recommended reading

Funding bill nudges military to unify systems

In its version of the fiscal 2009 defense authorization bill, the House Armed Services Committee used its oversight capability to push the military services to transition from stovepiped command-and-control systems to a new joint system, such as the Net Enabled Command and Control System under development by the Defense Information Systems Agency.

Comment on this article in The Forum.The committee used its funding power to pressure the Army, Navy and Air Force to sign on to a joint system like DISA's by slicing $1 million from each of the budget requests for their systems -- the Global Command and Control System-Army, the Navy's Global Command, and Control System-Maritime -- bringing those programs to $11.9 million, $127.7 million and $2.2 million, respectively.

Citing concern over a lack of commitment by the services to transition from stovepiped command-and-control systems to a joint architecture, the report said, "The services can no longer sustain a multitude of disparate systems from a technical management or financial perspective. Yet there appears to be no clear strategy articulated to senior decision-makers showing how the services will move from multiple independent systems to a joint, federated approach."

This approach "does not necessarily entail adopting a single system, but until the services commit to a unified approach to commonality, the military services will continue to waste funds and inhibit the benefits accrued by jointness," the report added.

The committee also said it believed the Army faces a "significant risk" in fielding on time the complex battlefield network needed to stitch together vehicle and sensor systems in its ambitious $15 billion Future Combat Systems program.

The committee recognized that the Army had made some progress in developing the Future Combat Systems network, but the report noted, "given the current lack of clear requirements, mature technology and progress on vital complementary programs necessary to develop the network on schedule, the committee notes that there is significant risk that delays in achieving the FCS network could lead to fielding of FCS manned ground vehicles without the FCS network support the Army considers essential."

The Government Accountability Office reported in March that the number of lines of software code the Army needed to develop for its Future Combat Systems program tripled to 95.1 million since 2003, and "it is not yet clear if or when the information network, which is at the heart of the FCS concept, can be developed, built and demonstrated."

On personnel issues, the committee report expressed concern about the Defense Department's ability to compete with commercial firms and academia in attracting and retaining an information technology workforce. The panel suggested wounded service members who are unable to serve in the field would make ideal candidates for those billets.

Recruitment and retention of a high-quality Defense IT workforce in competition with industry and universities is of particular concern to the House committee in an era when such a workforce is needed to support increasingly networked forces.

The panel directed the secretary of Defense to conduct an IT workforce analysis and deliver a report within 120 days on the number of IT billets in the department, how many of those positions are filled and the adequacy of the workforce pipeline.

The committee said it believed service members wounded in Afghanistan and Iraq "would be excellent candidates to support information technology, scientific or engineering activities" and directed the Defense secretary to conduct a study on retraining them to work in these fields.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.