Some basic facts to begin.
Analog and digital communications have almost entirely been a nation-state controlled enterprise. The process is the same for IT.
The Internet itself was created and enabled by the military and academic institutions for the sole purpose of collaboration.
The Internet is a massive network of networks, a networking infrastructure. It connects millions of computers together globally, forming a network in which any computer can communicate with any other computer as long as they are both connected to the Internet. Information that travels over the Internet does so via a variety of languages known as protocols.
J.C.R. Licklider was the director under ARPA/DARPA implemented his “Galactic Network” concept. He envisioned a globally interconnected set of nodes through which everyone could quickly access data and programs from any site. Licklider was the first head of the computer research program at DARPA, starting in October 1962. While at DARPA he convinced his successors at ARPA, Ivan Sutherland, Bob Taylor, and MIT researcher Lawrence G. Roberts, of the importance of this networking concept. The program he outlined for achieving this symbiosis was supported by the Advanced Research Projects Agency. From his work came the basis for timesharing, virtual memory and resource sharing. DARPA’s Internet Protocol Suite, TCP/IP would be developed and used in the creation of the NSF’s network. The ability of TCP/IP to work over most pre-existing communication networks insured the rapid growth of the Internet and the widespread standard of the Transmission Control Protocol/Internet Protocol.
Licklider obtained an MA in psychology, a PhD in psychoacoustics and in 1963, he was named Director of Behavioral Sciences Command & Control Research at ARPA.
The World Wide Web, or simply Web, is a way of accessing information over the medium of the Internet. It is an information-sharing model that is built on top of the Internet. The Web uses the HTTP protocol, only one of the languages spoken over the Internet, to transmit data. Web services, which use HTTP to allow applications to communicate in order to exchange business logic, use the Web to share information. The Web also utilizes browsers, such as Internet Explorer or Firefox, to access Web documents called Web pages that are linked to each other via hyperlinks. Web documents also contain graphics, sounds, text and video.
The Web is just one of the ways that information can be disseminated over the Internet. The Internet, not the Web, is also used for e-mail, which relies on SMTP, Usenet news groups, instant messaging and FTP. So the Web is just a portion of the Internet, albeit a large portion, but the two terms are not synonymous and should not be confused.
The World Wide Web, abbreviated as WWW and commonly known as the Web, is a system of interlinked hypertext documents accessed via the Internet. With a web browser, one can view web pages that may contain text, images, videos, and other multimedia and navigate between them by using hyperlinks. Using concepts from earlier hypertext systems, British engineer and computer scientist Sir Tim Berners-Lee, now the Director of the World Wide Web Consortium, wrote a proposal in March 1989 for what would eventually become the World Wide Web. He was later joined by Belgian computer scientist Robert Cailliau while both were working at CERN in Geneva, Switzerland.
In 1998, Carl Kesselman, Steve Tuecke and Ian Foster attempted a definition in the book “The Grid: Blueprint for a New Computing Infrastructure as ““coordinated resource sharing and problem solving in
dynamic, multi-institutional virtual organizations.”
“The sharing that we are concerned with is not primarily file exchange but rather direct access to computers, software, data, and other resources, as is required by a range of collaborative problem solving and resource-brokering strategies emerging in industry, science, and engineering. This sharing is, necessarily, highly controlled, with resource providers and consumers defining clearly and carefully just what is shared, who is allowed to share, and the conditions under which sharing occurs. A set of individuals and/or institutions defined by such sharing rules form what we call a virtual organization.”
This is the best and most clear vision for the global grid being frameworked into the following.
Computational Grid: These grids provide secure access to huge pool of shared processing power suitable for high throughput applications and computation intensive computing.
Data Grid: Data grids provide an infrastructure to support data storage, data discovery, data handling, data publication, and data manipulation of large volumes of data actually stored in various heterogeneous databases and file systems.
These don’t need much explanation. Data crunching, mathematical processing and information data libraries.
Collaboration Grid: With the advent of Internet, there has been an increased demand for better collaboration. Such advanced collaboration is possible using the grid. For instance, persons from different companies in a virtual enterprise can work on different components of a CAD project without even disclosing their proprietary technologies. [Compute Grid]
Network Grid: A Network Grid provides fault-tolerant and high-performance communication services. Each grid node works as a data router between two communication points, providing data-caching and other facilities to speed up the communications between such points. [Information Sharing, Real Time collaboration]
Utility Grid: This is the ultimate form of the Grid, in which not only data and computation cycles are shared but software or just about any resource is shared. The main services provided through utility grids are software and special equipment. For instance, the applications can be run on one machine and all the users can send their data to be processed to that machine and receive the result back.
