UNCLASSIFIED UNCLASSIFIED INFORMATION SHARING CAPABILITY (UISC) Concept of Operations Short Title: UISC CONOPS OPR: Deputy Director, J-36 RELEASED BY: Director, J-3 DISTRIBUTION: Unlimited RELEASED DATE: 15 November 2010 UNCLASSIFIED This page intentionally left blank UNCLASSIFIED UNCLASSIFIED INFORMATION SHARING CAPABILITY CONCEPT OF OPERATIONS 1. Purpose. This document describes the operational concept, termed Unclassified Information Sharing Capability (UISC). The UISC Concept of Operations (CONOPS) outlines the capability designed to assist joint and coalition military organizations in their efforts to collaborate, plan and coordinate operations, exchange information, and build situational awareness with both traditional and nontraditional mission partners across various mission sets. These mission partners include, as examples, US government agencies; foreign governments and their militaries; international organizations (IOs); regional organizations (ROs); nongovernmental organizations (NGOs); State, local and tribal authorities; and members of the public and private sectors. Missions the UISC is intended to benefit include but are not limited to Homeland Defense/Defense Support of Civil Authorities (HD/DSCA) and Stability, Security, Transition and Reconstruction (SSTR) operations. 2. Applicability. This CONOPS is for use by any US government entity that has responsibility for an area where the UISC is being implemented with mission partners. These entities include DOD (Combatant Commanders, DOD agencies, Services and Task Forces); DOS; and State, local and tribal authorities. 3. Summary of Changes. Suggested changes to this CONOPS will be submitted through the Joint Staff for consolidation and presentation to the UISC Governance Board and operational sponsor. Approved changes will be incorporated as Interim Changes (IC) until a complete CONOPS revision is required as determined by Joint Staff J3. MICHAEL J. CAREY Brigadier General, USAF Deputy Director for Command, Control and Nuclear Operations, J-36 Enclosure UISC CONOPS UNCLASSIFIED This page intentionally left blank UNCLASSIFIED Table of Contents EXECUTIVE SUMMARY .......................................................................................................... 1 1. OVERVIEW........................................................................................................................... 3 1.1 1.2 1.3 1.4 1.5 1.6 2. PURPOSE .......................................................................................................................... 3 SCOPE .............................................................................................................................. 3 BACKGROUND .................................................................................................................. 3 OPERATIONAL PROBLEM.................................................................................................. 3 VISION ............................................................................................................................. 4 APPROACH ....................................................................................................................... 4 CAPABILITIES SUMMARY .............................................................................................. 5 2.1 2.2 2.3 OBJECTIVE CAPABILITIES ................................................................................................ 5 THRESHOLD CAPABILITIES............................................................................................... 5 JOINT CAPABILITY AREAS ............................................................................................... 6 3. MISSION AREA ANALYSIS (MAA) ................................................................................. 7 4. CONCEPT OF OPERATIONS............................................................................................ 9 4.1 CONOPS OVERVIEW ...................................................................................................... 9 4.2 OPERATIONAL VIEW (OV-1)............................................................................................ 9 4.3 STRATEGIC - OPERATIONAL – DAILY/ROUTINE ACTIVITY ............................................. 10 4.3.1 Strategic/Policy ......................................................................................................... 10 4.3.2 Operational/Mission.................................................................................................. 11 4.3.3 Daily/Routine Activity. ............................................................................................. 13 4.4 THREAT AND OPERATIONAL ENVIRONMENT .................................................................. 14 5. RESPONSIBILITIES .......................................................................................................... 14 6. CONCLUSION .................................................................................................................... 15 A. APPENDICES ........................................................................................................................ 16 A.1 REFERENCES ........................................................................................................................ 16 A.2 GLOSSARY ........................................................................................................................... 17 Acronyms.............................................................................................................................. 17 Definitions............................................................................................................................. 