[iwar] [fc:NMCI.cleared.for.classified.net]

From: Fred Cohen (fc@all.net)
Date: 2002-08-20 07:18:36


Return-Path: <sentto-279987-5219-1029853040-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Tue, 20 Aug 2002 07:21:07 -0700 (PDT)
Received: (qmail 16350 invoked by uid 510); 20 Aug 2002 14:15:46 -0000
Received: from n6.grp.scd.yahoo.com (66.218.66.90) by all.net with SMTP; 20 Aug 2002 14:15:46 -0000
X-eGroups-Return: sentto-279987-5219-1029853040-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.67.201] by n6.grp.scd.yahoo.com with NNFMP; 20 Aug 2002 14:17:23 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_7_4); 20 Aug 2002 14:17:20 -0000
Received: (qmail 9367 invoked from network); 20 Aug 2002 14:17:18 -0000
Received: from unknown (66.218.66.218) by m9.grp.scd.yahoo.com with QMQP; 20 Aug 2002 14:17:18 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta3.grp.scd.yahoo.com with SMTP; 20 Aug 2002 14:17:20 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g7KEIam24648 for iwar@onelist.com; Tue, 20 Aug 2002 07:18:36 -0700
Message-Id: <200208201418.g7KEIam24648@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Tue, 20 Aug 2002 07:18:36 -0700 (PDT)
Subject: [iwar] [fc:NMCI.cleared.for.classified.net]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=0.0 required=5.0 tests=DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: 

NMCI cleared for classified net

Pentagon officials give approval to Navy to connect users on SIPRNET to
NMCI

BY Christopher J. Dorobek  Aug. 19, 2002
<a href="http://www.fcw.com/fcw/articles/2002/0819/news-nmci-08-19-02.asp">http://www.fcw.com/fcw/articles/2002/0819/news-nmci-08-19-02.asp>
Federal Computer Week

The Navy Marine Corps Intranet has reached another critical milestone,
with the Pentagon giving the Navy the go-ahead to connect about 40,000
users working on the Defense Department's classified network.

"It absolutely is a significant milestone," said Capt. Chris
Christopher, NMCI's deputy director of plans, policy and oversight. "We
have a whole bunch of classified seats that we have to be able to roll
out," which would have been impossible without getting this authority.

In a memorandum from the Joint Staff, dated July 16, NMCI was granted a
six-month "interim authority to operate," giving NMCI the authority to
connect to DOD's Secret Internet Protocol Router Network, called
SIPRNET. Officials said it is typical for the Joint Staff to give out a
six-month interim authority to connect.

Bill Richard, EDS' NMCI enterprise client executive, downplayed the
importance of the SIPRNET connection. But Christopher said that
obtaining the classified connection was a "necessary step."

Bart Abbott, NMCI program manager for Raytheon Systems Co., the security
subcontractor for EDS, called the connection an "important milestone."
PCs with the classified SIPRNET connections represent about 10 percent
of the overall 400,000 NMCI seats, Abbott said.

SIPRNET is DOD's classified network that military personnel use for
accessing classified applications and databases and for secure
messaging. Although it uses IP standards, it is physically and logically
separate from all other computer systems using dedicated and encrypted
lines.

Users who have need for both the classified and unclassified networks
often have two PCs on their desks. Abbott said the classified and
unclassified PCs look similar except for the red desktop on the screen
of the classified machines signaling that it is connected to a
classified network, Abbott said.

The Defense Information Systems Agency, which operates SIPRNET, has an
intensive test for ensuring that systems are secure before they are
allowed to connect to the classified network, said retired Col. John
Thomas, former chief of DISA's Global Operations and Security Office and
now director of strategic programs for EMC Corp.

The review also examines the physical safety of classified seats, Abbott
said. "There is a standard government certification process for any
place where you have classified seats."

Officials from the Joint Command must review a network's security and
attest that they not only trust the deployment of the security
architecture, but that they trust the management of that architecture,
Thomas said.

"It settled the issue about whether the proposed [security] architecture
would be acceptable," Abbott said.

The Navy did have classified connections at NMCI's network operations
centers located in Norfolk, Va., and San Diego, he said. The interim
authority allows the Navy and EDS to begin rolling out PCs that are
connected to SIPRNET.

Although the three-page memo gives the Navy and EDS authority to connect
to SIPRNET, the Joint Staff rejected a proposal to use WorldCom Inc.'s
commercial wide-area network to provide additional bandwidth.

------------------------ Yahoo! Groups Sponsor ---------------------~-->
4 DVDs Free +s&p Join Now
http://us.click.yahoo.com/pt6YBB/NXiEAA/Ey.GAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:32 PDT