Others conceived are:
Scavenging Grid – A scavenging grid is most commonly used with large numbers of desktop machines. Machines are scavenged for available CPU cycles and other resources. Owners of the desktop machines are usually given control over when their resources are available to participate in the grid. [That’s our ocean for surfing]
Service Grids – These types of Grids combine the physical elements of grid interconnection (high speed, fabric-like network interconnect) with web services program to program architecture to deliver an environment that allows different applications, running on varied operating environments, to run and interoperate. [different strokes for different folks]
Campus Grids – As capacity needs and demands for greater economy increase, organizations can combine their Cluster Grids into Campus Grids. Campus Grids enable multiple projects or departments to share computing resources in a cooperative way. [private networking on higher levels]
I wish to focus on the Global Grid.
Global Grids – When application needs exceed the capacity of a Campus Grid, organizations can tap partner resources through a Global Grid. Designed to support and address the needs of multiple sites and organizations sharing resources, Global Grids provide the power of distributed resources to users anywhere in the world.
How can the world order succeed? It must be a CONTROLLED GRID. Though, in order to really be a grid it must be broad, collaborative and uncontrolled to certain degrees. The transmission protocols are already standardized but advances in speed and bandwidth are in terabyte per second ranges. The Global Grid will interconnect multiple grids. All of the above and with an advanced Utility Grid they will be able to access any platform, enterprise system or framework.
THE ENTERPRISE SYSTEM:
Enterprise system: a system that serves more than one Component. A collection of organizations that has a common set of goals and/or a single bottom line. In that sense, an enterprise can be a government agency, a whole corporation, a division of a corporation, a single department, or a chain of geographically distant organizations linked together by common ownership.
Community of Interest (COI): a collaborative group of users that must exchange information in pursuit of shared goals, interests, missions, or business processes. Must have shared vocabulary for the information it exchanges.
DoD DEPARTMENT OF DEFENSE
Carefully crafted language on published sites still openly discusses and confirms the target for civilian and defense data sharing. Under the SOA [DODAF. TOGAF, GIG
GLOBAL INFORMATION GRID – Architectural Vision [GIG]
click image to enlarge
By globally and robustly networking forces, sensors, users, platforms, applications,information, and decision makers, the target GIG enables net-centric warfighting, business and intelligence missions and operations that leverage the power of information, and support achieving information superiority, decision superiority, and, ultimately, full-spectrum dominance. This dramatically improves information-sharing and command and control capabilities by enabling faster, better decision-making, thereby improving the ability of joint forces to operate in environments that are more complex, uncertain, and dynamic. Some examples of the operational benefits this
information sharing environment provides include:
o Increased Shared Situational Awareness and Understanding on the battlefield, in business processes, and intelligence operations through near–real-time information sharing and collaboration. Users can relate the information to their particular situations and perspectives; draw common conclusions; make compatible decisions; and take appropriate action related to the overall situation.
o Increased Speed of Command through the real-time availability of quality information for decision-making and the ability to rapidly and effectively disseminate direction including the Commander’s intent.
o Greater Lethality results from the real-time availability of trusted, reliable information at widely dispersed locations with different classification levels, improved command and control, and enhanced collaboration.
o Greater control of Tempo of Operations by depending on networked environment(and global reach) to support dynamic planning and redirection.
o Increased Survivability through improved situational awareness.
o Streamlined Combat Support by providing users access to the latest, most accurate, most relevant information
o Effective Self-Organization of support organizations through shared situational awareness and collaboration, including understanding of the warfighter’s changing and present needs.
Over time, the dramatically improved information capabilities, provided by the target GIG, enable new concepts of operations, new tactics, and new processes/procedures in support of warfighting, business, and Defense intelligence missions and operations.
click image to enlarge
Section 5: Technical Vision of the Target GIG
o Mobile Ad-hoc NETworks (MANETs) and sensor technologies that support the building of ubiquitous, assured, and agile tactical networks that are federated with the non-tactical domains of the target GIG. Mobile and sensor technologies enable
(1) users, appliances, intelligent agents, and other edge devices, wired or wireless;
(2) universal access; and (3) exchange of video, voice, and data information of any kind, from anywhere. These networks are self-healing and allow for reconfiguration around failed nodes.
o Human computer interaction (HCI) technologies that (1) address methodologies, processes, and techniques for designing, implementing, and evaluating human computer interfaces, and (2) provide descriptive and predictive models and theories of interaction. The long-term goal of HCI is to design systems that minimize the barrier between the human’s cognitive model of what they want to accomplish and the computer’s understanding of the human’s task.