17 i UNCLASSIFIED This page intentionally left blank UNCLASSIFIED Executive Summary This Concept of Operations (CONOPS) outlines the Unclassified Information Sharing Capability (UISC). This capability is designed to assist joint and coalition military organizations in their efforts to collaborate, plan and coordinate operations, exchange information, and build situational awareness with both traditional and nontraditional mission partners across various mission sets. These mission partners include, but are not limited to, US government agencies; foreign governments and their militaries; international organizations (IOs); regional organizations (ROs); nongovernmental organizations (NGOs); State, local and tribal authorities; and members of the public and private sectors. In April 2009, the Department of Defense (DOD) Information Sharing Implementation Plan tasked Joint Staff J-6 and OASD/NII to develop an enterprise approach that enables the federation of existing combatant command, Service, and defense agency unclassified information sharing systems in support of Homeland Defense/Defense Support of Civil Authorities (HD/DSCA) and Stability, Security, Transition and Reconstruction (SSTR) operations. In order to properly inform Fiscal Year 2012 Program Objective Memorandum development, the Command and Control Capabilities Integration Board coordinated with Joint Staff J-3 to lead the development of a CONOPS for unclassified information sharing. Combatant commands, their subordinate joint force commanders and Service components require unclassified capabilities to facilitate interaction and cooperation with non-DOD mission partners in the performance of their missions. The challenge lies in achieving a relative unity of effort across a diverse group of contributors while preserving institutional autonomy across different organizational cultures, procedures, and languages. In order for combatant commands to better work with and engage their extended partners, they require an interoperable collaboration and information exchange capability. UISC will enable both enduring and ad hoc multilateral exchanges of information through shared communities of interest and issue-specific groups among and across organizations and individuals. UISC will be a web-based, loosely-coupled, “non-dot-mil”, information sharing and collaboration tool that may be accessed any time, from anywhere, by any authorized user with an Internet connection, including web-enabled mobile, personal devices. UISC will provide an affordable, scalable, sustainable, and interoperable suite of capabilities. Technical protocols and standards will follow common US national, international, and industry standards and the collaborative information environment (CIE) will be compatible with commonly used operating systems and the client connections will be accessible through commonly used Web browsers. UISC is envisioned primarily to help more effectively conduct Humanitarian Assistance and Disaster Relief (HA/DR), HD/DSCA, SSTR, and Theater Security Cooperation (TSC) type operations. The reality, however, is that UISC has potential use in any mission area where the exchange of unclassified information is required for timely mission success. 1 UNCLASSIFIED This page intentionally left blank UNCLASSIFIED 1. Overview 1.1 Purpose This Concept of Operations (CONOPS) provides a basic description of the Unclassified Information-Sharing Capability (UISC). This description includes the generalized capabilities of the service as well as example use cases demonstrating how users will benefit from the capability. 1.2 Scope The scope of the UISC is focused on all combatant commands and their joint task force and Service commands, Services, National Guard, US Government (USG) agencies and their mission partners. This includes use of the UISC suite of capabilities by non-DOD users that are sponsored by DOD components. These mission partners include, but are not limited to, US government agencies; foreign governments and their militaries; international organizations (IOs); regional organizations (ROs); nongovernmental organizations (NGOs); State, local and tribal authorities; and members of the public and private sectors involved with the same community of interest or issue. Activities of the UISC will be employed at the Strategic Theater, Operational, and tactical levels with the spectrum of use focused primarily on non-combat operations. These operations include Humanitarian Assistance and Disaster Relief (HA/DR), Homeland Defense/Defense Support of Civil Authorities (HD/DSCA), Stability, Security, Transition and Reconstruction (SSTR), and Theater Security Cooperation (TSC). 1.3 Background In order to perform a variety of DOD missions most effectively, there is a critical need for the interaction and cooperation of US and foreign government agencies and militaries, IOs, ROs, NGOs and the public and private sectors in numerous mission sets. In the current operational environment, the conduct of mission operations requires that combatant commands engage a dynamic set of extended partners, often individually, over the Internet. Responding to mission challenges requires effective situational awareness, communication, coordination, and virtual collaboration among the myriad of contributing participants. These organizations must identify critical information requirements, where to obtain relevant information to answer these, as well as when and how to share the information routinely to plan and execute operations for mission success. The UISC is envisioned to serve as a key information sharing enabler, available for use by USG Lead Federal Agencies (LFAs) to support enhanced unity of effort in planning and execution of missions. 1.4 Operational Problem Current military operations are distinguished by command and control capabilities enhanced by rapid IT innovations, communications infrastructure improvements, and a requirement for militaries to interact with new partners, many of which have never previously supported military efforts. Building unity of effort across this diverse group of mission partners poses a significant challenge in operations, particularly those involving non-combat missions. 3 UNCLASSIFIED Part of this challenge arises in accommodating the institutional autonomy of new mission partners who bring to the conduct of operations different organizational cultures, procedures, languages and agendas. In order for coalition and interagency task forces to better work with and engage their extended partners, mission participants require a capability which provides easy and manageable access, interoperability with a large majority of Internet user tools, and services that support the level of collaboration and information exchange necessary to enable time sensitive decisions and wide dissemination of information. These mission participants require access to a wide array of information, expertise and resources that enable integrated and accessible planning, analysis, assessment, and operational capability to support national and international objectives. In addition, behavioral changes introduced through the emergence and growth of social networking sites (SNS) impact on how dispersed military and partnering organizations use the Internet and communications technologies. 