Title: U.S. C4I and Logistics Vulnerabilities to Offensive Information Warfare.
Abstract: Abstract : The information revolution fostered by the microchip has made it possible for military commanders to receive information in unequaled quantity and quality. U.S. commanders have a broad range of opportunities resulting from digitized technologies that enhance of military equipment performance and the application of force. These information advances represent force enablers providing synergistic advantage to operational command and control (C2), intelligence, and logistic functions. However, there is a down side, in that the computers and microchips have vulnerabilities that must be addressed to retain operational force advantage. Information warfare is central to the way the nation plans to fight in the future, and information systems now connect U.S. military forces on a worldwide basis. Despite the enhancements that connectivity brings, with integration of global communications, state and non-state actors are provided new ways to access and undermine the C2, intelligence, and logistics function via computer and communication networks. This new area of vulnerability extends from the strategic, through the operational, down the tactical levels of warfare. State and non-state actors have means of attacking core military centers of gravity and critical strengths without resorting to conventional attack or deception. Today, joint commanders and civilian leaders must seriously consider the ramifications of unwanted intrusion into the national and defense information infrastructures. As U.S. forces become increasingly dependent on information to leverage battlespace awareness the need to protect information systems will increase. Backup capability must be designed into the information infrastructure to preclude erosion of force application capability.
Publication Year: 1997
Publication Date: 1997-06-13
Language: en
Type: report
Indexed In: ['crossref']
Access and Citation
Cited By Count: 1
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot