In 1996, the Chairman of the Joint Chiefs of Staff issued a conceptual framework for the Department of Defense's (DOD) war fighting called Joint Vision 2010.1 The document identifies information superiority over the enemy as a key element for the success of this vision. DOD defines information superiority as "the capability to collect, process, and disseminate an uninterrupted flow of information while exploiting or denying an adversary's ability to do the same." DOD believes that information superiority can provide significant advantages over the enemy during a conflict and increase the efficiency of peacetime and wartime operations. However, greater reliance on information systems may also make DOD vulnerable to intrusion and attack on those systems, damaging its war-fighting capability.2 As requested, we evaluated DOD's progress in implementing certain key information superiority activities to provide an indication of how well DOD is progressing toward its information superiority goals. Specifically, you asked us to evaluate DOD's progress in establishing a DOD-wide architecture for the information systems known as Command, Control, Communications, Computers (C4), Intelligence, Surveillance, and Reconnaissance (C4ISR) systems; developing and implementing the Global Command and Control System (GCCS); and establishing the Joint Tactical Radio System (JTRS). 'Joint Vision 2010 recognizes the need to modernize DOD's war-fighting concepts and respond to advancing technologies for the 21st century. It translates information superiority and the technological advances that are changing traditional war-fighting concepts into new concepts through changes in weapon systems, doctrine, culture, and organization. It also describes the improved intelligence and improved command and control available in the information age as the basis of four operational concepts-dominant maneuver, precision engagement, full dimensional protection, and focused logistics. 2Information Security: Computer Attacks at Department of Defense Pose Increasing Risks In addition, you asked us to evaluate DOD's progress in implementing recommendations of the Defense Science Board Task Force on Information Warfare-Defense.3 At your request, we reported on DOD'S implementation of these recommendations and other activities to protect its C4ISR systems in a separate letter to the Subcommittee for a June 11, 1998, joint hearing with the Military Procurement Subcommittee on the fiscal year 1999 national defense authorization request on Critical Infrastructure Protection-Information Assurance.1 Background Achieving information superiority will be expensive and complex. Based One of DOD's key activities to achieve information superiority is the The recommendations were presented in Report of the Defense Science Board Task Force on Information Warfare-Defense (IW-D), Office of the Under Secretary of Defense for Acquisition and Technology (Washington, D.C.: Nov. 1996). The task force determined that DOD's information systems were highly vulnerable to intrusions and attacks and made over 50 recommendations for improving their protection. 'DOD's Information Assurance Efforts (GAO/NSIAD-98-132R, June 11, 1998). 5DOD describes this infrastructure as all of the information systems and networks used to support the war fighter. "DOD defines situational awareness as knowledge of one's location, the location of friendly and hostile forces, and external factors such as terrain and weather that may affect one's capability to perform a mission. |