A large defense organization is 24-7 interconnected with with various public and private organizations in sectors such as agriculture, food, water, health care, emergency services, defense industries, telecommunications, energy, transportation, banking and finance, postal, shipping, education, security, police and naturally defense components for land, sea and air.
The Cyberspace or the Global Information Grid is their nervous system, which is composed of hundreds of thousands of interconnected computers, servers, routers, switches, and fiber optic cables that allows critical infrastructures to be interconnected.
On the inside of this nervous system flows data- and information that are essential to operate weapon systems and to deliver adapted services. The quality of products and services are directly related to defense organizations ability to seek/find, capture, aggregate, fusion, adapt to user needs, manage, maintain, protect and share/exchange huge amounts of data and information in a very short time. In order to do all these things one must understand the structure, definitions, and content of data and information resources.
Focusing on something abstract as information is very hard. But as we are listening to our customer, we find out that their problems can be summarized to:
- Users does not trust information systems to be safe, they are uncertain of the quality of data and not sure if there is other relevant information elsewhere. They don't know if they have enough information, and on the same time users are overwhelmed of too much information. They are not sure if they will violate intellectual property rights, and has no idea on their own information responsibilities. They have problems with tracking data and information to its sources and no idea of how the information is classified, etc..
- The Chief Information Officer usually governs the use and development of Information Technologies and Information Systems through policies, strategies and plans. There are very few that has actually done an "information inventory", identifying the actual information resources that the organization is responsible for and their status. If you wonder, try to figure out how many registers exists for people-information (could be staff, salary, training, health care, customers, contractors, address-book, etc.) in your organization.!?
- It takes to much time and effort to build awareness and the needed funding for creating information related solutions. CIO organizations doesn't have that time. It's much easier and faster to get funding from developing and implementing new ground-breaking technical solutions.
But, there are a deep understanding within Defenses on the importance of information. Many of the new initiatives/programs/buzzwords usually has something to do with Information, like Info… Superiority, -Operations, -Warfare, -Quality Mgmt, -Assurance, -Security, -Safety, -Integrity, -Resource Mgmt, -Processes, -Migration, -Forensics, -Products & Services, -Models/Standards, -Architectures, -Fusion, -Integration, -Consolidation, -Classification, -Insurance, etc.
So, many initiatives and programs claims to have a genuine interest in information, but usually they are interested in using information to deliver a certain function, product or service. Their focus is more dedicated towards changing processes, creating new information systems, updating applications and migrating technology. This is fine, it’s great and it will help the Government with many things, but it does not solve the information problem.
Some program have had the mission to drive the IRM-issue forward and to foster tangible information solutions, like Continuous Acquisition and Logistics Support (CALS), Global Information Grid (GIG), Defense Information Infrastructure (DII) Common Operating Environment (COE), Net-Centric Data (& Information) Strategy, Enterprise Integrated Data Environment (EIDE), Focused Logistics Enterprise (FLE), Information Superiority and the Network Centric Initiatives, and many more.
The program (that we are aware of), which is closest to recognize information as a strategic resource is the commendable Net-Centric Data Strategy (NCDS), but that program has little impact on other information resources than those needed for Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR). The risk is great that NCDS will just cover the subset of enterprise-, people-, product- and geographical information needed for C4ISR.
The Net centric environment indicates that data and information will be communicated and shared with all the public and private institutions that were mentioned in the beginning, so this isn’t just a Defense problem. International standards must be used to enable the interoperability, management and security of all basic information resources.
Being Information Superior in the future, means that one must capture, interpret and utilize information faster and more efficient than ones competitors. This can only be done if the information is so well understood so it can be processed automatically. Everyone can transmit information at the speed of light, but only those who can go from information capture to a final decision at "no time", are truly information superior. The name of game in the future is automation.
What do we need to do? Understanding and improving on the quality of our data and information resources are essential. This can be a long and tedious effort, but it is well spent resources. A quality assured information resource, is something that builds trust, security and good-will. When information is well defined, then rules and triggers can be defined to handle automated processing. The first areas to be processed are quality control, updates, security checks, constraints, contextual controls, structural relations, authenticity and traceability.
Before that, Defenses must influence current IT/IS programs to re-focus some of their efforts on data- and information related problems. Funding must be secured for the Defense Information Governance, aiming for all services to have access to trusted, quality assured, secure and adapted data- and information resources.
Defenses can based on these resources create trusted and automated services (Service Oriented Architectures can't function without shared information), and they can in a controlled way share data- and information resources (interoperability) with users, partners, allies, contractors and vendors. Defenses will reduce risks (managing risk by managing information), reduce lead-times, increase quality in products and services, reduce costs, increase trustworthiness, confidence and reliance and increase the ability to learn from experiences and to predict future outcomes.