Viewpoint

June 2003
By Col. Alan D. Campen, USAF (Ret.)

Military action could answer long-standing questions.

The debates over information operations have shifted from academia and Pentagon studies, military exercises and computer simulations to joint warfare over the sands of Iraq. This is the first opportunity to document and evaluate the role information actually plays in evolving military transformation into truly joint operations.

April 2004
By Robert Fonow

Changes in the marketplace could affect military capabilities.

The international telecommunications system is re-balancing into four major centers of innovation: the United States, China, India and an expanded Europe. If current trends persist, the United States may be hard pressed to maintain an advantage in communications technologies and services and could find its ability to prosecute information warfare highly constrained.

November 2003
By Sen. Joseph I. Lieberman

The United States must act quickly to maintain vital domestic defense technology.

The changing composition of the semiconductor industry, combined with foreign government action that has leveraged market forces, has resulted in the shift of chip manufacturing from the United States to offshore locations, particularly China and East Asia. This migration has substantial national security ramifications, as the transformation of this nation’s military into a network-centric force requires high-end semiconductor chips to provide the processing power for numerous defense applications.

January 2004
By Col. Alan D. Campen, USAF (Ret.)

Technology can both aid and dominate the warfighter.

Network-centric warfare is widely acclaimed to be the centerpiece of military transformation. It has been embraced enthusiastically by the United States and some allied armed forces. However, critics question whether this nascent philosophy is yet fully deserving of star billing. They urge more thoughtful analysis, extensive operational experimentation and testing, and firm budget and procurement commitments before its precepts become frozen into doctrine, organization and strategy.

March 2004
By Col. (S) Bradley K. Ashley, USAF

 

Personnel holding watch in air operations centers during flight operations regularly rely on networking for coordination of efforts. A cyberterrorist attach on military networks could seriously compromise missions.

The danger is real, and the country must prepare.

Pages