FREE ELECTRONIC LIBRARY - Dissertations, online materials

Pages:     | 1 |   ...   | 7 | 8 || 10 | 11 |   ...   | 25 |


-- [ Page 9 ] --

Recommendation - PrioritizeR&D Investment with Focus on Military-Unique Information Technology "* Technology is not a major impediment to information dominance on the battlefield "* The commercial information industry leads in technology and research investment "* Information technology is available globally "* DoD should:

- Invest in military-urique information technology R&D

- Give special attention to information protection technology

- Use the best commercial technology Action: DDR&E ensure that R&D strategy capitalizes on commercial technology and focuses DoD investment in military-unique information technology Figure 6-4

-48With respect to modem information systems, component technology is not the major impediment to information dominance on the battlefield. DoD must assume that both current, and increasingly, more capable commercial technologies will be available, acquired, and used by friend and foe alike. It will be important to stay abreast of current and emerging technology but our real discriminator will be our ability to continuously infuse these technologies and to configure and reconfigure the ensuing products to support joint warfare.

Key to technology insertion is the recognition that the commercial information technology industry leads in technology and research investment. DoD has seen advances in office automation systems, mapping systems, imagery processing and GPS. Those technologies and resultant products are available from the global marketplace.

With the increasing dependence on information technologies and the explosion of interconnected networks and databases, the importance of information and information systems protection has grown significantly.

In response to this dramatically changed environment, it is important for the DoD to recognize that it must accelerate its efforts along a two-pronged course. First, it must continue its emphasis on supporting and infusing best commercial technologies. This will allow DoD to piggyback off of the tremendous R&D investments being made in the commercial marketplace. Secondly, the DoD should continue its investments in militaryunique information technology R&D. Those technologies that are stressed by military applications should be given priority and, in particular those that support enhanced reconfiguration and information and information systems protection. Special attention should be given to information and information systems protection because of the increasing reliance on commercial products and systems and the increased threat of the use of information warfare as a weapon against C4I systems.

The Task Force recommends that DDR&E continue to leverage commercial information systems technology to facilitate rapid technology infusion and reprioritize R&D investment to differentiate military-unique information technology in support of enhanced reconfigurability and information and information systems protection.



7.1 Key Findings and Observations The charge to this Defense Science Board Summer Study Task Force was to make recommendations for implementing an information architecture that would enhance combat operations by providing commanders and forces at all levels with required information displayed for immediate assimilation to decrease decision cycle time. The Task Force saw a variety of good information system initiatives among the Services and agencies as well as DoD policies and procedures that, if enforced, should motivate interoperability of such information systems. The key observations of the Task Force are outlined in Figure 7-1.

–  –  –

Figure 7-1 Make the Warfighter an Informed Customer. There is a need to strengthen the CINC's expertise. While the CINC an.! staff need to better understand how information and information systems might be better employed, the CINC needs better technical support to be able to identify and articulate his requirements, apply promising technologies to operational needs, and improve the linkage between field user and developer. The ever increasing importance of information warfare requires focus on both its opportunities and its vulnerabilities. A new staff function, run by a combat arms officer, should build the CINC's strategic and tactical information warfare plan, both offensive and defensive.

-50In addition, the CINCs and JTF commanders also need to exercise their information systems through virtual combat every day. The goal is to allow the CINC to practice and to fight from the same seat and same sys~m, every day. The simulations of the battlespace must allow the CINC, his components and tactical formations to test employment concepts with Red Teaming. CINC and component practice and rehearsals of envisioned employment concepts will raise confidence of success and improve force readiness.

Warfighters Need to Change Information Systems to Accomplish Different Missions. During the Cold War, there was potential for nuclear and conventional conflict with the Warsaw Pact on a global scale. The information paradigm that matched this concept of operations put the customer at the top-the National Command Authority (NCA). Today, the principal customer to be served is the CINC/JTF Commander and below, charged with the responsibility to conduct decisive regional conventional operations. Actionable information is needed, the kind of information necessary to fight forces and win-as compared to formulating broad policy or building national level strategic plans. The handling and use of such information is the issue: getting it where it is needed in a timely and reliable manner.

