Professional Documents
Culture Documents
Air Force Intercom 2004
Air Force Intercom 2004
Air Force Intercom 2004
4
4 From the Top: GIG: Piecing it all together 27 News Briefs: EMSEC symposium, Mid-America
Fromthe Top: The GIG: Maj. Gen. Charles E. Croom Jr. TechNet conference; IM training; Automated
Piecing it all together 6 An evolution in information testing; Presidential VIP; Expeditionary Village;
Maj. Gen. Charles E. Croom Jr. Mr. John Gilligan ECATS; Event Planning System; IT Lean
8 GIG-BE: USAFE extends capability Reengineering; Bronze Star; and Comm
Tech. Sgt. Paul Le Blanc upgrade.
10 The changing face of network operations 30 Techno Gizmo: GATES: The Global Air
Maj. Larry Cox Transportation Execution System
11 SATCOM keeps comm open
2nd Lt. Jon Wilbur
12 Defending the network
Mr. Timothy Wilkins
14 The enemy from within
Tech. Sgt. Orville Desjarlais Jr.
18 IT portfolio management
Col. Michael Crane
19 DOD’s Network Centric Data Strategy
Capt. Kim Andersson
20 Dynamic Network Analysis team success
Mr. Anthony Pettiford
6
An evolution in 22 Network Centric Operations
information Mr. Paul Stone
Mr. John Gilligan 24 Then and Now: Col. Derrel L. Dempsey
Don Gasper
25 Time Machine: Tale of the tower
Owen Hyams
26 Civilian Focus: Are your interviewing skills
making the grade?
Mr. Steve Lewis
11 SATCOM keeps
comm open
2nd Lt. Jon Wilbur
12 Defending the
network
Timothy Wilkins
THE JOURNAL OF THE AIR FORCE C4 COMMUNITY
Q
Does the use of commercial SATCOM
day for you to capture your “Life,” from morning until night. All you have to do is to support combat operations
grab a camera and start taking pictures. Send us your photos with cutline infor- violate the Peaceful Purposes
mation and photo credit, no smaller than 5x7 at 200 DPI by April 15 for inclusion provision of the Outer Space
into the June magazine. Treaty of 1967?
Day-in-the-life themes are usually popular, but can only be so if there are sub-
missions. If you’d like to submit a short story to explain the photo or give addi- No. “Peaceful Purposes” has
tional details that’d be great, too. If you’re not quite sure you’re up to taking the been interpreted by the United
A
photos, just ask your VI shops to help you with this or contact your local Public States since the late 1950’s to
Affairs office as they may be able to offer suggestions or provide assistance. It mean non-aggressive or non-
might make a good photo page for your base newspaper as well as contributing to hostile. It does not mean non-
the intercom. military, as the former Soviet
And, as a reminder, the other themes can be found on our homepage, and if Union advocated. The 1996 U.S.
you have any questions, just call or e-mail. Happy picture taking! National Space Policy allows the
Defense Department to use these
Letters to the editor satellites in the pursuit of national
security and other goals. Following
BDUs for the CAPs Good show this reasoning, non-aggressive mil-
I just read your tid-bit on “Just For I wanted to take a minute and con- itary use such as combat commu-
Fun: What to do with your old BDUs.” gratulate the staff on the December nications support is still consid-
I'm hoping you can add a short follow- 2003 intercom and Combat Camera ered a peaceful use of outer space
up note in your next issue of what Portfolio. I received both magazines and does not violate the treaty.
could be done in a serious way. this morning, and they are absolutely This viewpoint has also been
There are about 60,000 members outstanding. These were, by far, the adopted by the United Nations.
of the Air Force Auxilliary (Civil Air best examples of military photojour- There is also a side issue of
Patrol) that have to continually pur- nalism I’ve seen in my 19 years in the whether the military use of com-
chase (if unable to beg, borrow or Public Affairs career field. mercial satellites for combat sup-
plead) for BDUs, especially field jackets port makes these satellites lawful
and other gear needed for missions. — Tech. Sgt. Brian Orban targets under the Law of Armed
There are also thousands of cadets Minot AFB, ND Conflict. If they are considered
aged 12 to 19 who need them as well. lawful targets, the cost of insuring
Although the Air Force attempts to Can’t get enough them may become prohibitive.
issue blues, BDUs have never been After seeing your magazine, I real - This could drive a decision by the
ized I gotta get this every month! satellite owners to protect their
issued to our members—it has always
been a personal or parental expense. investments by stopping military
Maybe you could suggest finding a – Tech. Sgt. Jay Vitela use altogether. If you encounter
League City, Texas these issues, be sure to check with
local unit or wing headquarters, there’s
one for each state. Often their logistics your local JA as well.
officers would be overjoyed to “come to *Extra copies: The intercom staff is
you” for collected BDUs. determining the need for additional Send in your question to:
copies of the December issue’s Combat AFCA-JA@scott.af.mil
— Maj. Dave Mullins Camera portfolio. Please have all or call DSN: 779-6060
Civil Air Patrol, Youngstown AFRS requests into the staff by March 1.
From the cockpit to the computer help desk, total control of the Global Information Grid
is the goal for Gen. John Jumper, the Air Force Chief of Staff.
The GIG will arm modern warfighters with the information they need when they need it.
In doing so, the time to find, fix, track, target and engage the enemy will be greatly reduced.
By extending the IP-based, high-speed network to Air Force airborne and space based plat-
forms, the Air Force will leverage the advantages of a fully networked force.
