An official website of the United States Government 
Here's how you know

Official websites use .gov

.gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS

A lock ( lock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

CIO Explains DOD's Advancements in Digital Modernization

You have accessed part of a historical collection on defense.gov. Some of the information contained within may be outdated and links may not function. Please contact the DOD Webmaster with any questions.

Protecting the nation's warfighters and enabling them to win on the battlefield is the driving force behind the Defense Department's digital modernization efforts, DOD's chief information officer said.

Speaking at the Air Force IT Day in Washington today, an event sponsored by AFCEA-NOVA, Deasy said the digital modernization effort includes network improvements, including those for command, control and communications, enabled by cloud computing and artificial intelligence, all protected with robust cybersecurity.

Man standing in front of four military service flags gestures while speaking to an audience
Deasy Speaks
Dana Deasy, the Defense Department’s chief information officer, speaks at the AFCEA NOVA-sponsored Air Force IT Day in Washington, Dec. 12, 2019.
Photo By: David Vergun, DOD
VIRIN: 191212-D-UB488-002

The department's comprehensive digital modernization strategy began in the summer of 2018, Deasy said.

DOD started building the Joint Enterprise Defense Infrastructure environment yesterday, he said. JEDI is cloud computing that will be made available across all services.

JEDI's unclassified environment will be built over the next two months, he said. Then, about six months later, the secret environment will stand up, followed later by the top secret layer.

A series of bundles of green wires connected to servers.
Server Wire
North Carolina National Guard server wire connections protect the state’s critical infrastructure through cyber defense in Raleigh, N.C.
Photo By: Army Staff Sgt. Brendan Stephens
VIRIN: 191008-Z-AS768-547C

Among 14 early adopters of JEDI are the Joint Artificial Intelligence Center, U.S. Transportation Command, U.S. Special Operations Command and the Navy, Deasy said. They will test JEDI ''out to the tactical edge across domains'' to inform the way ahead, he added.

Deasy also touched on the JAIC's AI efforts, which have included developing algorithms that were shared with California firefighters who have been busy battling wildfires. These algorithms enable firefighters to detect fire movements and anticipate speed and direction the fire will take, he said, adding that firefighters have said the algorithms have been quite helpful.

The JAIC also will developing AI algorithms for warfighter weapons systems, suicide prevention and health records, he said.

Troops operate computers.
Cyber Protection Brigade
Soldiers of the Cyber Protection Brigade at Fort Gordon, Ga., focus on defending critical infrastructure through defensive cyber operations during Exercise Cyber Blitz 19 at Aberdeen Proving Ground, Md., Sept. 13, 2019.
Photo By: Edric Thompson, Army
VIRIN: 190913-A-LD704-1005

The addition of JEDI and 5G will accelerate the JAIC's efforts, he predicted.

Deasy also summarized other digital modernization efforts taking place.

This fiscal year, he said, DOD will sign a quadrilateral memorandum of understanding with NATO to integrate digital modernization with allies. Also this year, DOD will develop proposals for 5G network dynamic spectrum sharing, and will begin hosting industry 5G network pilot programs at selected installations, he said.

Other milestones for this fiscal year include developing performance standards for supply-chain risk, issuing a cyber workforce management strategy and meeting compliance for 28 of 30 cyber hygiene metrics to keep data safe, Deasy said.

Related Stories