This is the key to being able to enforce and maintain global tyranny, now almost fully in place. This will allow seamless C2 over all foreign troops/mercenaries, Xe/Blackwater/EODT, Local & State Police, Firefighters/All other 1st responders/InfraGard/FBI/NRO (& all of its subordinates)/All defense contractor BlackOps/MILCOM/Chinese "anti-terror" police/ worldwide, in real time. http://washingtontechnology.com/Articles/2009/09/01/Unisys-Stealth-encryption-for-JFCOM.aspx?Page=1
Joint Forces Command to test new network encryption
Successful deployment could encourage cloud usage
* By Amber Corrin
* Sep 01, 2009
The U.S. Joint Forces Command plans to begin using a new encryption technology that will allow separate, secure virtual communities to coexist on a single network infrastructure. The move, planned for later this month, will protect data while reducing costs by collapsing local-area networks.The new cryptographic technology enables the convergence of various Defense Department Global Information Grid networks that operate at different security levels, which currently require individualized infrastructure designed to handle restricted data – and also individualized costs.
“The government spends a considerable amount of money on these networks, and they’ve been looking for years for a way to combine them,” said David Gardiner, vice president of security technology and solutions at Unisys
, which is deploying its Stealth technology under a one-year JFCOM contract.[INSERT:
John OsterholzChair, Technical Council[INSERT: IF YOU FAIL, THE NEW WORLD ORDER WILL DIE.]
Network Centric Operations Industry Consortium
Vice President, Advanced Network Systems BAE Systems John Osterholz serves as the Chair of the Technical Council, Network Centric Operations Industry Consortium (NCOIC).
The NCOIC is an international not-for-profit corporation formed in 2004, and dedicated to forming a common industry-wide technical infrastructure for enabling network centric operations – for faster delivery of NCO solutions to customers worldwide. He became Chair in April 2008.
Osterholz is Vice President of Advanced Network Systems, BAE Systems. He has served as Vice President and General Manager for Integrated C4ISR and Vice President of the Center for Transformation within Electronics and Integrated Solutions (E&IS) Operating Group of BAE Systems. Osterholz is responsible for the establishment of BAE Systems capabilities as an industry leader in net-centric operations related programs, and for the integration of modeling, simulation and operations analysis capabilities across the E&IS Group.
Prior to joining BAE Systems in early 2004, he was a senior executive in the U.S. Department of Defense. As director of C4ISR Architecture and Interoperability, Osterholz was responsible for the development, oversight and integration of DoD Global Information Grid architecture and programs relating to the strategy of information superiority. He has held several leadership positions within the government including director, C4ISR Integration Support Activity; director, Military Satellite Office; deputy director, Defense Information Systems Agency (DISA); and assistant director, White House Military Office.
Prior to his assignments in Washington, D.C., Osterholz served as a U.S. Army officer with assignments in special operations, reconnaissance and intelligence. He is the recipient of the Secretary of Defense Medal for Distinguished Service in the aftermath of September 11th, The Federal IT 100 award, three-time recipient of the Presidential Rank Meritorious Executive Award, Federal Interagency Council Leadership Award and the White House Military Office Distinguished Service Medal.
He holds a bachelor’s degree in Physics from Rutgers University and a master’s degree in Information Systems from George Washington University.
November 2002. Still no raid. Singh threatens to send her report to ten Chief Intelligence Officers
per month until something is done (i.e., until Ptech is raided). She begins by personally bringing the Ptech story to
Charlie Lewis, a Chief Technology Architect for Air Products and Chemicals
(a powerful company which had earned over 5.7 billion dollars in sales during 2000); to the CIO of Gartner
(a major enterprise architecture / IT firm); to the CIO of the U.S. Department of Defense; and to John Osterholz
, DOD Director of Architecture and Interoperability.
