2, which increases the initiative, adaptability and
22
Three command methodologies are postulated in Thomas J. Czerwinski, “Command and Control at the
Crossroads,” Parameters, Autumn, 1996, pp. 121-132. The three principle methodologies are command by direction,
command by plan and command by influence. They prescribe an increasing level of decentralization in the
command structure with command by direction having the most centralized structure and command by influence
having the most decentralized.
48
tempo of operations without losing synchronization with other friendly forces. The collaborative
C2 functions enable the commander to maintain unity of effort and unity of command. They
include:
• Networking: Networking is the connecting together of all the decision-makers across
•
•
•
•
•
•
23
echelons and functions. Networking is enabled by a communications and data infrastructure
employing a robust set of standards that facilitate the exchange of information. It also
facilitates the interaction across echelons and functions.
Interacting: Interacting is the social part of networking and is the heart of collaboration.
Interacting is facilitated by the development of cohesive teams using collaborative
information tools to exchange information across a network that spans echelons and
functions. Interacting supports the development of trust and the art of command.
Sharing information: Sharing information makes information available and accessible to
commanders. It assures that all commanders are operating from the same baseline of
information.23 Sharing information improves the quality of awareness and understanding.
Sharing awareness: Sharing awareness is sharing an initial understanding of the operational
environment such as the current status of the GIG and the current operational impact
assessment. Sharing awareness improves commanders’ understanding because each of them
is working from the same basic information about the GIG.
Sharing understanding (including sharing commander’s intent): Sharing understanding is a
deeper understanding of the GIG framed by the experience and intuition of commanders
across echelons and functions. Sharing understanding allows subordinate decision-makers to
understand how higher echelons are viewing the overall situation and that allows the
subordinates to make better decisions and to better coordinate their actions with others.
Sharing understanding and the commander’s intent allows subordinate commanders to
undertake initiative that is in line with the higher echelons view of the situation. Sharing
understanding allows NetOps C2 to be more decentralized and more responsive to small but
important changes in the operational environment. It improves the overall speed and quality
of decisions.
Deciding: Decisions made in a collaborative environment are those made by multiple
decision-makers working together. This is not decision by committee; it does not require a
consensus. It gives each commander an understanding of the decisions being made by others
in pursuit of the mission goals. By making decisions based on the explicit decisions of others,
commanders can make more effective use of their forces because there is less likelihood of
their working at cross purposes.
Synchronizing: Synchronizing arranges NetOps actions in time, space, and purpose to
produce maximum GIG effectiveness. It brings the actions of the NetOps COI as a whole
into line with the commander’s intent in order to accomplish the NetOps objectives.
Synchronizing allows the commander to make maximum use of the limited resources
available by coordinating their timing and actions. It helps commanders build and maintain
unity of effort across operations that have a diverse set of actors with a range of capabilities.
Overall access will be guided by established information security policies.
49
Sharing
Understanding
Deciding
Interacting
Sharing
Awareness
Synchronizing
Sharing
Information
Networking
Info Sources
Operating Environment
Forces
Collaborative C2 Process Chain
Figure 13: Collaborative C2 Process
Each of the collaborative NetOps C2 functions builds on the volume and quality of interaction
among commanders moving through their basic C2 process loop. Commanders who interact
frequently and meaningfully throughout the basic C2 process loops are able to make consistently
better decisions than those who interact less frequently. The collaborative C2 process chain in
Figure 14 shows the value added relationship among the collaborative C2 functions.
5.4
Linking the Basic and Collaborative NetOps C2 Processes
The collaborative NetOps C2 process improves the execution of the basic NetOps C2 process,
both in terms of quality and speed, by providing the individual commander with access to the
information and understandings of other commanders involved with the same mission. By
sharing information, SA and understanding, individual commanders are able to improve their
ability to monitor and collect data on the GIG because they have access to the collection
capabilities of other units. The individual commander is able to develop a more thorough
understanding of the situation by being able to tap into the experience and perspectives of other
individual commanders. COA, the selection of a course of action and the development of plans
to execute the course of action can be developed and executed with the collective knowledge of
the decisions and plans of others. This allows commanders to choose among command by
direction, plan or influence. All commanders, with an understanding of the assumptions and
information available, can monitor the execution of the plan when the course of action was
developed and selected. This allows them to better adapt their future decisions to the dynamics of
the NetOps environment. Figure 14 depicts the relationship between the basic and collaborative
C2 processes. Networking, sharing information and interacting are in the center of the diagram
because they are the respective technical, organizational and cognitive (social) functions that
provide the interconnection between sharing awareness, sharing understanding, deciding, and
synchronizing.