Left: Senior Airmen Louis Vigil and Ronald Peterson work on the Spread Spectrum Multiple Access system.
Right: DSCS personnel work on the AN/GSC-52 and AN/FSC-78.
Staff Sgt. Benjamin Andera / 755th CS Staff Sgt. Stan Parker / 755th CS
The Automated Security Incident ed transcripts from ASIM sensor host and for detailed human correlation and pro-
Measurement sensor, which is deployed at machines. It stores this data for later detailed cessing.
108 Air Force installations worldwide, is a correlation and analysis by both human ana- To date, the CDS has tracked 150 inci-
software product that enhances network lysts and automated tools. dents within the Air Force, and has recorded
security by logging and analyzing network and provided more than 35,000 suspicious
traffic in order to identify suspicious activity. The Computer Security Assistance event reports to the Joint Task Force-Global
It monitors network Transfer Control Protocol, Program Database System is a centralized Network Operations for global correlation
User Datagram Protocol and Internet Control enterprise-class database, analysis and between the armed services.
Message Protocol traffic, and uses numerous reporting system specifically developed to
techniques of intrusion detection for its support the Air Force CND mission and The Information Warfare Visualization
analysis. From May to December 2003, ASIM designed to compliment the ASIM and CIDDS tool, deployed to the MAJCOMs, AFCERT and
sensors reported 7,785,105 real-time events. intrusion detection and reporting tools. Air Force Network Operations and Security
The CDS serves as an advanced Air Force Center, supports a worldwide global situation
The Common Intrusion Detection decision support system that collects, stores, awareness of Air Force networks and provides
Director System, which is deployed at all processes, analyzes and reports computer and a viable 3D display that is viewed on a large
eight major commands and the Air network information protection and intrusion plasma screen display or personal computer
Force Computer Emergency detection related information. monitor.
Response Team, is a dedi- It contains centralized data retrieved The CNDS provides analysts and com-
cated hardware and soft- from the ASIM sensors and the CIDDS and manders with the capability to protect and
ware platform designed to manually entered by analysts. defend Air Force networks, thus ensuring the
receive near real-time con - This data is stored and displayed for rapid swift, secure flow of mission-critical informa-
nections data and associat- analysis and application of countermeasures, tion.
Following a 45-minute drive from Hill, radar technicians arrive at the Air Route Surveillance Radar.
By Tech. Sgt. Orville Desjarlais Jr. gle aircraft. Nobody else in the nation’s borders. Like wagons in a cir-
Airman Magazine Department of Defense has that capa- cle, these sites were used to protect
W
bility. America from outside threats. There
hile smoke still billowed The good news was the Hill unit were many more radar sites in the
from the World Trade Center captured the data on most of the flights country’s interior, but they were only
and the Pentagon after the of all four aircraft and sent that infor- being used by the FAA. After 9/11, that
Sept. 11, 2001, terrorist attacks, mation up the chain of command. The all changed.
Pentagon officials turned to the 84th bad news was they had lost sight of “Our aerospace control and air
Radar Evaluation Squadron to learn United Airlines Flight 93 that crashed defense missions have traditionally
exactly what happened. in western Pennsylvania. When the been oriented to detect and identify all
Within two hours, the unit from hijackers switched off the aircraft aircraft entering North American air-
Hill AFB, Utah, had reviewed the radar transponders — a radio signal that space, and, if necessary, intercept
trails of the four aircraft comman- allows air traffic controllers to track potentially threatening inbound air
deered by terrorists. Using software the each aircraft — the civilian airliners traffic,” said Gen. Ralph Eberhart, com-
unit developed, evaluators created were virtually “invisible” to the Federal mander of the North American
what’s called a track of interest analysis Aviation Administration. Aerospace Defense Command and the
on each hijacked civilian aircraft. Their “We could show the hijackers when U.S. Northern Command. He’s also the
software eliminated the clutter of all they were near the eastern coast, but 84th’s main customer. “We are now also
other traffic flying above the United the hijacked planes went so far interior focused on threats originating within
States that fateful day. Imagine looking that we lost sight of them,” said Master domestic airspace, such as hijacked air-
at the blips on the monitor of an air Sgt. Rob Freedman, a squadron super- craft,” the general said.
traffic controller in Los Angeles, multi- intendent. Immediately after the attack, the
plying those radar blips by 100—then Before Sept. 11, the unit focused 84th was determined to come up with
zooming in on the flight path of a sin- attention on radars located around the a plan to help keep Americans safe. The
Moving away from implementing Ensuring data is visible, available Tagging of all data with descriptive
interoperability through point-to-point and usable when needed and where metadata to enable discovery of data by
interfaces to enabling the many-to- needed to accelerate decision-making. users.
many exchanges typical of a net-centric
data environment.
Illustration by
Master Sgt. Karen Petitt
Telephone
Primary means of communication
in the ‘70s.
Direct Broadcast TV
DOD’s current paradigm of information.
Internet
DOD’s base of information in 10 years.
Smart push
The ability to gather data from a lot of sources, put
it together and make decisions based on the data.
Smart pull
The ability to give warfighters the freedom not
to be locked into either time or space, so they can
obtain the information they need at the moment
they need it, regardless of where they are.
Then Capt.
Colonel Dempsey is
Dempsey (center)
now a full-time care-
with fellow 1866th giver for his wife, yet in
Facility Checking his spare time he likes
Squadron members to research his geneolo-
on the flightline at
gy of Irish descent.
Scott AFB, Ill., circa
1964.
Online ✭ http://public.afca.scott.af.mil/intercom.htm