Idiosyntactix Strategic Arts and Sciences Alliance The Brand Name of the Media Revolution |
[library]
Background and PurposeBackground and Purpose
The C4I for the Warrior (C4IFTW) concept that currently guides the military's adoption of information technologies involves the provision of vastly increased access to information at all echelons. The full implications and consequences of achieving the stated goals and objectives of C4IFTW will, of course, not be clear for years to come. The analysis reported upon herein was initiated as a result of concerns expressed by the Chairman of the Joint Chiefs of Staff regarding the unintended consequences of providing too much access to information.
Implicit in the concerns being expressed by the Chairman and others throughout the Department of Defense (DoD) are uncertainties about the impact of separating information flows from the command structure and the effects of almost unlimited amounts of information upon decision making. Questions remain regarding exactly how much information should be provided to each echelon. For example, how does the pro- vision of information relate to a unit's mobility and lethality? The appropriate command concepts for an information-rich battlefield have, as yet, not been determined even at the most basic level. Concerns have been raised regarding the potential adverse effects of increased visibility into operations at all levels, including potential for information overload, second guessing, micro-management, stifling of initiatives, and distraction.
A separate but related set of concerns involves the manner in which our potential adversaries adopt and utilize these technologies and the capabilities that result. A final set of concerns involves our ability to protect information and information assets and to deal with failures of and degradations in the systems that provide information to decision makers, shooters, and others with crucial roles.
The purpose of this analysis is to identify a strategy for introducing and using information age technologies that accomplishes two things: first, the identification and avoidance of adverse unintended consequences associated with the introduction and utilization of information technologies; and second, the ability to recognize and capitalize on unexpected opportunities.
Given that our potential adversaries have access to virtually the same information technologies that we have, the margin for victory will be the degree to which we manage our trans-formation into the information age. Our ability to integrate a wide variety of systems into a true system of systems will depend not only upon our technical skills but also upon how well we adapt our doctrine, organizations, and culture to take advantage of the opportunities that technology affords.
Next Chapter
.
.
.
[library]
.
.
.
.
.
.