BOX [C]-1

Relevant Definitions from Joint Vision 2020 Serving as Foundation for Assessment Methodology

Information Superiority is the capability to collect, process, and disseminate an uninterrupted flow of information while exploiting or denying an adversary’s ability to do the same. Information superiority is achieved in a noncombat situation or one in which there are no clearly defined adversaries when friendly forces have the information necessary to achieve operational objectives.

Dominant Maneuver is the ability of joint forces to gain positional advantage with decisive speed and overwhelming operational tempo in the achievement of assigned military tasks. Widely dispersed joint air, land, sea, amphibious, special operations and space forces, capable of scaling and massing force or forces and the effects of fires as required for either combat or noncombat operations, will secure advantage across the range of military operations through the application of information, deception, engagement, mobility and counter-mobility capabilities.

Focused Logistics is the ability to provide the joint force the right personnel, equipment, and supplies in the right place, at the right time, and in the right quantity, across the full range of military operations. This will be made possible through a real-time, web-based information system providing total asset visibility as part of a common relevant operational picture, effectively linking the operator and logistician across Services and support agencies.

Precision Engagement is the ability of joint forces to locate, surveil, discern, and track objectives or targets; select, organize, and use the correct systems; generate desired effects; assess results; and reengage with decisive speed and overwhelming operational tempo as required, throughout the full range of military operations.

Full Dimensional Protection is the ability of the joint force to protect its personnel and other assets required to decisively execute assigned tasks. Full dimensional protection is achieved through the tailored selection and application of multilayered active and passive measures, within the domains of air, land, sea, space, and information across the range of military operations with an acceptable level of risk.

SOURCE: JCS (2000).


The Accessibility variable focuses on the question How difficult would it be for an adversary to exploit the technology? It addresses the ability of an adversary to gain access to and exploit a given technology. This assessment is divided into three levels:

  • Level 1. The technology is available through the Internet, being a commercial off-the-shelf item; low sophistication is required to exploit it.

  • Level 2. The technology would require a small investment (hundreds to a few hundred thousand dollars) in facilities and/or expertise.

  • Level 3. The technology would require a major investment (millions to billions of dollars) in facilities and/or expertise.

In general, Level 1 technologies are those driven by the global commercial technology environment; they are available for exploitation by a diverse range of potential adversaries. Level 3 technologies, by contrast, are typically accessible only to state-based actors. The indicators likely to be of value in determining an adversary’s actual access to a given technology vary by level as well as by the type of technology.

The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement