National Academies Press: OpenBook

Avoiding Technology Surprise for Tomorrow's Warfighter: A Symposium Report (2009)

Chapter: 4 Discussions with Invited Speakers

« Previous: 3 Solutions Offered by Scientific and Technical Intelligence
Suggested Citation:"4 Discussions with Invited Speakers." National Research Council. 2009. Avoiding Technology Surprise for Tomorrow's Warfighter: A Symposium Report. Washington, DC: The National Academies Press. doi: 10.17226/12735.
×
Page 22
Suggested Citation:"4 Discussions with Invited Speakers." National Research Council. 2009. Avoiding Technology Surprise for Tomorrow's Warfighter: A Symposium Report. Washington, DC: The National Academies Press. doi: 10.17226/12735.
×
Page 23
Suggested Citation:"4 Discussions with Invited Speakers." National Research Council. 2009. Avoiding Technology Surprise for Tomorrow's Warfighter: A Symposium Report. Washington, DC: The National Academies Press. doi: 10.17226/12735.
×
Page 24
Suggested Citation:"4 Discussions with Invited Speakers." National Research Council. 2009. Avoiding Technology Surprise for Tomorrow's Warfighter: A Symposium Report. Washington, DC: The National Academies Press. doi: 10.17226/12735.
×
Page 25
Suggested Citation:"4 Discussions with Invited Speakers." National Research Council. 2009. Avoiding Technology Surprise for Tomorrow's Warfighter: A Symposium Report. Washington, DC: The National Academies Press. doi: 10.17226/12735.
×
Page 26
Suggested Citation:"4 Discussions with Invited Speakers." National Research Council. 2009. Avoiding Technology Surprise for Tomorrow's Warfighter: A Symposium Report. Washington, DC: The National Academies Press. doi: 10.17226/12735.
×
Page 27
Suggested Citation:"4 Discussions with Invited Speakers." National Research Council. 2009. Avoiding Technology Surprise for Tomorrow's Warfighter: A Symposium Report. Washington, DC: The National Academies Press. doi: 10.17226/12735.
×
Page 28

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

4 Discussions with Invited Speakers The symposium featured three distinguished speakers with unique perspec- tives on the S&TI community: • Dennis Blair, Director of National Intelligence; • Jacques Gansler, Director of the Center for Public Policy and Private Enterprise at the University of Maryland and former Under Secretary of Defense (Acquisition, Technology, and Logistics (AT&L)); and • Robert Hegstrom, Director of the Battlespace Awareness Portfolio, Office of the Under Secretary of Defense, Intelligence (OUSDI). A summary of each speaker’s remarks and the resultant discussions is provided below. Biographies for all three speakers can be found in Appendix F. The Honorable Dennis BLAIR During his address to the symposium audience on the importance of anticipat- ing technological surprise, Director of National Intelligence (DNI) Dennis Blair emphasized that the responsibility of his office is not just to send out warnings of technology surprise, but also to employ technology in prosecution of the IC mission. The United States does a reasonably good job of identifying both offensive and defensive ramifications of high-end technology threats, especially at the nation-state level. However, Admiral Blair stressed that surprise seems to come when benign, well-understood technologies are used in novel ways. An example of this is the use of commercial aircraft as weapons to take down buildings in 22

DISCUSSIONS WITH INVITED SPEAKERS 23 the attacks on September 11, 2001. It was referred to as a failure of imagination to not have anticipated this act. IEDs used in Iraq and Afghanistan are another example of a game-changing surprise despite the U.S. military having previously encountered booby traps during the Vietnam War. IEDs are not new technologies, but instead use existing technologies in a way that was not anticipated and is dif- ficult to counter. Predicting this type of surprise requires more than technological expertise; it necessitates an understanding of how technology may be used in different contexts. The proliferation of technology around the world presents new challenges for the IC in anticipating technology surprise. Potential adversaries have sophis- ticated tools available to them—capabilities that were once accessible only to well-resourced nation-states. Particular Areas of Technology to Watch The DNI discussed with the symposium participants three key areas to watch in anticipating surprise: cyber technology, biology, and the evolution of existing technologies. Cyber technology was emphasized as an area of great focus at present. While the subject is well-warned about in that much has been published about cyber threats, the area retains high potential for surprise. Current governmental strategies may not fully consider the combination of technological expertise and imagination that exists elsewhere. While the 19th century was transformed by chemistry and the 20th century by physics, the 21st century may be defined by advances in biology. This prog- ress may bring both benefits and potential threats. Just as advances in precision in time and space (e.g., GPS technology) revolutionized warfare, so establish- ing identity through biometrics could similarly influence warfare and national security. Finally, evolving technologies may change the operational assumptions upon which systems are built. For example, joint munitions effectiveness manuals’ models for explosive devices had been based on old values for the strength of concrete. As concrete formulations have improved, attacks on hard targets have required specialized technologies to deliver the same effect. This change, caught by the DIA/DWO, demonstrates the importance of reexamining assumptions as seemingly mature technologies evolve over time. Additional Discussion During a question-and-answer (Q&A) session, several additional points were discussed, as described below. A major point brought up for discussion was the observation that it cannot be assumed that adversaries will make decisions based on their own self-­preservation.

