DEFENDING THE DEFENDER KEEPING THE SHIELD STRONG

Similar documents
White Space and Other Emerging Issues. Conservation Conference 23 August 2004 Savannah, Georgia

Mission Assurance Analysis Protocol (MAAP)

Report No. D May 14, Selected Controls for Information Assurance at the Defense Threat Reduction Agency

Opportunities to Streamline DOD s Milestone Review Process

Cyber Attack: The Department Of Defense s Inability To Provide Cyber Indications And Warning

Shadow 200 TUAV Schoolhouse Training

The Need for NMCI. N Bukovac CG February 2009

Test and Evaluation of Highly Complex Systems

Rapid Reaction Technology Office. Rapid Reaction Technology Office. Overview and Objectives. Mr. Benjamin Riley. Director, (RRTO)

Independent Auditor's Report on the Attestation of the Existence, Completeness, and Rights of the Department of the Navy's Aircraft

Air Force Science & Technology Strategy ~~~ AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff. Secretary of the Air Force

Defense Acquisition Review Journal

Panel 12 - Issues In Outsourcing Reuben S. Pitts III, NSWCDL

Improving the Quality of Patient Care Utilizing Tracer Methodology

DoD Countermine and Improvised Explosive Device Defeat Systems Contracts for the Vehicle Optics Sensor System

BW Threat & Vulnerability

DDESB Seminar Explosives Safety Training

Engineering, Operations & Technology Phantom Works. Mark A. Rivera. Huntington Beach, CA Boeing Phantom Works, SD&A

Development of a Hover Test Bed at the National Hover Test Facility

Information Technology

THE GUARDIA CIVIL AND ETA

Defense Health Care Issues and Data

terns Planning and E ik DeBolt ~nts Softwar~ RS) DMSMS Plan Buildt! August 2011 SYSPARS

Dynamic Training Environments of the Future

ASAP-X, Automated Safety Assessment Protocol - Explosives. Mark Peterson Department of Defense Explosives Safety Board

Intelligence, Information Operations, and Information Assurance

ASNE Combat Systems Symposium. Balancing Capability and Capacity

IMPROVING SPACE TRAINING

Concept Development & Experimentation. COM as Shooter Operational Planning using C2 for Confronting and Collaborating.

DoD CBRN Defense Doctrine, Training, Leadership, and Education (DTL&E) Strategic Plan

The Need for a Common Aviation Command and Control System in the Marine Air Command and Control System. Captain Michael Ahlstrom

Wildland Fire Assistance

Tim Haithcoat Deputy Director Center for Geospatial Intelligence Director Geographic Resources Center / MSDIS

A Military C2 Professional s Thoughts on Visualization

Office of Inspector General Department of Defense FY 2012 FY 2017 Strategic Plan

Evolutionary Acquisition an Spiral Development in Programs : Policy Issues for Congress

711 HPW COUNTERPROLIFERATION BRANCH

2010 Fall/Winter 2011 Edition A army Space Journal

The Advantages of Commercial Satellites versus Military Satellites. Captain Thomas J. Heller

Integrated Comprehensive Planning for Range Sustainability

at the Missile Defense Agency

FFC COMMAND STRUCTURE

CRS prepared this memorandum for distribution to more than one congressional office.

Issue Paper. Environmental Security Cooperation USARPAC s: Defense Environmental and International Cooperation (DEIC) Conference

Ballistic Missile Defense: Historical Overview

Report No. DODIG December 5, TRICARE Managed Care Support Contractor Program Integrity Units Met Contract Requirements

Developmental Test and Evaluation Is Back

National Continuity Policy: A Brief Overview

AFCEA TECHNET LAND FORCES EAST

Report No. D September 25, Controls Over Information Contained in BlackBerry Devices Used Within DoD

Intelligence, Surveillance, Target Acquisition and Reconnaissance

Mission Task Analysis for the NATO Defence Requirements Review

DOD Native American Regional Consultations in the Southeastern United States. John Cordray NAVFAC, Southern Division Charleston, SC

The Army Executes New Network Modernization Strategy

An Introduction to Wargaming

DOING BUSINESS WITH THE OFFICE OF NAVAL RESEARCH. Ms. Vera M. Carroll Acquisition Branch Head ONR BD 251