o Ubiquitous RFID tagging for tracking of products, components, and humans throughout the target GIG. As with any GIG capability, the extent that tracking of humans is allowed is governed by law and DoD policy.
o Very large-scale data storage, delivery, and transmission technologies that support the need to index and retain streaming video and other information coming from the expanding array of theater airborne and other sensor networks. The target GIG supports capacities exceeding exabytes (1018 bytes) and possibly yottabytes (1024bytes) of data.
o High performance computing technologies that will enable the full implementation of Grid computing and services.
o Grid computing technologies that provide support and manage an assured
federation of heterogeneous computing, storage, and communications assets
available from the GIG infrastructure, and managed as Grid Services by NetOps. The physical characteristics of grid services are generally transparent to users and applications. Grid services provide the necessary qualities of service and protection to enhance NCO. Grid services enable the sharing of these assets across DoD administrative, organization, and geographic boundaries.
o Black core enabling technologies that support end-to-end protection of information exchanged among users and services located anywhere in the target GIG. The ‘core communications infrastructure’ of the GIG is the set of diverse networks and connections owned and managed by different DoD services and organizations. A black core is a set of core components where all data traffic moving among these components is encrypted end-to-end. A black core that extends out to the tactical environment to include user networks and devices will support mobility, security, and
survivability in the target GIG. 27 Black core enabling technologies will address, for example, scalable routing, quality of service, and discovery capabilities that will be provided in the target GIG. Black core supports the evolution of the GIG from a system-high perimeter protection model to a transaction-based Enterprise IA protection model. Figure 10 provides a conceptual view of an end-to-end GIG with a black core.
click image to enlarge
Are beginning to get visual? Keep in mind that the DoD was in the mix at all times in regards to the internet. Running free was the operational side of the world wide web.
Though there was substantial data mining processes being garnered from the web, it was pretty much running free. That now changes. Along with the DoD the other partners from the committee corporations to the law enforcement agencies will begin to migrate to the global grid.
From the Department of Defense Architectural Framework site and the DoDAF V2.0 version
() System has changed from DoDAF V1.5. System is not just computer hardware and computer software. System is now defined in the general sense of an assemblage of components – machine, human – that perform activities (since they are subtypes of Performer) and are interacting or interdependent. This could be anything, i.e., anything from small pieces of equipment that have interacting or interdependent elements, to Family of Systems (FoS) and System of Systems (SoS). Note that Systems are made up of material (e.g., equipment, aircraft, and vessels) and Personnel Types.
http://cio-nii.defense.gov/sites/dodaf20/relationships.html – connecting the global grid
Relationships to Other Architecture Frameworks/Reference Documents
The DoDAF approach to alignment is to incorporate relevant concepts into DoDAF from other frameworks and reference documents and understand, integrate and describe the differences.
Frameworks are documents that describe useful methods, practices, and procedures for developing Architectural Descriptions. Frameworks can be prescriptive (e.g., their use is required) or descriptive (i.e., their use is recommended). DoDAF has both prescriptive and descriptive elements that organizations within the Department require its use in developing Architectural Descriptions that respond to their mandates.
Federal Enterprise Architecture Program
The Zachman Framework
The Zachman Framework provides a formal and highly structured way of defining an enterprise. It is based on a two-dimensional classification model, displayed as a matrix, which utilizes six basic communication interrogatives (What, How, Where, Who, When, and Why) and intersecting six distinct model types which relate to stakeholder groups (Strategists, Executive Leaders, Architects, Engineers, Technicians, and Workers) to give a holistic view of the enterprise. Decomposition of the matrix allows for several diagrams of the same data sets to be developed for the same architecture, where each diagram shows an increasing level of detail. DoDAF V2.0 supports the needs of various stakeholders’ perspective by supporting various levels of abstraction and granularity.
The Open Group Architecture Framework
The Open Group Architecture Framework (TOGAF) is a comprehensive architecture framework and methodology, which enables practitioners to design, evaluate, and build an appropriate architecture for the organization. The TOGAF Architecture Development Method (ADM) supports the TOGAF architecture development approach for architectures that meet business needs. TOGAF’s ADM prescribes methodology, not products, or modeling notation, and should be used with other architecture frameworks as appropriate. TOGAF evolved from the DoD Technical Architecture Framework for Information Management (TAFIM). DoDAF V2.0 and TOGAF both provide a practical, design agnostic method for creating enterprise architectures. The DoDAF V2.0 “Fit-for-Purpose” approach for developing views, presentations, or generated reports are based on TOGAF’s business, data, application, and technology views.
