-Caveat Lector-

Report cites weaknesses in military computer systems



The report recommended:
   � Making C4I a greater budget priority in defense spending, with a flexibility that 
can "exploit unanticipated advances in C4I technology."
   � Designating an organization responsible for providing direct defensive 
operational support to commanders.

   � Funding a program to conduct frequent, unannounced penetration testing of C4I 
systems.

   � Ensuring that programs are operable even if one part has been penetrated by an 
adversary.

   � Emphasizing the importance of information technology in the military leadership.

   � Establishing an Institute for Military Information Technology, possibly as part 
of an existing body.






March 22, 1999
Web posted at: 1:17 p.m. EST (1817 GMT)


WASHINGTON (AP) -- The military's key communications infrastructure linking combat, 
intelligence and command forces is dangerously vulnerable to attacks from cyberspace 
and requires urgent changes in Defense Department policy, said a study released today.

The Command, Control, Communications, Computers and Intelligence systems, known as 
C4I, is compromised by security problems and also by a military culture prone to 
treating such problems as a lesser priority, the National Research Council reported.

"The rate at which information systems are being relied on outstrips the rate at which 
they are being protected," it said. "The time needed to develop and deploy effective 
defenses in cyberspace is much longer than the time required to develop and mount an 
attack."

Despite evidence of security lapses in C4I -- which handles communications and warning 
tasks all along the chain of command -- the Pentagon's "words regarding the importance 
of information systems security have not been matched by comparable action," the 
report said.

"Troops in the field did not appear to take the protection of their C4I systems nearly 
as seriously as they do other aspects of defense," said the report, which Congress 
ordered the Pentagon to commission in 1995. The council is an independent organization 
chartered by Congress to advise the government.

The report indicated the problems were due more to the Pentagon's management of the 
systems than to the technology itself. It cited C4I workers' lack of stature compared 
with traditional combat forces, compatibility problems between the services and a need 
for more budget flexibility on the matter from both the Defense Department and 
Congress.

In a statement, the Pentagon acknowledged that the U.S. military's strength "is our 
information technology," and that "our dependence on such assets, which may be subject 
to malicious attack, makes information technology our weakness as well."

It said that as the council's report was being prepared, the Defense Department had 
already improved protection against computer attack by implementing new programs, 
establishing a joint task force for computer defense and expanding training of its 
information technology personnel.

But Kenneth Allard, an analyst who has written about C4I, said its weaknesses are in 
part the fault of "Industrial Age" military acquisition policies -- applying to 
computers as well as tanks, ships and aircraft -- that give the services their own 
procurement duties.

Ships and tanks may perform different tasks, he said, but the Army, Navy and other 
services need a single-standard computer system.

"Twenty-first century combat is the war of the databases, in which information flows 
must go from the foxhole to the White House and back down again," said Allard, a 
former Army colonel and analyst at the Center for Strategic and International Studies 
who had not yet read the council's report.



=================================
Robert F. Tatman
[EMAIL PROTECTED]
[EMAIL PROTECTED]
Remove "nospam" from the address to reply.

NOTICE: In accordance with Title 17 U.S.C. Section 107, this material is
distributed without profit to those who have expressed a prior interest in
receiving the included information for research and educational purposes. For

more information go to: http://www.law.cornell.edu/uscode/17/107.shtml

POSTING THIS MESSAGE TO THE INTERNET DOES NOT IMPLY PERMISSION TO SEND
UNSOLICITED COMMERCIAL E-MAIL (SPAM) TO THIS OR ANY OTHER INTERNET ADDRESS.
RECEIPT OF SPAM WILL RESULT IN IMMEDIATE NOTIFICATION OF THE SENDER'S ISP.

____________________________________________________________________
Get your own FREE, personal Netscape WebMail account today at 
http://webmail.netscape.com.

DECLARATION & DISCLAIMER
==========
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance�not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to