1.5 Vision The UISC vision is to enable the effective sharing of unclassified information between the DOD and its various mission partners. For its initial capability, the UISC will leverage, exploit and apply recent innovations and advances found in various SNS on the World Wide Web to meet and improve mission success and effectiveness among combatant commands and their respective real and virtual communities. As further strategic, operational, and tactical information exchange requirements are determined, additional applications and services will be considered for adoption as part of the suite of UISC. The UISC will be a shared enterprise service useable by all members of the DOD to facilitate unclassified information sharing with mission partners that do not have or want access to DOD networks or web portals. 1.6 Approach The UISC will use a combination of current technical solutions to this operational problem vice seeking new technologies. The advent of UISC will reduce duplicative services and fill information sharing capability gaps. The approach is to leverage a mature subset of DOD technical and procedural solutions’ capability and elevate its usage to the enterprise level by making that capability available to all potential users. In addition, the UISC will leverage knowledge management (KM) initiatives that promote adoption of strategic operations, and common tactics, techniques, and procedures that enable knowledge and information sharing. Using this approach, we foresee significant cost savings to the enterprise as well as an expedited roadmap towards Initial Operating Capability (IOC). This approach will also enable the federation of existing combatant command, Service and Agency unclassified information sharing capabilities with the enterprise. The intent is for the DOD UISC to be interoperable with other USG unclassified information sharing initiatives, such as DHS’s Homeland Security Information Network (HSIN) and other existing capabilities to be identified by mission partners. 4 UNCLASSIFIED 2. Capabilities Summary 2.1 Objective Capabilities This CONOPS addresses the unclassified information sharing capabilities for the aforementioned mission partners and the UISC implementation plan will ensure that the mission partners are aware of the DOD process for requirements development, adjudication and integration. As of the release of this CONOPS, the current requirements management process is found in CJCSI 6285.01B dated 13 Sept 2010. The desired capability is to enable combatant commands and their joint task force and Service commands to share information and collaborate with any current and potential mission partners wherever, whenever, and as often as necessary, to better achieve mission success using real and virtual communities. Given the tools and opportunity, the combatant commands and their communities will naturally create mutual value among them through a spectrum of techniques and solutions available. The expanse of possible mission partners with whom the DOD may share information is large. It includes non-DOD agencies of US Federal, State, local, and tribal governments and nongovernmental organizations, first responders, and the private sector, whether the United States is leading the operation or participating as a mission partner. 2.2 Threshold Capabilities Combatant commands and their extended spectrum of mission partners, to include both real and virtual community members, require an interoperable, web-based capability that supports unclassified, multi-media information sharing and collaboration to better achieve their mission success. The UISC is not envisioned to provide a purely military centric environment, but to enable relevant exchange among many mission partners. This capability must support both enduring and ad hoc communities. Use of the UISC by enduring communities enables information sharing and collaboration for both on-going and anticipated mission sets such as HA/DR, HD/DSCA and SSTR. In turn, these communities form the foundation for ad hoc communities needed to respond to expected, but presently undefined, real-world responses. The UISC solution will provide an affordable, scalable, sustainable, and interoperable suite of capabilities that provides information sharing and collaboration among combatant commands, their joint task force and Service commands, and their global partners, real and virtual communities, broader private and public sector communities, and interested, relevant, individuals, all performed without traditional boundaries. UISC will consist of providing access and support to the collaborative suite of capabilities. As a part of the UISC concept, no hardware is intended to be provided to end users. USG entities assisting in an event may elect to do so if they deem it an operational necessity. UISC will provide an unclassified, loosely-coupled, web-enabled software platform delivering the capability for a disparate set of participants to connect, collaborate, plan and coordinate; network socially and professionally; have situational awareness; and document the activities of multiple communities of interest and practice. It is conceptually based on the premise that the only technical commonality among the potential partners is a computer or other 5 UNCLASSIFIED web-enabled device with access to the Internet (this includes desktops, laptops, notebook, PDAs, cell phones and Smart phones). The UISC will be a portal which is available via the Internet so as to provide access to potential mission partners. As an initial capability, the UISC will leverage current Web 2.0 capabilities and concepts (e.g. services provided by Twitter and Facebook), which are based on participants’ abilities to exploit emergent group-forming behaviors and collaborate with others online. The UISC will allow mission partners to share data and information to and from a variety of existing sources (e.g. an Unclassified Common Operational Picture (COP) or a combatant command’s existing theater information sharing capability). Technical protocols and standards will follow common US national, international, and industry standards to provide interoperability with existing capabilities. The UISC collaborative environment will be compatible with commonly used operating systems, and the client connections will be accessible through commonly used Web browsers (e.g. Firefox and Internet Explorer). Considerations must be addressed during development for disconnected, intermittent, and low bandwidth (DIL) users. Users will be able to collaborate by employing a number of useful collaborative capabilities. At a minimum, authorized users are expected to be able to read and contribute to communities of interest they join. A full list of