24 AVOIDING TECHNOLOGY SURPRISE FOR TOMORROW’S WARFIGHTER Examples of this phenomenon include Kamikaze pilots of World War II and suicide bombers today. Accordingly, the value of integrating the social sciences into threat warning has become increasingly important. A recent case concerns the involve- ment of the social sciences to understand the psychology of radicalism. To tap technical knowledge from academic institutions, there is no substi- tute for face-to-face visits. Directly connecting scientists and engineers with warfighters was suggested as a way to identify new solutions for on-the-ground problems. The FY10 and FY11 budgets reduce funding for S&T, specifically within the IC. Although R&D budgets may grow in some areas, there is a shortfall in program budgets to continue development if a technology is successful. As Admiral Blair told the symposium audience, “The only substitute for having enough money for everything is agility.” In keeping with this philosophy, it was expressed that there should be an effort to reduce single-purpose information/intelligence collection systems, which are less agile, and instead focus on multipurpose collection sys- tems built to accommodate a changing array of intelligence requirements. The Honorable Jacques Gansler The second address to the symposium was presented by Dr. Jacques Gansler, Director of the Center for Public Policy and Private Enterprise, University of Maryland, and former Under Secretary of Defense (AT&L). In his address to the symposium participants, Dr. Gansler emphasized that facing significant national security challenges—both in scope and in uncertainty—requires a holistic view of security, a broad spectrum of security missions, an ability to take advantage of globalization, and recognition of the long-term national security implications of non-military events (e.g., the global financial crisis, a worldwide pandemic, the aging U.S. population). Addressing these challenges requires addressing four highly interrelated acquisition issues: • What goods and services to buy (the requirements process), • How to buy them (acquisition reform), • Who does the acquiring (the acquisition workforce), and • From whom it is acquired (the industrial base). The following list is a summary of what Dr. Gansler identified as the top five priorities in overcoming the challenges he discussed. 1. Acquisition workforce. The service chiefs and various national security secretaries and directors must recognize and promote senior acquisition personnel (military and civilian) in order to demonstrate their personal recognition of how critical smart acquisition personnel and practices are to U.S. military posture in the 21st century.

DISCUSSIONS WITH INVITED SPEAKERS 25 2. Weapons costs as a military requirement. This will require early and enhanced systems engineering (throughout both government and industry) and incentives to industry for achieving lower-cost systems. 3. The value of “rapid acquisition” for both military and economic benefits. This will require the full use of what was referred to as spiral development. Each development block is based on proven technology; continuous user and logistician feedback yields subsequent “block” improvements. 4. Balancing of resources. There is currently a strategy/resource mismatch that requires realignment. 5. Taking full advantage of the potential benefits of globalization, while not ignoring the potential vulnerabilities and risks. Key take-aways and points from the symposium discussion of these core issues are summarized in Table 4-1. Additional Discussion During a Q&A session, the following points were among those discussed. First, in a discussion on Title 10 regarding who is responsible for the equipping and maintaining of armed forces, it was agreed that both service chiefs and COCOMs must work better together. Another point concerned the need for better systems engineering and engi- neers able to address the underlying science that may impact complex systems integration. In particular, the independence of systems engineering, integration issues, and independent cost estimation should be high-priority considerations for decision makers. As is addressed in the panel discussions summarized in Chapters 2 and 3, acquisition reform alone is not enough. Human dimensions such as social and cultural aspects must also be integrated into how technologies are used. Another suggestion brought up during the panel discussions, red teaming, was recom- mended by participants to be part of the acquisition process. Mr. Robert Hegstrom Mr. Robert Hegstrom, Director of the Battlespace Awareness Portfolio in the OUSDI, began his talk by describing current efforts in the Battlespace Awareness Portfolio. Preventing technology surprise was described as a core priority of his office, in addition to work with the Military Intelligence Program and the National Intelligence Program. Threat concerns highlighted over the course of the discussion included l ­ onger-range ballistic missiles, the recent Chinese anti-satellite test, and IEDs. Currently, there is also a need to focus on new-technology-based threats, espe- cially those disruptive in nature.

26 AVOIDING TECHNOLOGY SURPRISE FOR TOMORROW’S WARFIGHTER TABLE 4-1 Key Considerations for Core Acquisition Issues What goods and In a resource-constrained environment, the priorities must be addressed: services • Lower-cost systems and services; to buy? • Optimized, network-centric systems-of-systems (vs. individual “platforms”); • A “reserve” of resources to rapidly respond to urgent COCOM needs (vs. the (requirements current 15- to 20-year acquisition cycle); process) • A balanced allocation of resources to address irregular operations; • Interoperability of “Joint” and coalition systems; and • Planning and exercising “as we will fight” with allies, multiple agencies, and contractors on the battlefield. How to buy To achieve higher performance faster and at lower costs: them? • Require cost as a design/military requirement. • Provide viable, continuous competition options (e.g., competitive prototypes) (acquisition to incentivize higher performance at lower costs. reform) • Maximize use of commercial products and services at all levels. • Implement modern, enterprise-wide IT systems (logistics, business, personnel, etc.). • Institutionalize a rapid-acquisition parallel process to respond to COCOM urgent needs. • Create incentives for contractors to achieve desired results (in cost, schedule, and performance). • Minimize conflict of interest concerns. • Fully utilize spiral development: get basic capabilities out and improve them incrementally. Who does the The acquisition workforce lacks expertise in key areas. A large workforce acquiring? turnover in the coming years will provide continued challenges and opportunities. Both quantity and quality of senior and experienced military and (acquisition civilian personnel are required (especially for expeditionary operations). In the workforce) last decade-plus, this “requirement” has not been met. From whom A 21st-century national security industrial base should: is it acquired? • Be efficient, responsive, technologically advanced, and highly competitive (at all levels, including public and private sectors); (industrial base) • Be globalized, utilizing “best in class” (requires significant changes to U.S. export controls); • Invest in intelligence R&D and capital equipment; • Include commercial, industry and maximize dual-use facilities and workforce; and • Contain an independent systems-of-systems architecture and systems engineering firms. Merger and acquisition reviews should be based on this vision. Despite congressional resistance, all work that is not inherently governmental work should be sourced competitively (public vs. private). Government-industry communications should be encouraged once again. Finally, structural changes are required to eliminate the appearance, or reality, of conflicts of interest (regarding “vertical integration”). SOURCE: Compiled from information provided by Jacques Gansler.

DISCUSSIONS WITH INVITED SPEAKERS 27 To better understand threats perceived by COCOMs, Mr. Hegstrom took part in a Joint Requirements Oversight Committee session with representation by all COCOMs to identify the integrated priority lists for each. Identified areas of concern included: • Intelligence, surveillance, and reconnaissance (ISR); • Battlespace awareness; • Gaps in analysis capabilities (one COCOM specifically identified that excessive collected data, without adequate resources to analyze it, was a “giant anchor”); • Restrictions on information sharing with allies; • Human intelligence; • Full-motion video; • Targeting and tracking capabilities; and • Persistent surveillance. Mr. Hegstrom next discussed the upcoming Quadrennial Defense Review, which seeks to update long-term strategies (and budget recommendations) for the current fight and future challenges. Teams are being formed to address the following subjects: • Irregular warfare, • Civil support, • High-end adversaries (for near-peer threats), • Enablers (for processing and dissemination), • Global posturing, and • Business processes. In addition to these teams, an additional “Analysis and Integration” team will synthesize results from the other teams for the FY10-FY15 budget, soon to be submitted to legislators. Related budget issues were a key concern in the final segment of the formal discussion. After the new administration entered in 2009, there has been reprioritization, and resources have been added to ISR. Additional Discussion During a Q&A session, the following points were among those discussed. First, in a discussion regarding the amount of time the OUSDI spent investigat- ing foreign threats to defeat current U.S. capabilities, it was mentioned that space threats are one current focus, and that the United States is no longer assured of dominance in this area. This became evident after the Chinese anti-satellite test, which had been forewarned by some analysts but was not considered a real pos- sibility until after the fact. Counter-threat intelligence analysis was emphasized.

28 AVOIDING TECHNOLOGY SURPRISE FOR TOMORROW’S WARFIGHTER Regarding the attention paid to open publication of foreign intentions in native-language publications, it was noted that OUSDI uses such publications as indicators for focusing further intelligence collection needs. A long discussion was held on the issue of what causes surprise. Points raised included the following as contributing factors: • Lack of belief in outside experts. There is a lack of coupling between the IC and outside experts. • Conservative analyses. IC tradecraft and editing standards limit analysts’ ability to effectively warn of potential surprises that are feasible but for which only limited intelligence data is available. This point was empha- sized throughout the discussions. • Lack of specific, unequivocal indications and warning data. Lack of specificity limits the ability to be conclusive, and low presumed likelihood leads to low dedication of resources. At the end of the session, discussion ensued regarding trust issues in S&TI. Key points included the fact that data interpretation is subject to cultural biases as well as U.S. “mirror-imaging” regarding normal system or technology develop- ment timelines.

Next: 5 Underlying Themes »
Avoiding Technology Surprise for Tomorrow's Warfighter: A Symposium Report Get This Book
×
Buy Paperback | $29.00 Buy Ebook | $23.99
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

On April 29, 2009 the National Research Council held a 1-day symposium titled, 'Avoiding Technology Surprise for Tomorrow's Warfighter.' This volume, a report of the symposium, highlights key challenges confronting the scientific and technical intelligence (S & TI) community and explores potential solutions that might enable the S & TI community to overcome those challenges.

The symposium captured comments and observations from representatives from combatant commands and supporting governmental organizations, together with those of symposium participants, in order to elucidate concepts and trends, knowledge of which could be used to improve the Department of Defense's technology warning capability. Topics addressed included issues stemming from globalization of science and technology, challenges to U.S. warfighters that could result from technology surprise, examples of past technological surprise, and the strengths and weaknesses of current S & TI analysis.

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!