50
Figure 14: Linking the Basic and Collaborative C2 Processes
5.5
NetOps Shared Situational Awareness
5.5.1 Overview
Because of the increasing diversity and scope of organizations and forces involved in NetOps,
the interactions between them become more complicated, requiring new and more capable
collaborative efforts. It is within this area that individuals develop SA and share this awareness
with other entities to produce a shared awareness. This leads to improved understanding at the
individual level and to improved shared understanding. This process enables the creation of
faster, higher quality decisions both individually and collaboratively, as the situation requires.24
5.5.2 NetOps Situational Awareness Capability
An essential enabling capability of NetOps is achieving shared SA of GIG system, network,
information availability, and identification of resources use. The primary purpose is to enhance
knowledge of the GIG to improve the quality and timeliness of collaborative decision-making
regarding the employment, protection and defense of the GIG. To be useful, much of this GIG
SA must be available and shared in near real-time by the relevant decision-makers. This will be
accomplished in phases through initiatives like establishing reporting criteria, consolidation of
reporting mechanisms, providing operational impact assessments, and integrating manual/semiautomated mechanisms with real-time network and system reporting solutions.
This shared GIG SA will be derived from common reporting procedures and requirements using
enterprise-wide management tools. These tools will collect (or receive), analyze and fuse GEM,
GND and IDM/CS data in near real-time to produce user-defined views of the mission critical
24
Net-Centric Environment Joint Functional Concept, Version 0.9, 8 November 2004, p. 21.
51
GIG information of concern to a commander or NetOps center. The GIG SA capability will
display system, network and information resources, showing their operational status and linkages
to other resources. GIG SA reporting standards will be established and employed to facilitate the
timely sharing of data and consistency of data meaning across the GIG. The specific GIG SA
reporting standards, including timelines and content, will be coordinated with all CC/S/A prior to
implementation. Data collection and dissemination will be automated as much as possible to
reduce human workload and meet reporting timelines.
Network sensors will provide unprocessed data to enterprise data storage, referenced via the
meta-data catalogue, to support SA of the enterprise to those organizations conducting NetOps at
the global, theater, and enclave levels. This aligns with OSD(NII) meta-data strategies and the
net-centric concepts of using raw data into a storage process that is referenced (searched) via that
meta-data tagging. NetOps Centers (e.g. JTF-GNO, TNCCs) establish their access profiles and
gain the sensor data according to that access profile.
SINGLE INTEGRATED NETWORK
SITUATIONAL AWARENESS VIEW
FILTERED & FUSED,
OVERLAYS
Fault Management
- Alarm Surveillance
- Fault Correction
- Fault Localization
- Test Management
- Trouble Administration
NAVFOR
System and Network
Performance Management
- Traffic Measurement
- Mean Delay Time
- Probability of Congestion
- Quality of Service
ARFOR
- Response Time
- Probability of Delay
- Throughput
- Availability
AFFOR
- Event Type
- Affected Systems
- Source of Attack
- Corrective Action
MARFOR
TNC/GNC
IA Event Management
IC
Coalition
Figure 15: GIG SA Reporting Flow
CC/S/A, JTFs, and NetOps Centers will use the GIG SA capability to rapidly provide
information on systems and networks to military leadership at all levels, as well as other
supporting commands and agencies. CC/S/A, JTF and NetOps Centers will collaboratively use
the information from the GIG SA capability to rapidly make decisions on operating the GIG. A
key tool for commanders in planning and executing joint operations, the GIG SA capability
enhances the flow of information between the senior military leadership, JS, and Commanders
by supplementing and amplifying Situation Reports (SITREP), Operations Reports (OPREP),
Communications Spot Reports (COMSPOT), Communications Status (COMSTAT) reports,
IAVAs, and network trouble ticketing systems. It will present a “fused” picture of GEM, GND,
and IDM/CS postures, including the “health and status” of the GIG, to allow key decision
makers to better understand their system configurations and their information sharing capabilities
52
in relationship to operational needs at the strategic, operational, and tactical levels. The GIG SA
capability will extend from the NMCC to deployed forces supporting a Joint, Combined, or
Single-Service task force. It will extend through the DoD operational construct to include
information on system and network services at base/post/camp/station and mobile platforms.