desired functional capabilities will be provided in a separate requirements document that will specify the unclassified information sharing capabilities required. Below is a small sampling of those collaborative capabilities: 2.3 Texting Blogging Instant Messaging/Chat Image and audio/video file hosting Sharing files, links, and events (desktop and handheld devices) Language translation Synchronous collaboration Wikis Joint Capability Areas All Tier 1 Joint Capability Areas will be potentially affected through the operational utility of UISC. Force Support Battlespace Awareness Force Application Logistics Command and Control Net-Centric Protection Building Partnerships Corporate Management and Support 6 UNCLASSIFIED The UISC utilizes a net-centric suite of capabilities that will be employed to enable the building of both ad hoc and enduring partnerships, groups, and virtual communities to more effectively meet the mission needs, objectives, and priorities of the participating combatant commands specifically including the Joint Capabilities above. Once formed, relationships among individual members, groups, and communities will operate virtually on a free-form, freeflow, ad hoc basis, and will produce value in the process of participation. More partnerships, more information availability, and easy access will combine to improve awareness of not only the area of responsibility, but of an unlimited number of topical interests of the membership population on the network. 3. Mission Area Analysis (MAA) Mission Area Analyses will be variably unique for each individual or group (such as a combatant command) utilizing the UISC. Although recent events have focused the UISC effort on Humanitarian Assistance and Disaster Relief (HA/DR) efforts, there are many other mission areas or interesting topics that will evolve or become more/less relevant based on many variables. Some additional, prominent mission and general interest topics include: Partnership building and enhancement World Health issues Environmental Concerns/Events Political dynamics and instability Support to civil authorities/law enforcement Weather Events and Natural Disasters Conflict resolution Lines of Communication Conflict deterrence/avoidance WMD Proliferation Illicit trafficking Support to combat operations Diplomatic support Security (e.g., Olympics, World Cup Soccer, etc.) Force Protection Ethnic, cultural, and religious events Exercise/Training/Rehearsal support Geospatial visualization tools Cyber Attack U.S. Critical Infrastructure Attack There are virtually unlimited missions or topics of interest that may evolve from a capability such as the UISC. Groups and/or communities may form, grow, or wither depending on the level of interest of the participants and the derived tangible and intangible value of the information, the level of collaboration, and the amount of professional and social networking provided by the community. From the perspective of a combatant command, every effort must 7 UNCLASSIFIED be taken to participate in, and when appropriate, lead and form groups, communities, and partnerships essential to performing its various missions. Proactive steps must be taken to generate interest, build an optimum population and representation of participants, and create mutual value among all mission partners. Other groups with UISC access should conduct analysis on a frequent and ongoing basis for the purpose of recognizing opportunities to improve the UISC and increase its value. Mission Area Analysis for each participant in the UISC will be determined by answering the question, ‘Did I achieve my mission more effectively through the capabilities provided by the employment of the UISC?” In many cases, this determination will be made by assessing intangible factors and indicators such as: Temporal availability of information Perceived and real value of information exchanged Accuracy and reliability of information Increase shared awareness by all mission partners and decision makers at all levels Greater awareness of information enabling creativity and original solutions Optimum representative participation in a group or community Ability to lead a group or community to solve a problem or meet a challenge Level of trust, reputation, and reliability among mission partners to collectively achieve a common purpose Optimum behavioral and utilization patterns of participants in the network The optimum level of group membership guidelines that enhances, not constrains, the value derived from the network. Group membership cohesion and coherence Self-awareness and responsiveness of participants to recognize and form a group or community as needed Level of knowledge and awareness to anticipate or foresee a new need or define a new interest Compelling needs of individuals and/or groups to connect, share, and participate Unity of effort, mission coordination and response improved across groups or communities Perceived equity in the amount and value of information shared between members of the group or community Crowd sourcing These representative intangibles directly affect and determine the tangible results through a complex interdependency among them. For example, the timely delivery of an appropriate solution of tangible goods and/or services to the place needed most to achieve the mission is likely the result of the “right” individuals and/or groups sharing the “right” information at the “right” time for the “right” reasons to support decision makers and to meet desired objectives. 8 UNCLASSIFIED 4. Concept of Operations 4.1 CONOPS Overview The employment concept for UISC is to implement a SNS approach to enable information sharing and collaboration with as broad a community as needed to support combatant command mission operations. The UISC will provide tangible and intangible value to its users by enabling multilateral exchanges and ad hoc multimedia communications channels through shared virtual communities of interest and topic-specific groups among and across organizations and individuals. UISC is a web-based, non-dot-mil information sharing and collaboration capability that may be accessed any time, from anywhere, by any authorized user with an Internet connection, including web-enabled mobile, personal devices. It utilizes a community of communities and groups leveraging Web 2.0 social networking and collaborative tools to create a web of relationships that generates both tangible and intangible value. The technical specifications of how the UISC will be accessed, implemented and resourced will be codified in the UISC implementation plan. 4.2 Operational View (OV-1) Participants in the UISC environment could be any mission partner with a computer or communication device and Internet access with a need to establish or be part of a virtual community (Fig 1). As previously stated, users will gain access via their own hardware as the UISC is not a system in the original context. The implementation and perpetuation of UISC’s functionality lies in its ability to connect its capabilities across distributed individuals and groups to ultimately receive and provide value through the Internet. UISC participants are afforded significant control over how they utilize its functionality and what information they share with other participants with the facilitation of an UISC group administrator. 