| | Joint Deployable Intelligence Support System (JDISS) |
| | Primary Purpose | JDISS is responsible for providing three classes |
| | of Information Technology (IT) products: (1) |
| | accredited software baselines, (2) optional |
| | corporate services, and (3) remote and on-site |
| | support functions. The fully interoperable set |
| | of JDISS products work together to meet the |
| | mission requirements of US Intelligence Community |
| | (IC) producers and their US and allied customer |
| | organizations. Through JDISS, the supported IC |
| | producers and consumers achieve full connectivity |
| | with standards-based, community IT |
| | architectures. JDISS provides access to imagery, |
| | finished intelligence products, and assists in |
| | putting together the order of battle. |
| | Sub-Functions | JDISS products and services, allow DoD, Joint, |
| | National and Coalition users to access databases |
| | across the Intelligence Community (IC). With this |
| | connectivity, they gain access to critical |
| | Intelligence Mission Applications (IMA's), |
| | databases, and products. JDISS products perform |
| | their critical mission support functions by |
| | providing secure and reliable access to the |
| | applications, databases, and products that |
| | facilitate intelligence planning and direction, |
| | collection management, processing and |
| | exploitation, production, and integration and |
| | dissemination. |
| | Equipment Requirements | IBM compatible Pentium II 450 Mhz, 128 MB Ram, |
| | and 9 GB removable hard drive for desktop |
| | applications. |
| | Connectivity Requirements | SCI systems require access to JWICS; GENSER |
| | (Secret) systems require access to SIPRNET. |
| | Crypto Requirements | SCI systems on JWICS require no additional |
| | encryption. GENSER (Secret) systems accessing |
| | SIPRNET may use STU-III or other accredited |
| | encryption methods. |
| | Normal Locations | All major Unified Commands, Joint Commands, DoD, |
| | Component Commands and MSCs, National |
| | intelligence community, NATO and Coalition |
| | partners. |
| | Information Managed | Users are able to utilize JDISS to do |
| | Intelligence Collection Management, Signals |
| | Intelligence, Human Intelligence, Imagery |
| | Intelligence, Measurement and Signature |
| | Intelligence, and Electronic Intelligence. |
| | Products Created | JDISS does not create anything. It allows access |
| | to finished intelligence products and provides |
| | the tools to customize intelligence products |
| | "tailored" for unit specific requirements, |
| | utilization and dissemination. |
| | Lead Service/Contractor | Joint Program Office. Staffed by all service |
| | components. Various support contractors support |
| | the program. |
| | Current Fielding Status | JDISS is a perpetual acquisition program. The |
| | JPO is continually improving the system and |
| | services provided to customers. |
| Known Problems | Accessibility is restricted to the connectivity |
| and crypto requirements. No unclassified access. |
| DIICOE Compliance Rating | JDISS Stand Alone Workstations Level 5. |
| Portions of JDISS That Are Segments of GCCS, |
| GCCS-M, TBMCS, Etc. Level 7. |
| JDISS 4.4(2QFY02) Will Be Level 7 for Both NT and |
| Solaris. |
| Point of Contact | LCdr Bernie Stansbury, JDISS Deputy Program |
| Manager, COMM (301) 669-5961 DSN 659-5961, EMAIL |
| <bstansbury@mcic.navy.mil> |
| Updated by | Capt William Shannon, USMC, CCSC-01 |
|
NEWSLETTER
|
| Join the GlobalSecurity.org mailing list |
|
|
|

