Air Force looks to Web to connect multiple information systems

A new Web-based portal connecting thousands of separate information systems will be the foundation for the Air Force's future military operations, the Air Force's chief information officer said Monday.

"Information systems are really the backbone of where we're going in the future," John Gilligan said, adding that the military's transformation into the information age requires "very tight partnerships" with the high-tech industry. "We're bringing in industry consultants to help with the process changes and the cultural changes, which tend to be the biggest issues."

Gilligan said the Air Force is leveraging cutting-edge commercial technology to "fundamentally change" its overseas combat operations and home-based administrative functions. "All of a sudden, the Air Force, from an operational mission perspective, is now intolerant of separately designed systems ... that do not work across the broader Internet," Gilligan said during a conference sponsored by the organization E-Gov.

Roughly a year ago, the Air Force mandated that its departments link their information systems into "a common portal" that would serve as a "window" for all military and civilian personnel. So far, about 400 systems have been connected, and Gilligan said the migration of another 2,000 systems has been mapped.

"We've made a lot of progress, but this has not been easy," Gilligan said.

The new structure has helped support a military plan that requires real-time communication between many U.S. bases and overseas units. In the past, the Air Force would station many combat troops overseas for long periods. But in recent years, it has moved to a home-based structure in which all troops are permanently stationed in the United States and deployed overseas for combat in 90-day rotations.

"A unit that is going [overseas] will get off the airplane and pick up the jobs that had previously been done by the unit that is now getting on that same airplane to head home," Gilligan said, adding that the units typically link to their home bases for much of the information they need for executing combat operations.

"No longer can we have stovepipe, or separately managed, systems that are supporting our different bases because as we deploy the folks in these 90-day rotations ... there's no time to train on new systems," Gilligan said. "They've got to hit the ground running and be able to pick up that job because it's a continuous military operation."

Gilligan added that as the Air Force increases its ability to rapidly integrate information from sensor technology, intelligence assets and other globally positioned sources, it will be able to launch massive military operations in dramatically shorter periods.

"We took six months after the invasion of Iraq into Kuwait to build up our forces and start to engage," Gilligan said of Operation Desert Storm in 1991. "We want to do this in days."

But he cautioned that security and reliability will be crucial to the Air Force's new information-based strategies. "These systems, and this network, needs to be secure because this will become our Achilles' heel if it can be exploited," Gilligan said.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    View
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    View
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    View
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    View
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    View
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    View
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    View

When you download a report, your information may be shared with the underwriters of that document.