The Ministry of Defence Architecture Framework _EU
Ministry of Defence Architecture Framework (MODAF) is based on the DoDAF V1.0 baseline, which it represents through the MODAF Meta Model (M3). MODAF retains compatibility with United States modeling initiatives, but is specifically designed to support architecture modeling for the UK Ministry of Defense (MOD) business. MODAF uses aspects of the existing DoDAF with additional viewpoints (acquisition, capability) that are required to support MOD processes, procedures, and organizational structures. The additional viewpoints provide a rigorous method for understanding, analyzing, and specifying capabilities, systems, System of Systems (SoS), business processes, and organizational structures. DoDAF V2.0 incorporates the data elements from MODAF required to support an acquisition and capability views in DoDAF V2.0.
NATO Architecture Framework
The NAF provides the rules, guidance, and product descriptions for developing, presenting, and communicating architectures across NATO and other national boundaries. Earlier versions of NAF were tightly coupled to the DoDAF. NAF’s new features include a Capability, Service-oriented, and Program view. DoDAF V2.0 has adopted the capability and program views described in NAF as defined by NAF.
The Architectures described below have a particular impact on the development of Architectural Descriptions in the Department:
DoD Information Enterprise Architecture
DoD Business Enterprise Architecture
The DoD Business Enterprise Architecture (BEA) Architectural Description provides a comprehensive description of the major business areas of the Department, and serves the departure point for integrating DoD business services across the Departmental programs and the JCAs.
DoD Global Information Grid Enterprise Architecture [GIG]
The GIG facilitates mission accomplishment by providing tactical services from the edge in support of the warfighter. The GIG Architectural Description maps operational outcomes in critical strategic and tactical areas to the DoD JCAs. Currently, the GIG contains an Operational Reference Model which provides a functional decomposition of activities associated with the five key areas defined as GIG 2.0 attributes.
click image to enlarge
Connecting to the corporate and mainstream data mines
The Open Group has received my vote for the administrators handling the integration of DoD and non-Military or enforcement domains. You can review the same technologies and mission. You should take at least a few minutes to review this agenda. Also take a look at their membership and partners here.
Quite a Rogues Gallery for me.
I have shown you the vision, some concepts, framework and missions of the global grid. This is the grid in development for over twenty years and preparing to interface internationally. The GENESIS international version will be completed by 2016, by estimating and conceptually indicated in documents.
What this grid will have is connectivity throughout all data mining centers and portal web sites. Access to financial information, credit bureaus, social networking site (Facebook, MySpace, Bebo, Friendster etc), purchasing, medical records (Obamacare), smart grid, utilities, 3G GPA surveillance, travel habits, employment/education history and a full criminal dossier including in-depth psych-profile.
With unlimited data-storage, terabyte speed uploads, massive video/audio surveillance and the implementation of SOA’s for organizing and utilizing distributed capabilities that may be under the control of different ownership domains that discover, interact with each other and are managed and accessible across the global control grid, you have the most complete net-Op system for running the new world order.
I have said several times here that the COMMITTEE loves to present the future in the form of Holyrood documentaries or feature films. If you saw the remakes of Bourne series, The Net, Eagle Eye, Live Free or Die Hard, etc. then you know that a split second is your entire life in terabyte speed. Providing you the wrong medication, igniting a gas leak in your home, changing a camera based street light from green to red without yellow or sending special law enforcement to your house as a fresh killer of your family is very easy.
We have all heard the term soft kill weapons. I started my death with fluoridated water. The GLOBAL GRID will be a silent kill weapon. Finding your bank account missing online, a bank teller saying they know nothing about it and a police call regarding a bank robbery in progress with your description as an irate lunatic with plastique in his underwear may get you killed that day. I can imagine a hundred other scenarios including one in which you go for simple surgery and end up in a heart surgery operating room with a rib splitter in your chest.
Less than a specific targeting such as these still leaves a satellite 3G UAV assassination or framing a scenario online using your information that results in the death of someone else with you as the sole and likely perpetrator. It also allows for government or organizational gangstalking and sabotage which I had experienced in less than a full press ten years ago. With the net-Ops ability squarely in control of the COMMITTEE and shadow operators, you have little recourse but to slowly go “postal” which by the way is a psy-Ops technique with MK-Ultra, pharma and gangstalking elements used. This was the tactic used with Bruce Ivins who was innocent but needed to close the books on the Committee second phase deflection program to 911 false flag.
Feel honored if you get that type of attention but realize that you will be identified for a series of considerations should you exhibit problematic tendencies.