Army puts up its defenses

Army information technology officials started the Fort Campbell Network Upgrade in December 2003. They will complete the project in two parts: clients/servers and physical network, according to James Webb, director of the Directorate of Information Management at Fort Campbell, Ky.

The ongoing client/server portion includes computer workstations and servers operating Microsoft Corp. Windows XP and Active Directory, but he declined to comment further on the work, including the types of hardware and software installed, citing security concerns. "It's a joint effort between the soldiers, civilians and contractors assigned to Fort Campbell," Webb said.

He said work on the physical network will start in November and comes under the Army's multibillion-dollar Installation Information Infrastructure Modernization Program, which improves bandwidth for crucial service sites.

Army IT and industry officials at the Network Enterprise Technology Command (Netcom) oversee the operation and protection of Army networks at Fort Huachuca, Ariz., and Fort Belvoir, Va. Webb oversees IT operations at Fort Campbell. He answered questions in a statement but declined an interview with Federal Computer Week.

In May, Army IT officials started devising a servicewide information assurance plan to boost protection of the service's IT assets. Col. Thaddeus Dmuchowski, director of information assurance at Netcom, said Army IT officials want to develop a strategy that treats all systems as part of a cohesive enterprise, rather than securing each system individually.

Also in May, Army IT officials began studying current and future forms of computer network attacks in preparation for a multimillion-dollar information assurance procurement to fortify networks that could come as early as next year. Joe Capps, director of the Enterprise Systems Technology Activity at Netcom, said service IT officials would finish the work detailed in a requirements document that identifies products ready or in development in early 2005.

Last month, Boutelle said Gen. Peter Schoomaker, the Army's chief of staff, issued a directive to service commanders on five steps they can take to improve computer security at their installations. He said the document's topics range from ensuring that information assurance vulnerability alerts are issued to installing antivirus software and persuading employees to use unique passwords.

Army officials approved the computer security procurement because the service needs secure domestic networks to support the more mobile, rapidly deployable forces now in development.

"Lessons learned from Operation Iraqi Freedom and Operation Enduring Freedom continue to highlight the successes and potential of

network-enabled operations," said Schoomaker and Les Brownlee, acting secretary of the Army, in an article titled "Serving a Nation at War: A Campaign Quality Army with Joint Expeditionary Capabilities" published this summer by the Army War College.

"The operational advantages of shared situational awareness, enhanced speed of command and the ability of forces to self-synchronize are powerful," they wrote. Therefore, military officials must change the way they think about networks. "Operators must see themselves engaged at all times, ensuring the health and operation of this critical weapons system."

Boutelle said anyone doing business with the Army should read the document. It explains how service officials will train and equip soldiers to wage the war on terrorism, he said.

Eugene Spafford, a Purdue University professor and an expert in information security, said government IT officials continue to struggle with securing fundamentally unsafe systems and networks. He said they too often buy products based on cost rather than quality.

To fix the problem, Spafford recommends significantly enhancing the country's IT research and development abilities to better plan and implement cybersecurity for the long term rather than devoting attention to near-term patching.

FCW in Print

In the latest issue: Looking back on three decades of big stories in federal IT.


  • Shutterstock image: looking for code.

    How DOD embraced bug bounties -- and how your agency can, too

    Hack the Pentagon proved to Defense Department officials that outside hackers can be assets, not adversaries.

  • Shutterstock image: cyber defense.

    Why PPD-41 is evolutionary, not revolutionary

    Government cybersecurity officials say the presidential policy directive codifies cyber incident response protocols but doesn't radically change what's been in practice in recent years.

  • Anne Rung -- Commerce Department Photo

    Exit interview with Anne Rung

    The government's departing top acquisition official said she leaves behind a solid foundation on which to build more effective and efficient federal IT.

  • Charles Phalen

    Administration appoints first head of NBIB

    The National Background Investigations Bureau announced the appointment of its first director as the agency prepares to take over processing government background checks.

  • Sen. James Lankford (R-Okla.)

    Senator: Rigid hiring process pushes millennials from federal work

    Sen. James Lankford (R-Okla.) said agencies are missing out on younger workers because of the government's rigidity, particularly its protracted hiring process.

  • FCW @ 30 GPS

    FCW @ 30

    Since 1987, FCW has covered it all -- the major contracts, the disruptive technologies, the picayune scandals and the many, many people who make federal IT function. Here's a look back at six of the most significant stories.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group