A "… globally interconnected, end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel.”
The GIG is managed by a construct defined as GIG Enterprise Management (GEM), GIG Net Assurance (GNA), and GIG Content Management (GCM). These functions are to be operationally and technically integrated to ensure effective monitoring, management, and security. The GIG enables authorized users to access and share timely and trusted information from any location at any time.
The Commander (CDR) of US Strategic Command (USSTRATCOM), in coordination with DoD and Global NetOps employs to operate and defend the GIG to ensure information superiority.
GIG is the globally interconnected, end-to-end set of information capabilities, associated processes and personnel for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel.
The global information grid includes owned and leased communications and computing systems and services, software (including applications), data, security services, other associated services and National Security Systems.
Personnel who make decisions within the GIG and handle the transmitted information over the GIG constitute the critical component and therefore are a part of the GIG enterprise.
GIG data shall be shared and exchanged through common interoperable standards in accordance with DoD net-centric data strategy.
The GIG will operate within the worldwide interconnection of communications networks, computers, databases, and consumer electronics that make vast amounts of information available to users. The GIG is not a self-contained and isolated network. It takes advantage of the global information infrastructure, which encompasses a wide range of equipment, including cameras, scanners, keyboards, facsimile machines, computers, switches, compact disks, video and audio tape, cable, wire, satellites, fiberoptic transmission lines, networks of all types, televisions, monitors, printers, and much more.
The GIG enterprise is the backbone of Cyber Operations. Its scope and organization define Cyber Operations, which are all-inclusive of all DoD systems, without exception. The design and operating methods of the GIG enterprise will define the security, the interoperability of all components, the reliability, availability and transmission characteristics of everything that can be defined as DoD cyber operations.
Though various components of the GIG will be implemented through decentralized operations, the over-arching objectives of the GID dictates the policies that govern what local units must comply with. The key objectives of the GIG can be therefore stated as delivering a “…unifying architecture that makes it possible to access and to share timely and trusted information from any location at any time.”
The GIG objectives are formidable. They propose to deliver to more than five million military, civilian and allied personnel an access and an opportunity to use of information that is 100% reliable, 100% secure and operationally useful.
It is not at all clear how the ambitious GIG objectives can be met in the foreseeable future.