9 UNCLASSIFIED OV-1 Unclassified Information Sharing Capability (UISC) This view depicts symbolic virtual boundaries that define communities and environments in cyberspace. The entire background represents cyberspace, with the Internet shown as the largest bounded virtual environment. The other shapes represent environments (circular) and communities (elliptical or rectangular). The geographic/physical location of members is not relevant if connected to the Internet. Environments – portal defined virtual space with integrated services – circular boundary. Community, Organizational or Functional – rectangular. Community of Practice (COP) or Cross Functional, non-white field - elliptical. Community of Interest (COI), white field – elliptical. Persistent Virtual Workspace (PVW) – portal provisioned virtual place inside an environment that is defined by a boundary; and is commonly the collaboration site of a community. Boundary – defines community access, and presence of its PVW in their environment. Black = Closed community, access only by invitation – PVW presence for members only. White = Controlled community, access by request, PVW presence for some or all non- members. No boundary = Open community, everyone has access, PVW presence for all. Figure 1: UISC Operational View - 1 (OV-1) 4.3 4.3.1 Strategic - Operational – Daily/Routine Activity Strategic/Policy International issues and challenges are complex and the solutions are certainly dependent in large measure upon the exchange of timely, accurate information among the optimum set of participants. The same may be said of domestic military operations in support of civil authorities. Though there might be a great variance in objectives and goals, the closest possible cooperation and collaboration should be utilized in planning for, implementing, and evaluating challenges to international relations on a continuing basis. This rationale applies not only to information sharing but also to the adoption of common processes, methods, tools and technologies for peace-building, stabilization and reconstruction or humanitarian assistance/disaster relief efforts and other combatant command missions. Presently, there is a growing need for improved collaboration on new approaches and tools to improve on these efforts and remove impediments. Among the many reasons for closely collaborating are optimizing contributor participation, unification of efforts, more opportunities for partnering, cost and risk reduction by eliminating physical meetings, and establishing trust among participants. Interested agencies of the US Government (USG), in coordination with their mission partners, seek to develop and implement self-sustaining solutions for international challenges and to develop a loosely-coupled, scalable, information sharing capability, for use by all partners. 10 UNCLASSIFIED Vignette: The United Nations Office for the Coordination of Humanitarian Affairs (UNOCHA) posts publicly releasable information at its Relief Web site. However, this information is static, posted as press releases. For purposes of coordinating response to an evolving humanitarian crisis, OCHA created the Virtual On-Site Operations Coordination Centre (OSOCC). This site allows OCHA to collaborate with first responders to enable efficient and effective response to an emerging crisis as well as providing a collaborative information environment in which potential partners can discuss capabilities, share lessons learned and standard operating procedures and identify communities of interest. A similar capability in which the communities of interest can be created and facilitated by the Department of Defense would assist in allowing the USG, including the DOD, to identify mission partners and share information appropriate to specific missions and responses in a more controlled environment without having to provide partners access to the NIPRNET. 4.3.2 Operational/Mission At an operational or mission level, the direct benefits derived from a UISC are a more effective and efficient execution of all combatant command missions but especially including DSCA, SSTR, peace-building or HA/DR efforts. The goal is to partner with other USG Agencies, IOs, ROs, NGOs, and the public and private sectors in efforts designed to provide essential needs and services and information in all available venues. This goal is achieved with the opportunity for increased collaboration enabled by the UISC’s information sharing component and the content created within a group or community. This collaboration potentially results in a richer set of contextual information or comprehensive knowledge-base from which to derive more facts; fewer, but better assumptions for planning; a more comprehensive understanding of the crisis environment; and ultimately optimal decisionmaking. Vignette: A massive earthquake hits the densely populated island nation of Termina. The Geographic combatant commander is providing immediate assistance until the US Department of State and US AID arrive on scene and take charge of relief efforts as the Lead Federal Agency. A Combined Joint Task Force (CJTF) has been assigned the task of responding and providing immediate aid. To facilitate communications between the military and the various actors planning and conducting the relief effort, the Commander has directed that the operation occur at the non-classified level. Furthermore, the Commander directs the establishment of a “Termina Earthquake HA/DR” Community of Interest (COI) on UISC. The Commander announces that relief efforts will be coordinated from within this COI and disseminates this information to subordinate commands as well as to IOs, NGOs, and the local population. Responders access this HA/DR COI by using a standard computer with internet access, a cellular/smart phone, or a portable computer with