This will include visibility of IC and outsourced systems and networks provided by contractors,
such as the Navy/Marine Corps Intranet (NMCI).
The sharing of GIG SA between DoD and the IC was directed in the SECDEF June 18, 2004
memorandum25. This can only be accomplished through a collaborative effort amongst the
CC/S/A, JTFs, and the IC to collect and share information regarding the health and status of their
portions of the GIG.
5.5.3 NetOps Situational Awareness Content
GIG SA is the integrated capability to receive, correlate, and display a functional or Theaterlevel view of systems and networks (voice, video and data). As depicted in Figure 15, it will
reflect status, performance, and IA data. The GIG SA capability will include overlays and
projections (i.e., location of friendly, hostile, and neutral units, assets, and reference points). At
a minimum, it will include system and network fault and performance status as well as
significant information assurance reports such as, network intrusions or attacks. Appropriate
IDM/CS information will be added as this capability is developed. Integrated into the GIG SA
will be the ability to accurately assess the operational impact with NetOps events.
The GIG SA capability will graphically display GIG system and network services, key nodes and
links/circuits, and, health and status information. By integrating the GEM, GND, and IDM/CS
status information, network operators will have a single source for displaying and analyzing
network congestion, outages, GND probes, attacks or defensive posture, system information
including software applications, as well as information accessibility. It will provide the
capability to filter, tailor, and present relevant views of GIG operations at any level of command.
Content will be easily and quickly altered to reflect changing interests and adapted to changing
operational requirements.
Integrated into the GIG SA will be the ability to quickly and accurately assess the operational
impact with NetOps events. The GIG SA capability will display a view of which GIG resources
are supporting which mission allowing a quick determination of the operational impact of any
GIG disruption.
5.5.4 NetOps Situational Awareness Responsibilities
GIG SA and capability restoration will require proactive management by the operational staffs
and will require the same approach as is now required by normal high-level and detailed network
planning. As a start, through a collaborative effort between the CC/S/A, JTFs, and NetOps
Centers, listings of mission critical system and network services/resources/assets, and critical
customers (decision-makers) will be established, and restoration priorities will be applied to all
25
Secretary of Defense Memorandum, “Assignment and Delegation of Authority to Director, Defense Information
Systems Agency (DISA), 18 Jun 2004.
53
items listed. A collaborative effort must also identify the concept for knowing when resources
are actively being used or plan to be used by a COCOM.
At a minimum, for all GIG system and network services/resources/assets, this requires an
accurate inventory; FCAPS status information; data/information exchange requirements;
information assurance conditions (including standardized alert thresholds); and appropriate
IDM/CS information. The GIG SA software capability will be the instrument that commanders
employ to this end.
Responsibilities for building and maintaining GIG SA are described in the following sections.
5.5.4.1 Combatant Commander Responsibilities
The COCOMs, through the supporting role of the TNC and GNSC, exercise operational control
over their portions of the GIG SA information resources (data stores, databases, graphical views,
etc.). The COCOM establishes priorities for information collection, filtering, display,
dissemination, etc. Consistent with these priorities, the COCOM will follow ASD(NII) guidance
regarding the release of GIG SA information to supporting, multinational forces, as well as nonDoD activities. Subordinate and supporting commands (Service Component, Functional
Component, Sub-Unified, and JTF) will provide fault, GND event, and performance data on all
systems and networks within their commands. On behalf of the COCOM, the TNC and GNSC
will consolidate and correlate this data to generate a single integrated GIG SA picture/view that
will be available to all organizations via the Secret Internet Protocol Router Network (SIPRNet).