The CINC must control the process. In order for the CINC to carry out his mission, he must exercise control of his information support. Information must flow to the field leader/weapons operator who is on the move, under great stress and very busy. He needs

the information:

* In a timely manner, to achieve decisive advantage while maintaining situational awareness, controlling the battle space and denying/disrupting his enemy's information flow;

9 At all levels of execution in common, but somewhat adaptable, format; and e In a fashion that is protected but not restrictive to timely use.

U.S. Information Systems are Highly Vulnerable to Information Warfare; So Are Our Adversaries.' In addition to the importance associated with the use of information in warfare, the Task Force found U.S. information systems highly vulnerable to "Information Warfare" (IW). The Task Force was briefed on activities and capabilities that caused concern over the integrity of the information systems that are a key enabler of military superiority. The Task Force found similar vulnerabilities in the information systems of potential adversaries. U.S. military forces and their commanders need to be able to exploit these vulnerabilities as an integral capability, similar in character to traditional weapon systems. These systems should become an integral part of the joint training and exercise programs of the CINCs.

An evolving strategy and capability to wage IW may be the most important facet of military operations since the introduction of stealth. Unlike the "hard" munitions of combat, IW assets have near-instantaneous global reach and can pervade throughout the spectrum of conflict to create unprecedented effects. Further, with the dependence of modem commerce and the military on computer-controlled telecommunication networks, data bases, enabling software, and computers, the U.S. must protect these assets regarding their vulnerabilities.

The overarching strategy is to mesh these interlocking defensive and offensive aspects of IW with national policy, military operations and intelligence community initiatives. A serious impediment to evolving a coherent and practical IW strategy is the

-51current lack of any national policy on this matter. Further, there is no well defined "threat" to U.S. information systems. Protection of U.S. information systems is also clouded by legal restrictions put forth, for zxample, in the Computer Security Act of 1987.

Of concern to the Task Force is the fact that IW technologies and capabilities are iargely being developed in an open commercial market and are outside of direct Government control. In contrast with the very secret development and control of most weapons technologies by the Government, a "third-world" nation could procure a formidable, modern IW capability virtually off-the-shelf. This fact portends a revolution in commercial and military-technological warfare.

As viewed by this Task Force, the nation is under IW attack today by a spectrum of adversaries ranging from the teenage hacker to sophisticated, wide-ranging illegal entries into telecommunications networks and computer systems. As DoD continues the use of a single, integrated operations plan (SIOP) for strategic nuclear warfare, the DoD might want to consider an "Information Warfare SLOP" process. The IW SIOP could be used, in part, to "play" against an adversary IW strategy, examine offensive and defensive deconfliction and would deal with intelligence equity issues.

Buy Commercial Products, Buy Commercial Services, "Buy Into" Commercial Practices. Today, the information system is saturated. Even with control of his information systems, the CINC must cope with the system as it exists today. Much of what is being moved now is of a routine nature, time relevant but not critically time sensitive-weather, logistics status, personnel/admin/finance data, etc.-and much of that cannot reach to lower echelons due to pipe constriction/data rate limitations. More throughput is critically needed. Not only routine, but also time sensitive products need to be distributed across the battle space. A substantial new buy of information systems is not likely. New concepts for information distribution are needed.

The s ution may be in exploiting another information system mode than is currently being emphasized: publishing/broadcasting-the Warfighter's CNN. There is great promise in such an approach in order to vastly increase throughput to operating and tactical levels through the creation of a multi-band broadcast that blankets the battle space.

In the absence of new buys, the logical source of throughput is to reallocate current usage tions of major defense satellite systems, primarily the Defense Satellite Comm!_..

System. The information load would then have to be moved to commercial alter:..,vessatellite, fiber and wire. In the longer term DoD must exploit the broad array of commercial space information systems and services much more.

The Task Force sees a critical need for the Department's acquisition system to facilitate the buying of commercial information products and services, and to '"buy into" commercial business practices. Information system superiority is dependent on an ability The obsolescence cycle for to incorporate the latest in commercial technologies.

commercial information systems is dramatically shorter than DoD's weapon system cycle.

If information is to remain a key discriminator in capability, DoD must link its acquisition cycle to that of the commercial sector.