satellite/cellular capability. Groups and individuals in need of assistance may also use the COI to make their needs known using any of the aforementioned methods that are available. Upon joining the HA/DR COI, individuals can share information pertaining to the relief effort with other members of the community. COI members will both ask and answer questions while collaborating with new mission partners. An NGO seeking to provide bottled water can determine where that bottled water is needed. This 11 UNCLASSIFIED NGO can then arrange for transportation of said bottled water from point A to point B by obtaining contact information for the logistics hub from within the COI. If this NGO also desires to see who else is providing bottled water, they can seek an answer from other COI members to prevent duplicative relief efforts. There may also be an additional “man-in-the-loop” during the HA/DR response to enable better information sharing – both within the COI, and between disparate organizations and coordination sites. A “Knowledge Manager” or “Information Exchange Broker” will assist the COI and its members in sharing the vast amount of information present within a HA/DR environment. These initial benefits carry over from planning to implementation and ultimately evaluation as enduring virtual communities are established and trust factors are strengthened. These communities are most effective if they already have relationships established. There are no temporal limitations on the use of UISC. It could be equally useful in initial crisis assessment, planning, implementation, monitoring and evaluation – any situation that requires establishing and sustaining groups with a particular purpose in mind. Each UISC group has its own characteristics based on the original establishing purpose of the group owner conveyed through a group administrator. Some groups may be established with a purpose of “broadcasting” information with little to no expectation of routine collaboration (e.g. web portal). Others may seek to engage the group in solving problems and may function more as a “bulletin board” or “forum” with a Question & Answer feel where experts can help novices with issues or problems. Vignette: In extended operations, mission partners often provide people to the Combatant Commander’s Joint Task Force (JTF) staff to aid in operational planning. These mission partners interact with their parent organizations to coordinate and inform on the overall mission. Some mission partners are prohibited from direct association with potential combatants to avoid the perception that they are gathering intelligence and may not wish to physically interact with government or military organizations but still see the value and efficiency in collaborating with these organizations. Most partners are interested in the military’s situation reporting. Some mission partners deploy with their own communications infrastructure or use the Internet to help their need to communicate. An UISC environment allows all mission partners to communicate using the lowest common denominator, the Internet. There also exists an opportunity for the UISC to be applied to the HD/DSCA missionspace. Vignette: The National Guard uses the Joint Information Exchange Environment (JIEE) to coordinate requests for information and assistance (RFIs / RFAs) and share mission information internally and with mission partners. Each State and Territory Joint Forces Headquarters (JFHQ) have established operational groups on JIEE to share unclassified information and process Requests for Assistance with other States and with the National Guard Bureau. In addition, NORAD-NORTHCOM (N-NC) and DHS/FEMA have established groups on JIEE to enable their situational awareness of National Guard operations. A JIEE-like capability as part of the UISC suite of capabilities would meet capability gaps identified in JROCM 096-10 and in 12 UNCLASSIFIED GAO-10-386, which recommends that DOD establish an enterprise service for managing civilian requests for assistance. This would improve civil authorities’ situational awareness of DOD’s efforts to identify capabilities to support civil authorities, and improve military and civilian unity of effort through enhanced mission coordination and sourcing. 4.3.3 Daily/Routine Activity. At the tactical level, UISC will enable more timely and comprehensive information sharing by providing readily accessible, unclassified information sharing with the ability to both read and share information in relevant mission communities. UISC standardized decision support tools will enable users’ collaboration. Daily activity will consist of participation in persistent communities of interest and practice designed to foster improved collaboration and information sharing during non-crisis periods. In this manner, relationships and groups formed pre-crisis will be already established and populated for use during a crisis response activity. Weighing whether or not to join an unclassified information sharing environment operating outside of governmental or military domains is usually a cost vs. benefit risk decision. There is always tension between the risk involved in sharing unique content compared with the potential reward of similar unique, and previously undisclosed content, being made available by other users. Some of these considerations could be operational security or competitive advantage oriented. To mitigate potential trust issues and maximize partner participation, the UISC will operate on a dot-org or dot-net domain, instead of a dot-mil or dot-gov domain. Careful consideration should be given by individual users and group owners as to how content is shared using the basic collaborative features of the UISC. Upon administrator validation, group owners will be able to host a group with the capability to control/limit access to their group. Data and information made available as content is at the discretion of every entity and organization. However, once it is shared, only access controls limit viewing and use. These access control measures and the procedures for their implementation will be codified in the UISC implementation plan and the sponsoring agency’s current TTPs. The UISC will not circumvent organizational requirements to properly approve release of internal information or data. Any group’s improper release and/or “spillage” of data will be mitigated by sponsoring agencies using current policies and procedures developed by the UISC’s Designated Accreditation Authority (DAA). Like any web-based capability, the performance of the UISC will be impacted by network performance and bandwidth constraints. The basic UISC will function in austere and constrained network environments by instituting low bandwidth procedures employing text chat or other less demanding tools. This will enable handheld cellular or satellite terminals to exchange information in the UIS environment through wireless Internet Protocol technologies. 