Army rethinks governing IT policies, networks

Plans to rescind existing network policies, shutter AKO part of broader transformation

The Army is rescinding existing network policies and reconsidering its numerous, disparate IT networks as part of broader plans for transforming the way it communicates and operates, according to a top Army official.

“Some of [these policies] are antiquated, some are contradictive – they’re all being rescinded as we speak,” said Lt. Gen. Susan Lawrence, Army CIO/G-6, who said the duplicative policies will be scrapped in favor of two overarching policies that govern Army IT network operations. Lawrence spoke July 14 at a briefing held by the Association of the U.S. Army in Arlington, Va.

“There are policies out there that aren’t worth the paper they’re written on,” she said.

The new policies are currently under consideration and would replace multiple-directive policies typically rewritten every five years; instead, the new policies would get rewrites every year.

“That’s our playbook, that’s how we’re going to fight [with] the network,” Lawrence said.

To support the move toward streamlined network operations, the Army is also re-evaluating its use of separate IT networks for different Army components – including Army Knowledge Online (AKO), the online portal widely used by service members and their families and retirees.

As Federal Computer Week previously reported, the Army plans to phase out AKO and replace it with the enterprise e-mail system being developed and implemented.

“There are multiple networks out there – AKO is just one. AKO is a great network; we’re looking into all the disparate networks to collapse into the enterprise,” Lawrence said. “It’s too costly to operate all these networks out there doing the same thing. We can’t afford to do that anymore.”

When asked about how the potential shutdown of AKO would affect the Defense Departmentwide Defense Knowledge Online, Lawrence said she is uncertain about the relationship between the two systems but the situation is being explored

Other key parts of the network transformation strategy include the move to implement single identifications for Army users, rather than multiple email addresses and accounts, that use fine-grain authentication and access controls, Lawrence said. Establishing a comprehensive common operating picture that includes stringent, enterprisewide technical standards is also critical to the transformation, she noted.

“It’s about getting access to data … we have to get agile IT access,” Lawrence said.

About the Author

Amber Corrin is a former staff writer for FCW and Defense Systems.

FCW in Print

In the latest issue: Looking back on three decades of big stories in federal IT.


  • Anne Rung -- Commerce Department Photo

    Exit interview with Anne Rung

    The government's departing top acquisition official said she leaves behind a solid foundation on which to build more effective and efficient federal IT.

  • Charles Phalen

    Administration appoints first head of NBIB

    The National Background Investigations Bureau announced the appointment of its first director as the agency prepares to take over processing government background checks.

  • Sen. James Lankford (R-Okla.)

    Senator: Rigid hiring process pushes millennials from federal work

    Sen. James Lankford (R-Okla.) said agencies are missing out on younger workers because of the government's rigidity, particularly its protracted hiring process.

  • FCW @ 30 GPS

    FCW @ 30

    Since 1987, FCW has covered it all -- the major contracts, the disruptive technologies, the picayune scandals and the many, many people who make federal IT function. Here's a look back at six of the most significant stories.

  • Shutterstock image.

    A 'minibus' appropriations package could be in the cards

    A short-term funding bill is expected by Sept. 30 to keep the federal government operating through early December, but after that the options get more complicated.

  • Defense Secretary Ash Carter speaks at the TechCrunch Disrupt conference in San Francisco

    DOD launches new tech hub in Austin

    The DOD is opening a new Defense Innovation Unit Experimental office in Austin, Texas, while Congress debates legislation that could defund DIUx.

Reader comments

Fri, Jul 22, 2011

Having separate networks and individual policies is a thing of the past. To have robust network security requires sacrifices, but also means everyone is operating from the same playbook.

Wed, Jul 20, 2011

It is easy for people to DISA bash (or any other organization) with general comments when they can be anonymous and do not have to back it up with facts. 

Mon, Jul 18, 2011

I've worked with DISA before, good luck. They become very expensive and unresponsive to customer needs quickly.

Sat, Jul 16, 2011 ID Maryland

It's a bit unsettling when the G6 refers to a portal (AKO) as network. Discusses single "identification" (whatever that means) in the era of single sign on with CAC and common (now email addresses. And she needs a briefing on AKO and DKO, so she'd realize they are closely tied. Meanwhile, the "agile" enterprise email from DISA continues as the largest single denial of service attack on the Army.

Thu, Jul 14, 2011

Agile ... ha. It takes 2 weeks to get an e-mail account from DISA and when you do it takes 60 seconds to pull up an e-mail. Saving money does no good when the C2 system don't work

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group