5.5.4.2 Component, Service, Agency, Sub-Unified, and JTF Responsibilities
Component, JTF, Sub-Unified, Service, and Agency NOSCs will be responsible for assimilating
and integrating NetOps SA data of their respective areas of responsibility. Each NOSC will
install, maintain, and operate network management and intrusion detection software and populate
a local database to build a near real-time view of their domain. Firewall configurations will be
maintained to ensure the integrity of the network while enabling essential GIG SA information
exchange. Each local configuration database will provide an input to the next echelon (e.g., base
region
theater
global). Defense in depth activities and installations will follow the
prescribed configuration. Virtual views of the entire enterprise can be created at any level:
theater, region, base, etc. For example, a theater GIG SA view will be generated through an
aggregation of Component level system and network status and performance databases. This
may be augmented by incorporating GIG SA for other parts of the GIG of interest to that
commander. For example, a commander may need to monitor GIG resources supporting
intelligence or logistics reach back capabilities supporting his command.
Services and Agencies will instrument their portions of the GIG in order to establish and
maintain SA. For example, the Navy has expressed concerns with furthering the development of
Sensor Strategy, Indications and Warnings (I&W), and Daily and Real Time Readiness
Assessments in order to better provide SA. Service and Agencies will provide SA of their
portions of the GIG to the TNCs, the GNC, JTF-GNO, USSTRATCOM and their Service /
Agency leadership. This SA will include a tailored view of their systems and networks.
54
Appendix A: References
1. Alberts, Gartska and Stein, Network Centric Warfare: Developing and Leveraging
Information Superiority. 2nd Edition (Revised), located at
http://www.dodccrp.org/publications/pdf/Alberts_NCW.pdf
2. CJCSI 6215.03 GIG Network Operations (in draft)
3. Commander, US Strategic Command Memorandum “Establishment of Joint Functional
Component Command for Network Warfare”, 20 January 2005.
4. Concept Lexicon, 27 October 2004, located at
http://www.dtic.mil/jointvision/ideas_concepts/lexicon_full.doc
5. Department of Defense Transformation Planning Guidance, April 2003.
6. DoD Net-Centric Data Strategy, 9 May 2003, located at
http://www.netcentricfcb.org/AdditionalReferences/Net-Centric-Data-Strategy-2003-05092.pdf
7. DoDD 2000.12 DoD Antiterrorism (AT) Program , 18 Aug 2003, located at
http://www.dtic.mil/whs/directives/corres/html/200012.htm
8. Interagency Management of Complex Crisis Operations Handbook, Jan 2003, located at
http://www.ndu.edu/ITEA/storage/518/ITEA_Handbook_2003.pdf
9. Joint Chiefs of Staff Standing CND EXORD, 19 May 2005.
10. Joint Command and Control Functional Concept, Version 1.0, December 2003, located at
http://www.dtic.mil/jointvision/jroc_c2_jfc.doc
11. Joint C4 Campaign Plan, September 2004, located at
http://www.dtic.mil/jcs/j6/c4campaignplan/Joint_C4_Campaign_Plan.pdf
55
12. Joint Operations Concepts, November 2003, located at
http://www.dtic.mil/jointvision/secdef_approved_jopsc.doc
13. Joint Staff J-7, “An Evolving Joint Perspective: US Joint Warfare and Crisis Resolution
in the 21st Century,” 28 Jan 2003, located at
http://www.dtic.mil/jointvision/jwcr_screen.pdf
14. JP 0-2 Unified Action Armed Forces (UNAAF), 10 Jul 2001, located at
http://www.dtic.mil/doctrine/jel/new_pubs/jp0_2.pdf
15. JP 1-02 Department of Defense Dictionary of Military and Associated Terms, 7 Oct
2004, located at http://www.dtic.mil/doctrine/jel/DoDdict/index.html
16. JP 3-0 Doctrine for Joint Operations, 10 Sep 2001, located at
http://www.dtic.mil/doctrine/jel/new_pubs/jp3_0.pdf
17. JP 3-08 Interagency Coordination During Joint Operations, Volumes I and II, 9 Oct 1996,
located at http://www.dtic.mil/doctrine/jel/new_pubs/jp3_08v1.pdf and
http://www.dtic.mil/doctrine/jel/new_pubs/jp3_08v2.pdf
18. JP 3-13 Joint Doctrine for Information Operations, 9 Oct 1998, located at
http://www.dtic.mil/doctrine/jel/new_pubs/jp3_13.pdf
19. JP 6-0 Doctrine for Communications System Support to Joint Operations, 14 Feb 2005
(Final Coordination (2)), located at
http://www.dtic.mil/doctrine/jel/ddrraafftt_pubs/6_0fc.pdf
20. Net-Centric Environment Joint Functional Concept, Version 0.9, 8 November 2004,
located at http://www.netcentricfcb.org/FrontPage/NetCentricJFCV09.doc
21. Perrow, Charles, “Normal Accidents: Living with High Risk Technologies,” Basic
Books, NY, 1984.