13 UNCLASSIFIED Vignette: The early stages of a crisis response require the gathering of assessment information to be provided to planners and responders about the current situation. All mature responding organizations have developed some standard reporting format which allows forward deployed personnel to quickly and easily input data for consumption by planners and staff who will coordinate the response. By creating an UISC we can enable the sharing of the data elements from these various reports. Status can be more easily shared across mission partners, provided into a format they are accustomed to viewing. 4.4 Threat and Operational Environment The UISC is not directed at any specific threat or operational environment, but rather all possible threats, in all possible operational environments relevant to the participating combatant commands and their respective real and virtual communities. The strength and ability of the UISC to address any and all challenges will be drawn from the mission-based relationships, groups, and communities formed through it. Based on the assumption that there is some level of Internet availability, access, and bandwidth, implementation activities must address use in a DIL environment. The UISC will be subject to both natural and man-made threats. Natural threats include damage by fire and water, power failure, and natural disasters such as storms, floods, and earthquakes. Man-made threats are from those who would target the UISC for espionage, criminal activity, unlawful use, denial of service, malicious harm (including virus attack), destruction or corruption of data. Leaders (e.g. commanders, organization/agency heads) must assess and accept the information assurance and operational risk associated with the usage of the UISC. Information may be compromised or unavailable due to these threats. Leaders must make a conscious effort to balance the value of sharing information with the risks of the potential exposure of that information. Guidance provided to DOD users should be specific enough for users to comfortably make an informed decision about sharing information with mission partners and its impact on mission accomplishment if revealed to an adversary. Applying the OPSEC process (reference d.) can support these decisions. 5. Responsibilities Office of the Assistant Secretary of Defense (OASD) Networks and Information Integration (NII)/Department of Defense Chief Information Office (DOD/CIO)- OASD (NII)/DOD CIO, in cooperation with the Joint Staff, will identify a governance board to oversee the implementation and sustainment of this Unclassified Information Sharing Capability. The intent is to use a vetted structure that already exists in the information sharing space. Absent of that, these organizations will establish an Enterprise Oversight Board with that same mission. This board shall evaluate the UISC at least annually to review progress, approve future plans and advocate for funding. In addition, it will solicit an organization to act as the operational sponsor for the UISC. It will also coordinate interoperability between the UISC and other peer USG capabilities. Joint Staff – The Joint Staff shall participate with OASD (NII)/DOD CIO and the operational sponsor as members of the governance structure to provide oversight of the operational 14 UNCLASSIFIED requirements process and support the integration of the Knowledge Management functionality with the technical capability provided by the UISC. Combatant commands/Services/Agencies, National Guard and other USG organizations– Develop guidance, SOPs and TTPs which support decisions which will need to be made regarding what information can be shared with which mission partners. These procedures should provide OPSEC considerations as explicitly and in as much detail as possible to allow for the timely exchange of information which is critical to support the mission. Defense Information Systems Agency (DISA) – Host the UISC as a service available at the enterprise level and provide technical specifications for mission partners to interoperate/federate with the UISC. 6. Conclusion This CONOPS describes the Unclassified Information Sharing Capability, designed to assist joint and coalition military organizations in their efforts to collaborate, plan and coordinate operations, exchange information, and build situational awareness with both traditional and nontraditional mission partners. The CONOPS is not meant to answer all questions associated with the implementation of the UISC. Rather, it is an attempt to explain the desired need and usage of the UISC. 15 UNCLASSIFIED A. Appendices A.1 References a. “Department of Defense Information Sharing Implementation Plan”, OASD/NII/CIO, Apr 2009 b. DODI 8220.02, “Information and Communications Technology (ICT) Capabilities for Support of Stabilization and Reconstruction, Disaster Relief, and Humanitarian and Civic Assistance Operations”, April 30, 2009 c. DODI 3000.05, “Stability Operations”, September 16, 2009 d. DOD Directive 5205.2, “DOD Operations Security Program,” March 6, 2006 e. JP 3-08, “Interagency, Intergovernmental Organization, and Nongovernmental Organization Coordination During Joint Operations”, Vol I, 17 March 2006 f. Deputy Secretary of Defense Directive-Type Memorandum 09-026, “Responsible and Effective Use of Internet-based Capabilities”, February 25, 2010 g. Joint Technology Assessment Activity, "Transnational Information Sharing Cooperation Joint Capability Technology Demonstration Integrated Assessment Plan, Revision 2", Oct 2009 h. All Partners Access Network (APAN) Concept of the Operations (CONOPS). i. National Incident Management System (NIMS) j. DODD 3025.1 Military Support to Civil Authorities (MCSA) k. JTF-GNO CTO 10-008- Responsible and Effective Use of Internet Capabilities l. MNMP C2 Information Sharing Capability Definition Package (CDP), October 2010 m. CJCSI 6285.01B, “Multinational Information Sharing (MNIS) Operational Systems Requirement Management Process”, 11 September 2010 16 UNCLASSIFIED A.2 Glossary Acronyms COI CONOPS DIL DISA DSCA DOD DODD HADR HN IGO JCA JTF NGB NGO NII OASD OSD OPSEC PDA SNS SOP SSTR TSC TTP UISC USG Community of Interest concept of