JIE14

May 14, 2014
By Robert K. Ackerman

The Joint Information Environment (JIE) will enable a single security architecture that may be the key to defending the U.S. military against attacks from cyberspace, said the Joint Staff’s top communicator. Lt. Gen. Mark S. Bowman, J-6, The Joint Staff, told the audience during his luncheon keynote address on the final day of AFCEA’s three-day JIE Mission Partner Symposium in Baltimore that single security services and an enterprise system will provide better cybersecurity for the warfighter.

May 14, 2014
By Robert K. Ackerman

The future soldier, sailor, airman, Marine and coast guardsman may be communicating with a mobile device attached to his or her wrist, if the vision of the nation’s top uniformed communicator comes to pass. Lt. Gen. Mark S. Bowman, J-6, The Joint Staff, emphasized the importance of mobile devices during his luncheon keynote address on the final day of AFCEA’s three-day Joint Information Environment (JIE) Mission Partner Symposium being held in Baltimore May 12-14.

May 14, 2014
By Robert K. Ackerman

U.S. military forces will not be able to pursue operational goals successfully unless the Joint Information Environment (JIE) is implemented, according to a member of the Joint Staff. Lt. Gen. Mark S. Bowman, J-6, The Joint Staff, was unambiguous in his assessment of the JIE’s importance during his luncheon keynote address on the final day of AFCEA’s three-day Joint Information Environment (JIE) Mission Partner Symposium being held in Baltimore May 12-14.

May 14, 2014
By Robert K. Ackerman

The U.S. military needs to take active measures to ensure that it acquires good cyber professionals, said the Joint Staff’s communicator. Lt. Gen. Mark S. Bowman, J-6, The Joint Staff, described some measures that may be necessary during his luncheon keynote address on the final day of AFCEA’s three-day Joint Information Environment (JIE) Mission Partner Symposium held in Baltimore May 12-14.

“We have a growing requirement for cyber professionals in the United States,” he stated. "Cyber needs to be part of every exercise and training event. We need to be able to understand what it’s about.”

May 14, 2014
By Robert K. Ackerman

A key tenet of the Joint Information Environment (JIE) will be the ability of users to have access to the same information system capabilities regardless of physical location, according to Defense Information System Agency (DISA) officials. Speaking on the final day of AFCEA’s three-day JIE Mission Partner Symposium being held in Baltimore May 12-14, the panel of officials described the importance of mobile capability as well as connectivity.

May 14, 2014
By Robert K. Ackerman

The Joint Information Environment (JIE) seeks to network the entire defense community, but its ability to address customer requirements could run afoul of its original purpose. Many military users have specific needs that must be addressed, so the JIE must meet those requirements without jeopardizing its desired interoperability.

May 14, 2014
By Robert K. Ackerman

The Joint Information Environment (JIE) will be relying on virtual capabilities to a greater degree as part of several thrusts within the network. Enabling technologies include the cloud and software modernization as planners strive to ensure interoperability and access wherever users may be located.

May 13, 2014
By Robert K. Ackerman

The Intelligence Community Information Technology Enterprise (ICITE) has generated a host of lessons learned that could be applied to many network consolidation efforts. Al Tarasiuk, chief information officer, Office of the Director of National Intelligence (ODNI), outlined these lessons to a luncheon audience on the second day of AFCEA’s three-day Joint Information Environment (JIE) Mission Partner Symposium being held in Baltimore May 12-14.

May 13, 2014
By Robert K. Ackerman

The defense community should follow the lead of the private sector in both technologies and processes, say industry experts. The information technology world is changing so rapidly that even the commercial sector has had to revamp its way of doing business, and the Defense Department would be wise to structure its plans with the same flexibility in mind.

May 13, 2014
By Robert K. Ackerman

Private sector high-technology firms are taking considerable measures to ensure the security of data, knowing that industrial espionage or foreign sabotage could cost a company its competitive edge or even put it out of business. These security processes must be weighed against the need to share information internally, which is equally important to commercial success in the dynamic information technology field.

