is characteristic of most government organizations, use of service-based acquisition, doctrine for interoperating with heterogeneously equipped forces, a lack of resources to pursue C4I integration as a high-priority budget item, line-item budget accountability, and the need to operate in coalitions that are quickly assembled and cannot be anticipated.

Second, C4I systems must be secured against information attacks. With increased reliance on C4I systems as well as an increased use of commercial technologies to build these systems comes a new and increased set of risks associated with the vulnerability of these systems to attack. Here, too, there are technical and cultural dimensions. Technical dimensions include the need for good automated tools for checking and inspecting network and system configurations and tools that allow the rapid and high-confidence identification of a cyber-attacker and retaliation against such attackers. A distinction must be maintained between the attacker whose intent is to disrupt or corrupt the C4I system and one whose intent is to monitor and collect information from one. Cultural dimensions include the need to promulgate a defense-wide awareness of information security (ranging from accountability to providing good information security support) and a legal constraint and military tradition of refraining from involvement in domestic security affairs.

Third, the base technologies of C4I evolve at such a rapid rate that cultural and technical challenges arise with respect to how, when, and what aspect of the technology can best be exploited to significantly increase the leverage of information systems in military operations. Infusion of technical skills in the military workplace will be required along with bringing doctrine abreast of the advances in technology. Also, leadership skills will need to be honed to take account of the technical and doctrinal shifts brought about by the potential inherent in advanced information technology. Indeed, the very fact of revolutionary changes in military operations brought about by advanced C4I systems poses enormous leadership challenges for the U.S. military, which as an institution practices well-justified conservatism. Finally, it is important to highlight the challenge to the whole acquisition process, which must take into account the rapid pace of change in information technology and the dominant role of the commercial sector in driving technological advances. The challenge is exploiting the rapid advances in information technology at a time when many, if not most, of these technologies are available through the commercial market with an acquisition system not designed to exploit rapid acquisition. Each of these three challenges, then, is discussed in the following chapters.



The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement