Accession Number : ADA328226

Title :   U.S. C4I and Logistics Vulnerabilities to Offensive Information Warfare.

Descriptive Note : Final rept.,

Corporate Author : NAVAL WAR COLL NEWPORT RI

Personal Author(s) : McKethan, Colton

PDF Url : ADA328226

Report Date : 13 JUN 1997

Pagination or Media Count : 31

Abstract : The information revolution fostered by the microchip has made it possible for military commanders to receive information in unequaled quantity and quality. U.S. commanders have a broad range of opportunities resulting from digitized technologies that enhance of military equipment performance and the application of force. These information advances represent force enablers providing synergistic advantage to operational command and control (C2), intelligence, and logistic functions. However, there is a down side, in that the computers and microchips have vulnerabilities that must be addressed to retain operational force advantage. Information warfare is central to the way the nation plans to fight in the future, and information systems now connect U.S. military forces on a worldwide basis. Despite the enhancements that connectivity brings, with integration of global communications, state and non-state actors are provided new ways to access and undermine the C2, intelligence, and logistics function via computer and communication networks. This new area of vulnerability extends from the strategic, through the operational, down the tactical levels of warfare. State and non-state actors have means of attacking core military centers of gravity and critical strengths without resorting to conventional attack or deception. Today, joint commanders and civilian leaders must seriously consider the ramifications of unwanted intrusion into the national and defense information infrastructures. As U.S. forces become increasingly dependent on information to leverage battlespace awareness the need to protect information systems will increase. Backup capability must be designed into the information infrastructure to preclude erosion of force application capability.

Descriptors :   *INFORMATION SYSTEMS, *COMMUNICATIONS NETWORKS, DEPARTMENT OF DEFENSE, VULNERABILITY, CHIPS(ELECTRONICS), INTEGRATION, COMMAND AND CONTROL SYSTEMS, COMPUTER APPLICATIONS, DEFENSE PLANNING, DECEPTION, INTRUSION, GLOBAL COMMUNICATIONS, INFRASTRUCTURE.

Subject Categories : Command, Control and Communications Systems

Distribution Statement : APPROVED FOR PUBLIC RELEASE