Air Force looks to Web to connect multiple information systems

A new Web-based portal connecting thousands of separate information systems will be the foundation for the Air Force's future military operations, the Air Force's chief information officer said Monday.

"Information systems are really the backbone of where we're going in the future," John Gilligan said, adding that the military's transformation into the information age requires "very tight partnerships" with the high-tech industry. "We're bringing in industry consultants to help with the process changes and the cultural changes, which tend to be the biggest issues."

Gilligan said the Air Force is leveraging cutting-edge commercial technology to "fundamentally change" its overseas combat operations and home-based administrative functions. "All of a sudden, the Air Force, from an operational mission perspective, is now intolerant of separately designed systems ... that do not work across the broader Internet," Gilligan said during a conference sponsored by the organization E-Gov.

Roughly a year ago, the Air Force mandated that its departments link their information systems into "a common portal" that would serve as a "window" for all military and civilian personnel. So far, about 400 systems have been connected, and Gilligan said the migration of another 2,000 systems has been mapped.

"We've made a lot of progress, but this has not been easy," Gilligan said.

The new structure has helped support a military plan that requires real-time communication between many U.S. bases and overseas units. In the past, the Air Force would station many combat troops overseas for long periods. But in recent years, it has moved to a home-based structure in which all troops are permanently stationed in the United States and deployed overseas for combat in 90-day rotations.

"A unit that is going [overseas] will get off the airplane and pick up the jobs that had previously been done by the unit that is now getting on that same airplane to head home," Gilligan said, adding that the units typically link to their home bases for much of the information they need for executing combat operations.

"No longer can we have stovepipe, or separately managed, systems that are supporting our different bases because as we deploy the folks in these 90-day rotations ... there's no time to train on new systems," Gilligan said. "They've got to hit the ground running and be able to pick up that job because it's a continuous military operation."

Gilligan added that as the Air Force increases its ability to rapidly integrate information from sensor technology, intelligence assets and other globally positioned sources, it will be able to launch massive military operations in dramatically shorter periods.

"We took six months after the invasion of Iraq into Kuwait to build up our forces and start to engage," Gilligan said of Operation Desert Storm in 1991. "We want to do this in days."

But he cautioned that security and reliability will be crucial to the Air Force's new information-based strategies. "These systems, and this network, needs to be secure because this will become our Achilles' heel if it can be exploited," Gilligan said.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.