In the United States, both corporate and Defense Department telecommunications have developed along a path of increasing complexity to support global geopolitical or commercial requirements. The paradox is that while this complexity improves the ability to support worldwide operations, the underlying network is becoming more vulnerable.
The role of imagery as a national intelligence asset could be on the cusp of a promising alternative future, or it could be about to dwindle significantly. Much depends on the choices that the imagery community makes over the next several years.
The exploding use of encryption in cyberspace has spawned a dilemma for policy makers. They must strive to balance citizens' rights to security and privacy with the needs of law enforcement and intelligence to police what a senior defense official terms a "lawless frontier," and others call the "World Wild Web."
Alarmed that its borders can easily be breached through technology in the hands of criminals, terrorists, nontraditional foes and even the merely inquisitive, the federal government has broadened the definition of national security. In doing so, it has established a timetable for erecting defenses, enlisted a host of recalcitrant bedfellows into its national security apparatus, and charged the intelligence and law enforcement communities to collaborate and perform what some believe without resources to be a near-Sisyphean task.
The military's increasing reliance on commercial off-the-shelf information systems is leading to an environment in which the technologies could be driving the doctrine. The opportunities-and the challenges-presented by these new technologies cover the gamut of communications, computing, sensors, networks, interoperability and security. The defense community's response to this development may define military superiority for years to come.
Nowhere does the battle for or against outsourcing rage more fiercely than in the halls of the Pentagon, seat of the most powerful military in the world. The U.S. Defense Department is finding itself in the throes of a debate that might, over time, cause it to cede its hegemony to commercial forces and lose the tools it will need to fight on distant battlefields.
Allied intelligence agencies engaged in computer-to-computer signals intelligence exploration are closely examining Internet protocol network intercepts and forensics analysis as a new weapon in the war against terrorism. Traditional signals intelligence professionals, who have shied away from this type of intelligence gathering for more than a decade, are realizing that the computer-to-computer intelligence gap can be filled. The fact that computer-to-computer signals intelligence is a weakness in current allied intelligence-gathering efforts is no secret. But after decades of denial, the intelligence community and emerging technologies are changing the old ways of looking at network surveillance.
Today's threats to U.S. national security range from the bloody reality of terrorist suicide bombers who kill and maim individuals to weapons of mass destruction that potentially hold many thousands at risk. The U.S. information infrastructure is a vital element of U.S. national security, but the design and management of software render its terminals, nodes and networks demonstrably vulnerable to malicious manipulation.
Commercial off-the-shelf procurement is now a fact of life for the U.S. Defense Department. This thrust is driven as much by economics as it is by technology advances. However, the headlong rush to commercialize the defense technology base is producing unwanted complications that threaten to undermine the original goals of commercial acquisition.
In Case of Emergency, Break Glass. That phrase calls to mind the image of a firefighter's axe in a glass box on a wall. It also is an appropriate analogy for the U.S. Defense Department's approach to information operations, wherein powerful capabilities often are locked away from the hands of the warfighter. But unlike the firefighter, who is trained in the use of the axe, warfighters have virtually no opportunity to train with U.S. information operations capabilities or to factor them into their plans. Tight security controls that are designed to ensure the protection of many capabilities are, as an unintended consequence, locking the armed forces out of opportunities to learn to use them effectively. This, in a nutshell, is the problem of overprotection.