22. Quadrennial Defense Review Report, 30 September 2001.
56
23. Secretary of Defense Memorandum, “Assignment and Delegation of Authority to
Director, Defense Information Systems Agency (DISA),” 18 Jun 2004.
24. Toffler, Alvin. War and Anti-War. Boston, MA: Warner Books. 1993.
25. Unified Command Plan 2004, March 2005.
26. United States Department of Defense, Computer Network Defense Strategy for Defense
in Depth, 28 September 2004.
27. U.S. Army NETCOM, “U.S. Army NetOps Architecture”, December 2004.
28. US Joint Forces Command, “The Joint Operational Environment: Into the Future, Mar
2004.
57
Appendix B: Glossary
This Glossary is intentionally limited to those terms having very significant impact on the
content of the base document. For the balance of terms used this document the reader is directed
to Joint Publication 1-02, “DoD Dictionary of Military and Associated Terms.” The contents of
JP 1-02 can be found on the Internet at http://www.dtic.mil/doctrine/jel/doddict/.
Collaboration: Collaboration is joint problem solving for the purpose of achieving shared
understanding, making a decision or creating a product. It allows experts to integrate their
perspectives to better interpret situations and problems, identify candidate actions, formulate
evaluation criteria, and decide what to do. In the context of NetOps C2, collaboration is used to
coordinate the development of decisions and actions across multiple basic NetOps C2 process
loops.
Command Authorities: The DoD has three forms of operational command authority. These
are Combatant Command (COCOM), Operational Control (OPCON), and Tactical Control
(TACON). Each of these authorities is defined below.
Combatant Command (command authority): COCOM is nontransferable command authority
established by title 10 (“Armed Forces”), United States Code, section 164, exercised only by
Commanders of unified combatant commands unless otherwise directed by the President or the
SECDEF. COCOM cannot be delegated and is the authority of the combatant commander to
perform those functions of command over assigned forces involving organizing and employing
commands and forces, assigning tasks, designating objectives and giving authoritative direction
over all aspects of military operations, joint training, and logistics necessary to accomplish the
missions assigned to the command. COCOM (command authority) should be executed through
the Commanders of subordinate organizations. Normally this authority is exercised through
subordinate Joint Force Commanders and Service and/or functional component Commanders.
COCOM (command authority) provides full authority to organize and employ commands and
forces, as the combatant commander considers necessary to accomplish assigned missions.
Operational control is inherent in COCOM (command authority).26
Information Dissemination Management / Content Staging: The technology, processes, and
policy necessary to provide awareness of relevant, accurate information; automated access to
newly discovered or recurring information; and timely, efficient and assured delivery of
information in a usable format.
Direct Liaison Authorized: DIRLAUTH is the authority granted by a commander (any level)
to a subordinate to directly consult or coordinate an action with a command or agency within or
outside of the granting command. DIRLAUTH is the key enabler to overcome cultural and
political barriers regarding information sharing. DIRLAUTH will authorize the continuous
electronic near real time exchange of critical NetOps configuration and status information that
will result in situational awareness and stimulate the NetCOP.
26
Joint Pub 1-02, Unified Action Armed Forces (UNAAF)
58
Effect: A result or impact created by the application of military or other power.
Forces: Organizations, which operate and maintain the global information grid.
Global Information Grid: The Global Information Grid and its assets are defined in DoD
Directive 8100.1, as follows:
• Globally interconnected, end-to-end set of information capabilities, associated processes, and
personnel for collecting, processing, storing, disseminating, and managing information on
demand to warfighters, policy makers, and support personnel. The GIG includes all owned
and leased communications and computing systems and services, software (including
applications), data security services, and other associated services necessary to achieve
Information Superiority. It also includes NSSs as defined in section 5124 of the ClingerCohen Act of 1996. The GIG supports all DoD, National Security, and related Intelligence
Community (IC) missions and functions (strategic, operational, tactical, and business) in war
and in peace. The GIG provides capabilities from all operating locations (bases, posts,
camps, stations, facilities, mobile platforms, and deployed sites). The GIG provides
interfaces to coalition, allied, and non-DoD users and systems.