Preliminary Observations on DOD Estimates of Contract Termination Liability

Conservation Law Enforcement Program Standardization

Department of Defense DIRECTIVE

USMC Identity Operations Strategy. Major Frank Sanchez, USMC HQ PP&O

Army Modeling and Simulation Past, Present and Future Executive Forum for Modeling and Simulation

DoD Scientific & Technical Information Program (STIP) 18 November Shari Pitts

Staffing Cyber Operations (Presentation)

Report No. D February 9, Internal Controls Over the United States Marine Corps Military Equipment Baseline Valuation Effort

Electronic Attack/GPS EA Process

United States Army Aviation Technology Center of Excellence (ATCoE) NASA/Army Systems and Software Engineering Forum

Perspectives on the Analysis M&S Community

Smart Power Infrastructure Demonstration for Energy Reliability and Security (SPIDERS)

Engineered Resilient Systems - DoD Science and Technology Priority

Software Intensive Acquisition Programs: Productivity and Policy

The U.S. military has successfully completed hundreds of Relief-in-Place and Transfers of

The Coalition Warfare Program (CWP) OUSD(AT&L)/International Cooperation

PEO Missiles and Space Overview Briefing for the 2010 Corrosion Summit February 2010 Huntsville, AL

The Security Plan: Effectively Teaching How To Write One

Incomplete Contract Files for Southwest Asia Task Orders on the Warfighter Field Operations Customer Support Contract

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

World-Wide Satellite Systems Program

The first EHCC to be deployed to Afghanistan in support

Applying the Goal-Question-Indicator- Metric (GQIM) Method to Perform Military Situational Analysis

712CD. Phone: Fax: Comparison of combat casualty statistics among US Armed Forces during OEF/OIF

Military Health System Conference. Putting it All Together: The DoD/VA Integrated Mental Health Strategy (IMHS)

Social Science Research on Sensitive Topics and the Exemptions. Caroline Miner

The Fully-Burdened Cost of Waste in Contingency Operations

Infantry Companies Need Intelligence Cells. Submitted by Captain E.G. Koob

The pace of change and level of effort has increased dramatically with

The Air Force's Evolved Expendable Launch Vehicle Competitive Procurement

NORAD CONUS Fighter Basing

Military to Civilian Conversion: Where Effectiveness Meets Efficiency

UNCLASSIFIED. Unclassified

2011 USN-USMC SPECTRUM MANAGEMENT CONFERENCE COMPACFLT

Veterans Affairs: Gray Area Retirees Issues and Related Legislation

DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process

Acquisition. Air Force Procurement of 60K Tunner Cargo Loader Contractor Logistics Support (D ) March 3, 2006

Inside the Beltway ITEA Journal 2008; 29: Copyright 2008 by the International Test and Evaluation Association

Nuclear Command, Control, and Communications: Update on DOD s Modernization

AFRL-ML-WP-TP

Make or Buy: Cost Impacts of Additive Manufacturing, 3D Laser Scanning Technology, and Collaborative Product Lifecycle Management on Ship Maintenance

Munitions Response Site Prioritization Protocol (MRSPP) Online Training Overview. Environmental, Energy, and Sustainability Symposium Wednesday, 6 May

Navy CVN-21 Aircraft Carrier Program: Background and Issues for Congress

Chief of Staff, United States Army, before the House Committee on Armed Services, Subcommittee on Readiness, 113th Cong., 2nd sess., April 10, 2014.

Transcription:

December 2001 Issues Paper 13-01 DEFENDING THE DEFENDER KEEPING THE SHIELD STRONG By Professor Michael Pasquarett, Colonel Patrick Carney, Colonel Peter Cohen, and Colonel Richard Dillon INTRODUCTION If, or more likely when, the United States begins to construct and field a viable missile defense system, those who oppose this country s aims will most likely also begin to craft a response. What types of responses will they chose? We can be sure they will take measures intended to overcome or at least reduce the effectiveness of any type of missile defense system the United States decides to employ. While there has been extensive discussion of possible offensive missile countermeasures (decoys, warhead shielding, quantitative overmatch, etc.), there appears to have been less consideration given to the possibility that an opponent might choose some method of direct attack on the infrastructure of the missile defense system itself. However, some adversaries already may be focusing on asymmetric methods to attack United States missile defense capabilities rather than engage in a major offensive missile buildup necessary to directly challenge an American missile defense system. If this is true, how do we protect our missile defense system from such attack, particularly from non-missile attacks? A recently conducted workshop at the U. S. Army War College s Center for Strategic Leadership examined this issue. Over thirty-five subject matter experts from both the federal government and the private sector participated in the three-day workshop conducted at the U.S. Army War College s Collins Center from 26-28 November 2001. The purpose of the workshop was to explore issues regarding the security of our present and future space and missile defense systems, especially from asymmetric threats. Workshop participants examined the vulnerabilities of the National Missile Defense (NMD) and Theater Missile Defense (TMD) portions of the Integrated Missile Defense (IMD) system based on projected operational concepts briefed during the workshop. Three distinguished speakers began the workshop with presentations addressing a multitude of potential threats to and vulnerabilities of projected United States missile defense systems. LTG CSL 1

Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE DEC 2001 2. REPORT TYPE N/A 3. DATES COVERED - 4. TITLE AND SUBTITLE Defending the Defender Keeping the Shield Strong 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Center for Strategic Leadership 650 Wright Avenue Carlisle, PA 17013-5049 8. PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR S ACRONYM(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release, distribution unlimited 13. SUPPLEMENTARY NOTES The original document contains color images. 14. ABSTRACT 15. SUBJECT TERMS 11. SPONSOR/MONITOR S REPORT NUMBER(S) 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT UU a. REPORT b. ABSTRACT c. THIS PAGE 18. NUMBER OF PAGES 4 19a. NAME OF RESPONSIBLE PERSON Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18

Edward G. Anderson III, Deputy Commander in Chief, United States Space Command, during both his keynote address and an early workshop session presentation provided the national and joint perspectives on space and missile defense. Subsequently discussed were a full range of protective measures that might be employed to improve the survivability of United States missile defenses. Within this context, the workshop focused on identifying specific major vulnerabilities of the United State s IMD shield, and suggested measures that could be developed to safeguard our missile defense systems and improve their security both at home and abroad. Workshop participants were divided into four groups, two each for America and Overseas. Each group developed a unique threat attack plan and subsequently proposed countermeasures to their own and the other groups threats. The workshop addressed three phases of IMD deployment/employment: Phase I, from decision to deploy through deployment of initial operating capabilities (IOC); Phase II, from IOC deployment through enemy s decision of engagement in a hot war; Phase III, from an enemy s decision to engage in open war through conclusion of the conflict. GROUP DISCUSSIONS PHASE 1: Development Through Initial Operating Capabilities (IOC) Participants generally agreed that threat actions would include a synchronized, integrated, and sus tained campaign to discourage United States development and deployment of IMD systems. A main focus of this threat program would be the will of the people. Adversaries clearly understand that by negatively influencing Americans on the potential failures of the systems, costs in both trea sure and world public opinion, and even the overall need for such a defensive system can cause such programs to be delayed or even cancelled. In this regard, Executive Branch oversight measures are recommended to ensure a comprehensive federal, state, local and multi-national information campaign for all phases, designed to counter negative information operations. During this phase other possible threat actions could include construction site sabotage, vandalism, environ mental contamination, staged accidents, and organized protest campaigns. Possible United States counteractions could include improved background checks, controlled site access measures, security protocols for workers, an aggressive CI program, two-man control for access to critical system com ponents (hardware and software), incident tracking and analysis, and aggressive information/intelligence sharing between federal, state and local governments, as well as with United States allies. The United States should initiate information operations that effectively portray the overwhelming positive aspects of a defensive missile shield both at home and abroad. Additional actions to coun ter an adversary s information campaign can include an increase in American science and technology efforts including, but not restricted to, enhanced cyber-attack countermeasures, an em phasis on National Information Infrastructure (NII) including EMP hardening of critical communication and data network sites, and development of multiple and redundant national tele communication networks. Within this phase the United States should undertake a comprehensive program to improve counterintelligence, surveillance, and protective measures. With regard to hardware and software in system development phases the United States should carefully determine the essential elements of information (EEI) regarding missile defense operation and couple them to protection measures in CSL 2