# December 6, 2002. Ptech is raided by Operation Greenquest, but the White House announces that Ptech is clean - on the very day of the raid: "The material has been reviewed by the appropriate government agencies, and they have detected absolutely nothing in their reports to the White House that would lead to any concern about any of the products purchased from (Ptech)."
# April 2003. Singh is debriefed at the National Threat Assessment Center (CERT).
__________________________________________________________Defense Department Will Require IPv6 Compliance, Says DoD's John OsterholzMarket Wire
, June 2003 IPv6 SUMMIT -- John Osterholz, director of architecture and interoperability for the Department of Defense, told a gathering of technology elite that the DoD would phase out purchases of IPv4 network technologies by this fall and would instead begin trials of equipment and applications based on the new IPv6 protocol for the Internet within 30 days. He said the move was intended to build a "Global Information Grid" of Net-Centric operations that was fully distributed, available and secure. He noted that this would be an important part of fighting terrorism and ensuring homeland security.
"Al-Qaeda maintains a low profile and is highly distributed," noted Osterholz. "Until recently, we had no capability to operate similarly, and we understand it is an important capability. They were Net-Centric, we were not. Their command and control capability requires us to have a similar capability."
In his keynote, Osterholz laid out his plans for moving the entire DoD information technology infrastructure -- the world's largest, with an annual IT budget exceeding $30 billion -- into full IPv6 compliance by 2008. This represents an unprecedented move by the Defense Department to approach the entire commercial Internet infrastructure, which includes IPv6 Summit sponsors Cisco (NASDAQ: CSCO), Hewlett-Packard (NYSE: HP), Nokia (NYSE: NOK) and the Verio division of NT&T (NYSE: NTT), with detailed instructions on the networking standards it plans to support.
Historically, the DoD has created or commissioned vendors to build proprietary infrastructure. But the DoD's need for global, immediate access to secure, real-time information has moved the department from an infrastructure of data links between proprietary systems to a secure global enterprise built on the next generation of open systems. Osterholz called this system the Global Information Grid (GIG) and said one of its primary DoD uses will be "predictive battlespace awareness" that combines intelligence and operations technologies in a connected, real-time environment.[INSERT: Predictive Battlespace Awareness to kill 307,000,000 Al-Qaeda in America]
"Our soldiers need better information in order to make better decisions -- who to help and who to kill," continued Osterholz. "The lack of security and flexibility in the current IPv4 protocol is a drag on our wing. This isn't about do you trust the Internet for your kid's homework, it's do you trust your kid's life. If we fail, people die."
“It’s a community-of interest-problem for data in motion,” Gardiner said. Under the contract, Stealth will be assessed at JFCOM’s site in Norfolk, Va., and its subordinate Joint Transformation Command for Intelligence site in Suffolk, Va. If the tests are successful, the technology could be deployed on a wider basis – perhaps even overseas, Gardiner said.[INSERT: "perhaps overseas"?, it's going to simultaneously be global, wtf do they think 10+ years of JWID/CWID was for?]
Stealth works by splitting bits of data into multiple packets as it moves through the network, then reassembles the information packets when delivered to authorized users. Only authenticated users who have obtained a workgroup key, authorized by a Stealth Solution server, would have the means to reassemble and unscramble the packets.
“Stealth is unique in its security capabilities; the encryption technology makes a lot of sense,” said Juergen Urbanski, managing director of industry analyst firm Tech Alpha. “Security is just one barrier to cloud adoption, and we’re seeing a tipping point among enterprises endorsing the cloud more broadly,” which could offer more wide-ranging possibilities for the bit-splitting technology.
“It’s an obvious on-ramp for a heavy-duty move to the enterprise cloud” on an industrywide basis, Urbanski said.
Still, hurdles remain for commercial adoption of such capabilities. “Wider adoption of Stealth will depend on bigger-picture issues like these barriers to cloud computing,” Urbanski said, adding that standardization and virtualization for data security and storage will also be important for the technology to grow.