The Task Force also found a need for DoD to establish a process, in a manner akin to that used for the Internet, that identifies incremental improvements and ensures each of these,nprovements can be accommodated and accepted by the other participants. The process used in establishing Internet has been shown successful in establishing standards by consensus and in allowing continuous integration of improvements, migration of

-52standards, adaptation of commercial products, and distribution of value ad,.,3 products.

Some variant of that process is appropriate for institution within the DoD. The process should include provisions for accommodating the limitations of legacy systems and easing This should be recognized and supported as a their transition to modernization.

continuous process, as there will always be a need to manage transition from old to new systems and technologies.

Finally, while the Task Force found no significant breakthrough R&D areas, it is clear that since potential adversaries have access to the same modern information systems technologies, leveraging of commercial technology through unique military value-added exploitation and investment in defense-peculiar needs will be critical to attaining and maintaining information dominance of the battlefield. Two special needs associated with military information systems are reconfigurability and information systems protection.

Commercial systems are designed to work in relatively static locations, with predictable communications and repeatable information needs. Military scenarios, which are too tions acceptable, require the diverse to make a system designed under these ass capability to be rapidly reconfigured. While the comnufercial world has security concerns, most are focused on protecting access to information. The military has this concern plus the possibility for network disruption. In addition, the mobilization of military systems complicates the ability to authenticate users and their uses of systems.

–  –  –

* Leverage commercial world

- Direct broadcast system

- Buy bandwidth in commercial market

- "Civil reserve" communications and commercial information services capability

- Acquisition cycle for software

- Exploit commercial R&D

–  –  –

#1 Action: SECDEF create a Battlefield Information Task Force.

There is a need to bring together warfighters and developers to establish the future vision, system needs, and evolutionary development plans. The proposed BITF could act

as an agent of change. Its specific functions should include the following:

- Create and utilize "joint battlespace" modeling and simulation for requirement.trades, training and exercises;

- Develop ACTDs to optimize existing capabilities and demonstrate future growth (e.g. broadcast/request modes);

- Exploit current science & technology base programs Demonstrate combat potential of C4I improvements to CINCs via relevant exercises in theater;

- Identify and track C41 performance metrics;

- Provide recommendations to system developers and Enterprise Integration Council;


- Develop ongoing Integrated Process Team charter.

Pages:     | 1 |   ...   | 7 | 8 || 10 | 11 |   ...   | 25 |

Similar works:

«Simultaneous Embedding of Planar Graphs with Few Bends Cesim Erten and Stephen G.Kobourov Department of Computer Science University of Arizona {cesim,kobourov}@cs.arizona.edu Abstract. We present an O(n) time algorithm for simultaneous embedding of pairs of planar graphs on the O(n2 )×O(n2 ) grid, with at most three bends per edge, where n is the number of vertices. For the case when the input graphs are are both trees, only one bend per edge is required. We also describe an O(n) time...»

«A Unifying Methodology for Handovers of Heterogeneous Connections in Wireless ATM Networks C-K T OH Mobile Special Interest Group Computer Laboratory, University of Cambridge King's College Cambridge, CB2 1ST, England E-mail: Chai-Keong.Toh@cl.cam.ac.uk Abstract The aim of Wireless ATM is to provide multi-media services to mobile users. While existing research on Wireless ATM are focussed on handovers of unicast connections, handovers of multicast connections have not been investigated. While...»

«Snakes on a Mane: Medusa, the Body and Serpentine Monstrosity Melissa Skinner-La Porte Medusa and the Hybrid Body This investigation will focus on the physicality of Medusa's monstrosity. Although her petrifying power operates through the non-visible attribute of her gaze, there is always an element of bodily disfigurement in Medusa stories and representations. This disfigurement comes in the addition of snakes to her person, either on her head, around her waist or in place of the lower half of...»

«4th-year Thesis Projects in Chemistry University of Ontario Institute of Technology Oshawa, Ontario Canada L1H 7K4 February 2016 Table of Contents Page Tenured and Tenure-Track Faculty (TTTF) Prof. Yuri Bolshan...2 Prof. Jean-Paul Desaulniers...3 Prof. Brad Easton...4 Prof. Fedor Naumkin...5 Prof. Liliana Trevani...6 Prof. Olena Zenkina...7 Teaching Faculty (TF) Prof. Marc Adler...9 Dr. Kevin Coulter... 10 Guidelines for Selecting a Thesis Supervisor..11 1|Page Professor Yuri Bolshan, Assistant...»