• The GIG includes any system, equipment, software, or service that meets one or more of the
following criteria:
Transmits information to, receive information from, routes information among, or
interchanges information among other equipment, software, and services.
Provides retention, organization, visualization, information assurance, or disposition of
data, information, and/or knowledge received from or transmitted to other equipment,
software, and services.
Processes data or information for use by other equipment, software, and services.
Non-GIG IT – Stand-alone, self-contained, or embedded IT that is not or will not be connected to
the enterprise network.
GIG Enterprise Management: The technology, processes, and policy necessary to effectively
operate the systems and networks that comprise the GIG.
GIG Network Defense: The technology, processes, and policy necessary to provide end-to-end
protection to ensure data quality, protection against unauthorized access and inadvertent damage
or modification, and CIP.
Global NetOps Center: The JTF-GNO Command Center responsible for executing the daily
operation and defense of the GIG. The GNC directs, manages, controls, monitors, and reports on
essential elements and applications of the GIG in order to ensure its availability to support the
needs of the President, SecDef, Combatant Commanders, Services, Agencies, business and
intelligence domains.
Global NetOps Control Center: The GNCC monitors the Combatant Commander’s GIG
assets, determines operational impact of major degradations and outages, and coordinates
responses to degradations and outages that affect joint operations. Each GNCC will coordinate
with the GNC and supporting TNC any mission or operational impacts that are associated with
59
system/network anomalies or resource limitations. The primary mission of a GNCC is to advise
the FCC and ensure the portion of the GIG resources supporting that Commander’s assigned
missions and operations are optimized.
Global NetOps Event: Those activities that require a coordinated response amongst affected
Combatant Commanders, Military Services, Defense Agencies and other members of the NetOps
COI.
Information superiority: Information Superiority is the capability to collect, process, and
disseminate an uninterrupted flow of information while exploiting or denying an adversary’s
ability to do the same. (JP1-02) Information superiority is achieved in a non-combat situation or
one in which there are no clearly defined adversaries when friendly forces have the information
necessary to achieve operational objectives.
Net-Centricity: Net-centricity is “the realization of a robust, globally networked environment
(interconnecting infrastructure, systems, processes, and people) within which data is shared
seamlessly and in a timely manner among users, applications, and platforms. By securely
interconnecting people and systems, independent of time or location, net-centricity enables
substantially improved military situational awareness and significantly shortened decision
making cycles. Users are empowered to better protect assets; more effectively exploit
information; more efficiently use resources; and unify our forces by supporting extended,
collaborative communities to focus on the mission.”
Net-Centric Operations and Warfare: NCOW is the application of net-centricity to the
activities of the DoD, both day-to-day business and warfighting. NCOW describes how DoD
will conduct business operations, warfare, and enterprise management in the future. It is based
on the information technology concept of an assured, dynamic, and shared information
environment that provides access to trusted information for all users based on need, independent
of time and place.
Net-Centric Services: Net-centric services will provide DoD organizations ubiquitous access to
reliable, decision-quality information through net-based services infrastructure and applications
to bridge a real-time or near-real-time community of interest (COI). The services will empower
the edge user to pull information from any available source, with minimal latency, to support the
mission. Its capabilities will allow GIG users to task, post, process, use, store, manage and
protect information resources on demand for warriors, policy makers and support personnel.
NetOps: NetOps is defined as the operational construct consisting of the essential tasks,
situational awareness, and command and control that Commander, US Strategic Command will
use to operate and defend the Global Information Grid. NetOps will provide assured net-centric
services in support of DoD’s full spectrum of war fighting, intelligence, and business missions
throughout the GIG, seamlessly, end-to-end.
NetOps Community of Interest: The term used to describe the collaborative group of
organizations responsible for operating and defending the GIG.
60
NetOps Event: A NetOps event is a collective term for all NetOps activities that have the
potential to impact the operational readiness of the GIG.
Network Operation and Security Center: A NOSC maintains constant vigilance over system
and network operations and defense in support of the user by exercising day-to-day management,
control, and security of those system and network services. It also maintains the situational
awareness for their portion of the GIG.
