Army puts up its defenses

Army information technology officials started the Fort Campbell Network Upgrade in December 2003. They will complete the project in two parts: clients/servers and physical network, according to James Webb, director of the Directorate of Information Management at Fort Campbell, Ky.

The ongoing client/server portion includes computer workstations and servers operating Microsoft Corp. Windows XP and Active Directory, but he declined to comment further on the work, including the types of hardware and software installed, citing security concerns. "It's a joint effort between the soldiers, civilians and contractors assigned to Fort Campbell," Webb said.

He said work on the physical network will start in November and comes under the Army's multibillion-dollar Installation Information Infrastructure Modernization Program, which improves bandwidth for crucial service sites.

Army IT and industry officials at the Network Enterprise Technology Command (Netcom) oversee the operation and protection of Army networks at Fort Huachuca, Ariz., and Fort Belvoir, Va. Webb oversees IT operations at Fort Campbell. He answered questions in a statement but declined an interview with Federal Computer Week.

In May, Army IT officials started devising a servicewide information assurance plan to boost protection of the service's IT assets. Col. Thaddeus Dmuchowski, director of information assurance at Netcom, said Army IT officials want to develop a strategy that treats all systems as part of a cohesive enterprise, rather than securing each system individually.

Also in May, Army IT officials began studying current and future forms of computer network attacks in preparation for a multimillion-dollar information assurance procurement to fortify networks that could come as early as next year. Joe Capps, director of the Enterprise Systems Technology Activity at Netcom, said service IT officials would finish the work detailed in a requirements document that identifies products ready or in development in early 2005.

Last month, Boutelle said Gen. Peter Schoomaker, the Army's chief of staff, issued a directive to service commanders on five steps they can take to improve computer security at their installations. He said the document's topics range from ensuring that information assurance vulnerability alerts are issued to installing antivirus software and persuading employees to use unique passwords.

Army officials approved the computer security procurement because the service needs secure domestic networks to support the more mobile, rapidly deployable forces now in development.

"Lessons learned from Operation Iraqi Freedom and Operation Enduring Freedom continue to highlight the successes and potential of

network-enabled operations," said Schoomaker and Les Brownlee, acting secretary of the Army, in an article titled "Serving a Nation at War: A Campaign Quality Army with Joint Expeditionary Capabilities" published this summer by the Army War College.

"The operational advantages of shared situational awareness, enhanced speed of command and the ability of forces to self-synchronize are powerful," they wrote. Therefore, military officials must change the way they think about networks. "Operators must see themselves engaged at all times, ensuring the health and operation of this critical weapons system."

Boutelle said anyone doing business with the Army should read the document. It explains how service officials will train and equip soldiers to wage the war on terrorism, he said.

Eugene Spafford, a Purdue University professor and an expert in information security, said government IT officials continue to struggle with securing fundamentally unsafe systems and networks. He said they too often buy products based on cost rather than quality.

To fix the problem, Spafford recommends significantly enhancing the country's IT research and development abilities to better plan and implement cybersecurity for the long term rather than devoting attention to near-term patching.

The Fed 100

Save the date for 28th annual Federal 100 Awards Gala.


  • Social network, census

    5 predictions for federal IT in 2017

    As the Trump team takes control, here's what the tech community can expect.

  • Rep. Gerald Connolly

    Connolly warns on workforce changes

    The ranking member of the House Oversight Committee's Government Operations panel warns that Congress will look to legislate changes to the federal workforce.

  • President Donald J. Trump delivers his inaugural address

    How will Trump lead on tech?

    The businessman turned reality star turned U.S. president clearly has mastered Twitter, but what will his administration mean for broader technology issues?

  • moving ahead

    The bid to establish a single login for accessing government services is moving again on the last full day of the Obama presidency.

  • Shutterstock image (by Jirsak): customer care, relationship management, and leadership concept.

    Obama wraps up security clearance reforms

    In a last-minute executive order, President Obama institutes structural reforms to the security clearance process designed to create a more unified system across government agencies.

  • Shutterstock image: breached lock.

    What cyber can learn from counterterrorism

    The U.S. has to look at its experience in developing post-9/11 counterterrorism policies to inform efforts to formalize cybersecurity policies, says a senior official.

Reader comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group