Goal: C4I systems that remain operationally
secure and available for U.S. forces in the face of attacks by
The more military leverage that C4I systems
provide for U.S. forces, the larger the incentives are for an opponent to
attack those systems. Indeed, it makes little sense for an opponent to
challenge the United States symmetrically, i.e., force on force. More likely
avenues of challenge are asymmetric ones that exploit potential U.S.
vulnerabilities. Attacking U.S. C4I systems--whether directly or indirectly
(e.g., through the U.S. civilian information infrastructure on which DOD C4I
systems often depend)--is only one of many possible asymmetric attacks, but
one for which the United States must be adequately prepared. Because the DOD
understands the challenges of physical security for C4I systems very well,
this report focuses on cyber-security.