«CONSORTIUM SCK•CEN BELGATOM (GESTER) H.QUARCH Tacis Project N° SCRE1/N°38 Remediation of Uranium Mining and Milling Tailing in Mailuu-Suu District of Kyrgyzstan FINAL REPORT Authors : H. Vandenhove, H. Quarch, JJ. Clerc, JM. Lejeune, L. Sweeck, X. Sillen, D. Mallants and Th. Zeevaert May, 2003 CONSORTIUM SCK•CEN BELGATOM (GESTER) H.QUARCH Tacis Project N° SCRE1/N°38 Remediation of Uranium Mining and Milling Tailing in Mailuu-Suu District, Kyrgyzstan The consortium Belgian Nuclear...»

«CURRICULUM VITAE 2008 KATHERINE CREWE Associate Professor School of Geographical Sciences and Urban Planning College of Liberal Arts and Sciences Arizona State University Contact College of Liberal Arts and Sciences  Office: (480) 965 7267  School of Geographical Sciences and Urban Planning  Fax:: (480) 965 9656  Arizona State University                                          email:  kcrewe@asu.edu ...»

«Distribution Agreement In presenting this thesis as a partial fulfillment of the requirements for a degree from Emory University, I hereby grant to Emory University and its agents the non-exclusive license to archive, make accessible, and display my thesis in whole or in part in all forms of media, now or hereafter now, including display on the World Wide Web. I understand that I may select some access restrictions as part of the online submission of this thesis. I retain all ownership rights...»

«Languages at Risk: A Case Study from Sierra Leone Sullay M. Kanu University of Alberta 1. Introduction This paper seeks to address two issues. First, it seeks to provide evidence against the claim that “West African languages are generally holding their own in the face of globalization and the homogenizing forces of the twenty-first century” (Blench 2007:156). Secondly, it contributes to the current debate on the issue of whether indigenous languages (Brenzinger, Heine & Sommer 1991,...»

«Laure Fauch Acquisition of Multispectral Color Images Using Light-Emitting Diodes Publications of the University of Eastern Finland Dissertations in Forestry and Natural Sciences LAURE FAUCH Acquisition of Multispectral Color Images Using Light-Emitting Diodes Publications of the University of Eastern Finland Dissertations in Forestry and Natural Sciences No 71 Academic Dissertation To be presented by permission of the Faculty of Science and Forestry for public examination in the Auditorium L21...»

«The etymology of Coober Pedy, South Australia Petter Naessan The aim of this paper is to outline and assess the diverging etymologies of ‘Coober Pedy’ in northern South Australia, in the search for original and post-contact local Indigenous significance associated with the name and the region. At the interface of contemporary Yankunytjatjara and Pitjantjatjara opinion (mainly in the Coober Pedy region, where I have conducted fieldwork since 1999) and other sources, an interesting picture...»

«CAMPAIGN STATEMENTS **Student Body President** **Matan Ariel (ma2157): “It's part personality, part management” Matan is pronounced: m’ah / ’t’ah / n (just in case you were wondering) The reason why you should vote Matan for President is simple: I get the job done! Instead of making campaign promises, I ask you to look at my record: I have served on the GS Student Council for the past two and a half years. I attend the meetings, bring proposals, and assist with projects spearheaded by...»

«Office of Public Relations 5400 Ramsey Street Fayetteville, North Carolina 28311-1498 (800) 488-7110 (910) 630-7043 FAX (910) 630-7253 www.methodist.edu FOR IMMEDIATE RELEASE CHERYLE RIVAS January 4, 2006 DIR. OF COLLEGE RELATIONS & MARKETING WACHOVIA MAKES GIFT TO METHODIST COLLEGE TO ESTABLISH SCHOLARS PROGRAM FAYETTEVILLE, NC – The Wachovia Foundation has committed a gift of $250,000 to establish the Methodist College Wachovia Scholars Program. This program will be a distinguished merit...»

<<  HOME   |    CONTACTS
2016 www.dissertation.xlibx.info - Dissertations, online materials

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.