Operational Control: OPCON is transferable command authority that may be exercised by
Commanders at any echelon at or below the level of combatant command. Operational Control
is inherent in COCOM (command authority) Operational control may be delegated and is the
authority to perform those functions of command over subordinate forces involved in organizing
and employing commands and forces, assigning tasks, designating objectives, and giving
authoritative direction necessary to accomplish the mission. OPCON includes authoritative
direction over all aspects of military operations and joint training necessary to accomplish
missions assigned to the command. OPCON should be exercised through the Commanders of
subordinate organizations. Normally this authority is exercised through subordinate Joint Force
Commanders and Service and/or functional component Commanders. OPCON normally
provides full authority to organize commands and forces and to employ those forces, as the
Commander in OPCON considers necessary to accomplish assigned missions. OPCON does
not, in and of itself, include authoritative direction for logistics or matters of administration,
discipline, internal organization, or unit training.27
Situational Awareness: The application of Information Age technology to military C2 resulting
in an information superiority-enabled concept of operations that generates increased combat
power by networking sensors, decision makers and shooters to achieve shared awareness,
increased speed of command, higher tempo of operations, greater lethality, increased
survivability, and a degree of self-synchronization. In essence, NCOW translates information
superiority into combat power by effectively linking knowledgeable entities in the battlespace.
Tactical Control: TACON is the command authority over assigned or attached forces or
commands, or military capability or forces made available for tasking, that is limited to the
detailed and, usually, local direction and control of movements or maneuver as necessary to
accomplish missions or tasks assigned. TACON is inherent in OPCON. TACON may be
delegated to, and exercised at any level at or below the level of combatant command.
Theater NetOps Center: A center that is responsible for the effective operation and defense of
the GIG within the theater and for providing support to the GCC. The TNC develops, monitors,
and maintains a GIG SA view for the theater.
Theater NetOps Control Center: The primary mission of the TNCC is to lead, prioritize, and
direct s Theater’s GIG assets and resources to ensure they are optimized to support the GCC’s
assigned missions and operations, and to advise the Combatant Commander of the ability of the
GIG to support current and future operations.
27
Joint Pub 1-02, Unified Action Armed Forces (UNAAF)
61
Theater NetOps Event: Theater NetOps Events are those NetOps activities conducted by the
GCCs within their theater to ensure the GIG supports operations in the theater.
62
Appendix C: Acronyms
This List of Acronyms is provided for the convenience of the reader and is intended to reflect
those acronyms used in the base document. As this document evolves and changes every effort
will be made to keep it current and consistent. However, if an error or inconsistency is found,
the reader is directed to Joint Publication 1-02, “DoD Dictionary of Military and Associated
Terms.” The Joint Acronyms and Abbreviations portion of JP 1-02 can be found on the Internet
at http://www.dtic.mil/doctrine/jel/doddict/acronym_index.html.
ACERT
AGNOSC
AOR
ANOSC
ARSTRAT
AS&W
ASD(HD)
ASC
ASD(NII)
AT&L
ATNOSC
A2TOC
C4ISR
CC/S/A
CDA
Cdr, JTF-GNO
CDRUSSTRATCOM
CIE
CIO
CJCS
CJCSI
CJCSM
CNA
CND
CND RA
CNE
CNO
COA
COCOM
COE
COI
COMPUSEC
COMSEC
COMSPOT
COMSTAT
CONOPS
CONUS
COTS
DHS
DIO
DIRLAUTH
DISA
DISN
DISR
Army Computer Emergency Response Team
Agency Global Network Operations and Security Center
Area of Responsibility
Army Network Operations and Security Center
Army Service Component Command to STRATCOM
Attack Sensing and Warning
Assistant Secretary of Defense for Homeland Defense
Army Signal Command
Assistant Secretary of Defense for Networks and Information Integration
Acquisition Technology and Logistics
Agency Theater Network Operations and Security Center
ANOSC/ACERT Tactical Operations Center
Command, Control, Communications, Computers, Intelligence, Surveillance, and
Reconnaissance