May 13, 2014
By Robert K. Ackerman

The U.S. Transportation Command (TRANSCOM) moves more information than it does any physical commodity, and this development has redefined the command’s security requirements. These requirements are complicated by the presence of commercial providers whose presence poses potential cyberspace vulnerabilities.

May 13, 2014
By Robert K. Ackerman

The Defense Logistics Agency (DLA) is charging full speed into an infocentric environment that will include mobile technologies, changing the way the agency operates. Part of this effort includes the agency’s own version of the Joint Information Environment (JIE), which will help improve interoperability.

Kathy Cutler, director of information operations (J-6) and chief information officer at the DLA, explained these activities at a panel discussion on the second day of AFCEA’s three-day JIE Mission Partner Symposium being held in Baltimore May 12-14. This process began 10 years ago and is moving into a new phase with an increased emphasis on mobile technologies.

May 13, 2014
By Robert K. Ackerman

The U.S. Special Operations Command (SOCOM) is taking an unconventional approach to equipping its forces for an information environment that does not follow conventional guidelines. The command must provide networking for a theater force that can range from one person up through thousands of people, and it faces diverse mission needs that can require large communications pipes.

May 13, 2014
By Robert K. Ackerman

The U.S. Defense Department should reach out to the hacker community for critical expertise in the war against cyber aggressors, said a member of industry. Lars Buttler, managing director, Madison Sandhill Global LLC, said the Defense Department should stop viewing hackers as adversaries and consider recruiting some for information operations.

May 13, 2014
By Robert K. Ackerman

The Intelligence Community Information Technology Enterprise, or ICITE, will link to the Defense Department’s Joint Information Environment (JIE) via a bridge architecture. The Defense Intelligence Information Enterprise (DI2E) will ensure that the community-specific ICITE and the defensewide JIE can coexist.

May 12, 2014
By Robert K. Ackerman

The cloud, social media and cybersecurity are some of the major issues vexing two of the world’s major information technology users. One of those users is the U.S. military, but the other is IBM, which is plotting a road map to the future that might apply to the defense community.

May 12, 2014
By Robert K. Ackerman

The most important innovation looming in information technology may involve virtual networks. Software-defined networking (SDN) will open a new door to network architectures and activities that will rival previous advances, according to a panel of industry chief technology officers (CTOs) at AFCEA’s three-day Joint Information Environment (JIE) Mission Partner Symposium being held in Baltimore May 12-14.

May 12, 2014
By Robert K. Ackerman

New information technologies may change the military to a greater degree than they have changed society at large, suggested a panel of chief technology officers (CTOs) at AFCEA’s three-day Joint Information Environment (JIE) Mission Partner Symposium being held in Baltimore May 12-14.

May 13, 2014
By Robert K. Ackerman

The battle against cybermarauders begins with individual home computers, according to a high-ranking official with the U.S. Northern Command (NORTHCOM). Rear Adm. Hank Bond, USN, J-6, NORTHCOM, and deputy J-3 for cyberspace operations at NORAD, discussed national cybersecurity in a panel presentation on the second day of AFCEA's three-day Joint Information Environment (JIE) Mission Partner Symposium being held in Baltimore May 12-14.

“Where does homeland security end and homeland defense begin?” he asked. “The contested environment is in the dot com; it's in your computer at home.”

May 13, 2014
By Robert K. Ackerman

Fresh off supporting two overseas wars, the National Guard is planning for a larger role in military activities on the home front. Cyber is one area where the Guard may be serving a key role, officials say.

Some of these points were outlined in a panel discussion on the second day of AFCEA’s three-day Joint Information Environment (JIE) Mission Partner Symposium being held in Baltimore May 12-14. Rear Adm. Hank Bond, USN, J-6, U.S. Northern Command, and deputy J-3 for cyberspace operations at NORAD, said, “Our way forward in cyberspace is to properly develop the force structure around the Guard. The commercial space is the contested space.”

Pages