the hardware and software acquisition process. To counter the continued vulnerability of commercial off the shelf (COTS) software to threat exploitation, industry and defense leaders should develop stringent guidelines to provide for the security of software throughout its life cycle. Consideration also should be given to utilizing MILSPEC software and hardware as an option to COTS. While this is an expensive option it may be necessary if commercial products continue to prove vulnerable to determined attacks. Dedicated red teams can be employed to continuously evaluate critical missile system security (to include legacy components) and to recommend appropriate safeguards within these systems. Procurement activities for all systems and services should include enhanced, well-defined and measurable technical specifications for all systems and sub-components. Current technology must be improved and new technology developed to properly verify and validate the millions of lines of code required for various system components. National leaders must mandate that industry suppliers meet these new critical criteria for business practices, including defense contractor workforces (to include sub-contractors), in order to meet the physical and intellectual requirements of a new national missile defense program. PHASE 2: System loc Through Decision of Enemy to Engage in Hot War In this phase potential adversaries will continue to conduct, and can be expected to expand, their campaign to deny the employment/deployment of United States missile defense systems. Continued covert attacks on both our NII and defensive missile industry must be anticipated. The United States should increase force protection measures related to IMD and industrial base assets. New and more direct programs to deny adversary access to the means of conducting their information campaign may be required. These means may include both technical and HUMINT solutions. In a reversal of previous years policies which have kept the press corps at arms length, it may now be necessary to actively seek out opportunities for providing positive, honest information about America s missile defense programs. Open, fair, and balanced reporting on American IMD programs should be tied to sustaining the people s understanding and backing of the systems development and deployment. This is critical to defeat an adversary s information campaign. Reporting successes, setbacks, and realistic capabilities may prove to be our strongest asset at home and abroad. There is an ever-increasing need for the United States to be able to nimbly adopt organizational and system changes to keep pace with technology changes. PHASE 3: Hot War Through Conclusion of Conflict During phase 3 the enemy could potentially conduct a synchronized, integrated, and sustained campaign against United States missile defenses designed to disable or suppress operations. Expected enemy actions could include: physical attack against critical command and control nodes, jamming and or physical destruction of both radar and long-haul communication networks, employment of anti-satellite weapons, activation of Trojan horse software, and direct attacks against elements of land and sea missile defenses. Attacks against critical space assets could result in the unintended escalation of hostilities, and suggest otherwise unwarranted defensive actions. Important to the CSL 3

DEFENDING THE DEFENDER KEEPING THE SHIELD STRONG successful conclusion of hostilities is the development of detailed consequence management procedures. United States efforts to counter threats against IMD assets and the related infrastructure, both military and commercial, will ensure United States readiness to meet the challenges posed in the coming years. CONCLUSIONS Undoubtedly, weaknesses in the defense of IMD systems will increase with the proliferation of relatively low-cost missiles and the increasing sophistication of potential adversaries. To safeguard our missile defenses we must focus on integrated, layered network and physical defenses that weave together the full range of federal, state, and local assets in both public and industrial areas. Fully involved allies, strategically partnered in all facets of missile defense protection operations will measurably strengthen our overall efforts. While we remain concerned about physical attacks, we must also pay particular attention to political and information operations. The key to our ultimate success will be continuous research, development, testing, and evaluation of IMD defensive capabilities and procedures against the evolving multi spectrum capabilities of our adversaries. This paper presents the issues and discussions developed by the working groups of the Defending The Defender - Keeping The Shield Strong Workshop. The Center for Strategic Leadership will continue to pursue the development and examination of these issues and conclusions through various workshops, symposia, and forums. We hope that the efforts of this workshop and future follow-on efforts will contribute to a significantly improved national security structure for the United States. ******** This and other CSL publications can be found online at http://carlisle-www.army.mil/usacsl/index.asp ******** The views expressed in this report are those of the participants and do not necessarily reflect official policy or position of the United States Army War College, the Department of the Army, the Department of Defense, the Department of State, or any other Department or Agency within the U.S. Government. Further, these views do not reflect uniform agreement among exercise participants. This report is cleared for public release; distribution is unlimited. Carlisle, PA 170l3-5049 650 Wright Avenue Center for Strategic Leadership U.S. ARMY WAR COLLEGE OFFICIAL BUSINESS CSL 4