Combatant Commands, Services, and Agencies
Central Design Authorities
Commander, Joint Task Force-Global Network Operations
Commander, US Strategic Command
Collaborative Information Environments
Chief Information Officer
Chairman, Joint Chiefs of Staff
Chairman, Joint Chiefs of Staff Instruction
Chairman, Joint Chiefs of Staff Manual
Computer Network Attack
Computer Network Defense
Computer Network Defense Response Actions
Computer Network Exploitation
Computer Network Operations
Course of Action
Combatant Command
Common Operating Environment
Community of Interest
Computer security
Communications security
Communications Spot Reports
Communications Status
Concept of Operations
Continental United States
Commercial-Off-the-Shelf
Department of Homeland Security
Defensive Information Operations
Direct Liaison Authority
Defense Information Systems Agency
Defense Information Systems Network
DoD IT Standards Registry
63
DNI
EMSEC
FCAPS
FCC
GCC
GEM
GETS
GIG
GISMC
GNC
GNCC
GND
GNSC
GOTS
IA
IAVA
IC
IC-CIO
IC-IRC
IDM/CS
IM
INFOCON
INFOSEC
INSCOM
IO
ISAC
ISSE
IT
I&W
JCIDS
JFCC
JFCC-NW
JNCC
JS
JTF
JTF-GNO
LE&CI
MAJCOMS
MARFOR
MCNOSC
METL
NAVFOR
NCC
NCES
NCOW
NCOW-RM
NCS
NETCOM
NGO
NMCC
NMCI
NOSC
NSA
NSC
NSS
NTCMS
Director of National Intelligence
Emission security
Fault, Configuration, Accounting, Performance, And Security
Functional Combatant Command
Geographic Combatant Command
GIG Enterprise Management
Government Emergency Telecommunications Service
Global Information Grid
Global Infrastructure Enterprise Services Center
Global NetOps Center
Global NetOps Control Center
GIG Network Defense
Global NetOps Support Center
Government-Off-the-Shelf
Information Assurance
Information Assurance Vulnerability Alert
Intelligence Community
Intelligence Community-Chief Information Officer
Intelligence Community Incident Response Center
Information Dissemination Management / Content Staging
Information Manager
Information Operations Condition
Information security
Intelligence and Security Command
Information Operations
Information Sharing and Analysis Center
Information Systems Security Engineering
Information Technology
Indications and Warnings
Joint Capabilities Integration and Development System
Joint Functional Component Command
Joint Functional Component Command for Network Warfare
Joint NetOps Control Center
Joint Staff
Joint Task Force
Joint Task Force-Global Network Operations
Law Enforcement and Counter-Intelligence
Major Commands
Marine Forces
Marine Corps Network Operations and Security Command
Mission Essential Task List
Navy Forces
National Coordinating Center
Net-Centric Enterprise Services
Net-Centric Operations and Warfare
Net-Centric Operations and Warfare-Reference Model
National Communications System
Network Enterprise Technology Command
Non-Government Organizations
National Military Command Center
Navy/Marine Corps Intranet
Network Operations and Security Center
National Security Agency
Network Service Centers
National Security Systems
Naval Telecommunications Master Station
64
OPCON
OPREP
PIR
PM
PMO
POP
PPBES
RA
RFS
RNOSC
ROE
SA
SATCOM
SCI
SECDEF
SIPRNet
SITREP
SGNOSC
SLA
SMC
SMDC
SOF
STNOSC
STEP
TACON
TNC
TNCC
TNOSC
TSO
TSP
TSR
TTP
UCP
USA SMDC
USD(I)
USN
NETWARCOM
VTC
WPS
XNCC
Operational control
Operations Reports
Priority Information Requirements
Program Managers
Program Management Office
Points of presence
Planning, Programming, Budgeting, and Execution System
Response Action
Request for service
Regional Network Operations and Security Center
Rules of Engagement
Situational Awareness
Satellite Communications
Sensitive Compartmented Information
Secretary of Defense
Secret Internet Protocol Router Network
Situational Report
Service Global Network Operations and Security Center
Service Level Agreement
Systems Management Centers
Space Missile Defense Command
Special Operations Forces
Service Theater Network Operations and Security Center
Standard Tactical Entry Point
Tactical Control
Theater NetOps Centers
Theater NetOps Control Center
Theater Network Operations and Security Center
Telecommunication Service Order
Telecommunications Service Priority
Telecommunication Service Requests
Tactics, Techniques, and Procedures
Unified Command Plan
US Army Space and Missile Defense Command
Under Secretary of Defense for Intelligence
US Navy Network Warfare Command
Video teleconferencing
Wireless Priority System
Sub-Unified NetOps Control Center
65