operations disconnected, intermittent, and low bandwidth Defense Information Systems Agency Defense Support Civil Authorities Department of Defense DOD Directive Humanitarian Assistance and Disaster Relief host nation intergovernmental organization Joint Capability Area joint task force National Guard Bureau nongovernment organization Networks and Information Integration Office of the Assistant Secretary of Defense Office of the Secretary of Defense Operational Security personal digital assistant social networking services standard operating procedures Stability, Security, Transition and Reconstruction theater security cooperation Tactics, techniques, and procedures unclassified information sharing capability US Government Definitions a. Collaboration 1. a. The deliberate effort of working together, applied to any interaction between individuals and organizations with shared interests or similar goals; b. the communication and coordination actions within and among commands and organizations that support planning and conducting military operations. 2. See also: Virtual Collaboration. [Below included in a separate comment.] b. Collaborative Information Environment (CIE) – The virtual aggregation of people and organizations, infrastructure, and policy and procedures to create and share the data, information, and knowledge needed to plan, execute, and assess operations and to enable a commander to make decisions better and faster than the adversary 17 UNCLASSIFIED c. Community of Interest (COI) (see Virtual Community) d. Federation – The process of associating separated organizational servers into one operational domain. e. Group Administrator – Technical facilitator who enables through basic access control the ability of individuals to interact through specific media, potentially crossing many boundaries (geographical, national, political, economic, social, financial, and linguistic, etc.) in order to pursue mutual interests or goals. f. Group Owner – Administrative lead of a group of individuals who interact through specific media, potentially crossing many boundaries (geographical, national, political, economic, social, financial, and linguistic, etc.) in order to pursue mutual interests or goals. g. Information Environment – The aggregate of individuals, organizations, and systems that collect, process disseminate, or act on information. h. Information sharing- Making information available to participants (people, processes, or systems). Information sharing includes cultural, managerial, and technical behaviors by which one participant leverages information held or created by another participant. i. Mission Partner- Federal, State, local, tribal, coalition partners, foreign governments and security forces, international organizations, nongovernmental organizations, and the public and private sectors. j. Operations Security (OPSEC). A process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities including: (1) Identifying those actions that can be observed by adversary intelligence systems. (2) Determining indicators that hostile adversary intelligence systems might obtain that could be interpreted or pieced together to derive critical intelligence information in time to be useful to adversaries. (3) Selecting and executing measures that eliminate or reduce to an acceptable level the vulnerabilities of friendly actions to adversary exploitation. k. Portal is a collaborative tool which provides web-based access to a variety of information and other tools. l. Social Network Sites (SNSs) such as MySpace, Facebook, LinkedIn, etc. have attracted millions of users, many of whom have integrated these sites into their daily practices. There are thousands of SNSs, with various capabilities and attributes, supporting a wide range of interests and practices. While their key technological features are fairly consistent, the cultures that emerge around SNSs are varied. Most sites support the maintenance of pre-existing social networks, but others help strangers connect based on shared interests, views, activities, goals and objectives. 18 UNCLASSIFIED m. Sponsoring Agency is the USG entity that has responsibility for an area where the UISC is being implemented. This organization may provide the group administrator and/or technical support for UISC users/groups. n. UISC (Unclassified Information Sharing Capability) is a "community of communities" capability that combines the benefits of unstructured collaboration (wikis, blogs, forums) and structured collaboration (file sharing, calendar) with the personalization of social networking to facilitate unclassified information sharing with multinational partners, nongovernmental organizations, and among various US Federal and State agencies. o. A Value Network is any web of relationships that generates both tangible and intangible value through complex dynamic exchanges between two or more individuals, groups or organizations. Any of these engaged in both tangible and intangible exchanges can be viewed as a value network, whether private industry, government or public sector. The nodes in a value network may represent people (or roles), groups or organizations. The nodes are connected by interactions that represent tangible and intangible deliverables. Intangible deliverables may take forms such as; information, knowledge, or awareness and tangibles may be in forms such as; financial value, goods, or services. p. Virtual collaboration - The use of communications and computer technologies to enable dispersed individuals and organizations to interactively work together on similar goals or shared interests. This capability is enabled within a collaborative information environment by the use of high-speed telecommunications networks and a common suite of enterprise multimedia planning, conferencing, assessment, and portal tools.. q. A Virtual Community is a social network of individuals who interact through specific media, potentially crossing many boundaries (geographical, national, political, economic, social, financial, and linguistic, etc.) in order to pursue mutual interests or goals. One of the most pervasive types of virtual community includes social networking sites, which consist of various online communities. Virtual communities are used for a variety of social and professional groups. r. Web 2.0- Concept based on participants’ abilities to exploit emergent group-forming behaviors and collaborate with others online in a Web-scalable environment. This concept includes the use of asynchronous collaboration capabilities and Really Simple Syndication (RSS) feeds. 19