Group analyzes NMCI while services lighten app load

Group analyzes NMCI while services lighten app load

Personnel from the Defense Operational Test and Evaluation division finished an assessment of the Navy-Marine Corps Intranet last Friday and will spend the next 30 days analyzing the results. The division tested thousands of computer seats that have been transferred to NMCI and that now ride on the NMCI infrastructure.

Meanwhile, the Navy and Marine Corps continue to whittle away the systems' excess applications.

Speaking at a plenary session at the 2002 Military Communications Conference in Anaheim, Calif., yesterday, Rear Adm. Charles L. Munns gave an update on the $6.9 billion outsourcing program led by Electronic Data Systems Corp.

Munns said the Navy started with more than 100,000 legacy applications riding on thousands of disparate networks, and in about five months has reduced that number to 30,000. The Marine Corps chopped 8,000 apps down to 428, Munns said.

Munns said his office has directed 23 Navy managers, in charge of divisions ranging from maintenance and administration to logistics and nuclear propulsion, to get that number down to 2,000 apps.

"What we're doing is to try to bring some order to where our information is," Munns said.

Prior to NMCI, Munns said, a team assessed the Navy's security and found more than 140,000 vulnerabilities.

NMCI removes those security risks by:

  • Screening incoming e-mail

  • Requiring longer log-on times

  • Implementing computer lock-outs after 15 minutes of inactivity, which requires users to re-enter their passwords

  • Requiring a longer log-on process for using its public-key infrastructure.

  • Featured

    • automated processes (Nikolay Klimenko/

      How the Army’s DORA bot cuts manual work for contracting professionals

      Thanks to robotic process automation, the time it takes Army contracting professionals to determine whether prospective vendors should receive a contract has been cut from an hour to just five minutes.

    • Russia prying into state, local networks

      A Russian state-sponsored advanced persistent threat actor targeting state, local, territorial and tribal government networks exfiltrated data from at least two victims.

    Stay Connected