Index

 

  For Official Use Only

  Until Release by the

  Committee on Armed Services

  United States House of Representatives

 

STATEMENT FOR THE RECORD

 

BY

LIEUTENANT GENERAL JOHN L. WOODWARD, USAF

DIRECTOR FOR

COMMAND, CONTROL, COMMUNICATIONS,

AND COMPUTER SYSTEMS

JOINT STAFF

 

BEFORE THE 106TH CONGRESS

COMMITTEE ON ARMED SERVICES

SUBCOMMITTEE MILITARY READINESS

SUBCOMMITTEE RESEARCH AND DEVELOPMENT

UNITED STATES HOUSE OF REPRESENTATIVES

8 MARCH 2000

 

 

  For Official Use Only

  Until Release by the

  Committee on Armed Services

  United States House of Representatives


“Information Superiority and Information Assurance: Meeting the Challenges of the 21st Century”

 

 

Mr. Chairman, Members of the Committee.

          I am grateful for the opportunity to again address the committee on the important topic of Information Superiority and its central role in the military transformation process, and to discuss the Joint Staff’s campaign plan addressing this complex issue of great importance.   I am Lieutenant General Jack Woodward, the Joint Staff Director for Command, Control, Communications, and Computer Systems.  I am also the Joint Staff Coordinating Authority for Information Superiority as it relates to implementing and enabling Joint Vision 2010.  My testimony will address Information Superiority, focusing on the delivery of assured, protected connectivity to increase combat power for today’s warfighter.  I will introduce you to an overarching concept referred to as the Global Information Grid (GIG).  Finally, I will share with you some of the important progress we have made over the previous year, and I will identify many challenges we face in achieving Information Superiority.

          At the dawn of the 21st century, the Joint community is fully engaged in exploiting the warfighting advantages of this high tech era.   The Chairman of the Joint Chiefs of Staff published his overarching vision, Joint Vision 2010 (JV2010), that describes warfare in the information age.   It articulates a vision for future warfare where information superiority is the fundamental enabler of the four pillar warfighting concepts: Precision Engagement, Dominant Maneuver, Focused Logistics, and Full-Dimensional Protection.  In simple terms, Information Superiority means getting the right information to the right people at the right time in the right format while denying an adversary the same capability.  Let me start my discussion by creating a fictional scenario of an information-intensive battlefield and address the Information Superiority concepts it represents.

A Potential Future Scenario

 

On a potential future battlefield, a US Joint STARS aircraft detects a column of vehicles nearing a sector patrolled by a German reconnaissance company, one of our Coalition Partners, and injects the positional data of the column into the Common Operational Picture (COP).  The Combined Joint Forces Air Component Commander (CJFACC) and the Combined Ground Component Commander (CGCC) and the Commander of the Joint Task Force (CJTF) all see this information simultaneously.   

The CGCC, using the secret Coalition Wide Area Network (CWAN), directs an orbiting, US-controlled Unmanned Aerial Vehicle (UAV) to reconnoiter the area and identify the vehicles as friend, foe or neutral.  The resulting real time, satellite-relayed video stream is analyzed at Allied intelligence centers on different continents and the vehicles are identified as hostile.  The centers quickly coordinate and build an analysis and targeting package with a common collaborative planning tool and forward this information to the Commander of the Joint Task Force (CJTF) and his coalition component commanders. 

After studying the information, the CJFACC directs an air strike against the enemy vehicles.  A rapid review of real-time status of aircraft in the area reveals the best course of action is to direct an orbiting 4-ship cell of Joint Strike Fighters to engage the target.  In addition, a carrier-based EA-6B is directed to provide Electronic Warfare (EW) support.  The pilots consult their onboard common tactical picture enroute to the target to verify the German team’s position and receive the latest targeting information.  Following the air attack by laser-guided precision weapons, satellite systems relay the real-time strike information from the UAV to the CJFACC, the CGCC, and CJTF commander.  Immediately after the strike, the UAV collects and transmits battle damage assessment information to the analysts to determine if a re-attack is required.   

As this scenario unfolds, operators and analysts are monitoring and assessing the military resources necessary to conduct the operations such as strike and support aircraft, fuel states, weapons loading, system status, and proximity of friendly forces and prohibited targets. The CJTF’s C4 coordination center monitors bandwidth requirements to support real-time voice, data, and video streams necessary to coordinate this coalition operation.  They are ensuring the networks are properly configured, enough bandwidth is allocated, and the C4 systems are immune to hostile cyber attacks.   Operators are alert to jamming and are poised to respond as necessary to ensure uninterrupted radio spectrum availability. 

The power of real-time, networked operations depicted here is the basis for the Commanders’ ability to share a common operational picture, collaboratively plan strikes, retarget weapons platforms while in flight, and work with a multitude of coalition partners. 

We accomplish much of this today, but it’s HARD work. Challenges remain in the areas of security and interoperability of our joint and coalition C4 systems.

This scenario highlights the potential power of a network-centric force -- force with the capability to dynamically retarget on demand -- a force with the capability to dynamically network sensors, regardless of platform; shooters, regardless of service or country; and decision makers, regardless of location.  This is what the ongoing transformation of military capability is all about.

Increasingly, it is a secure, reliable network that makes an effective warfighting force.   As a result, securing the network is not just about securing information.  It is about enabling assured operations and mission success.

We plan to achieve Information Superiority through an overarching concept called the Global Information Grid (GIG).

 

Realizing the Network - The Global Information Grid

 

The Global Information Grid is a unifying concept and one of the key enablers of Information Superiority.   We think of the Global Information Grid in the same way that most people think of the “Internet,” a single concept that describes something that is very complicated and constantly evolving.   General Shelton, the Chairman of the Joint Chiefs of Staff, told Congress during his recent posture statement: An important aspect of future operations will be the development of a Global Information Grid, or GIG, to provide the network-centric environment required to achieve information superiority.  The GIG is the globally interconnected, end-to-end set of information capabilities, associated processes, and personnel to manage and provide information on demand to warfighters, policy makers, and supporting personnel.  It will enhance combat power through greatly increased battlespace awareness, improved ability to employ weapons beyond line-of-sight, employment of massed effects instead of massed forces, and reduced decision cycles.  It will contribute to the success of non-combat military operations as well.” 

 

Achieving the Global Information Grid

 

The overarching rationale for the Global Information Grid is supported by the ongoing shift to network-centric operations, the principle component of the Revolution in Military Affairs transformation.  In the military context, weapon systems are essential for mission success.  In times past with platform-centric operations, the link between sensors and shooters was tenuous and lacked the timeliness required.  In today’s network-centric operations, the timely exchange of information is key to leveraging all available sensors and weapons systems to generate increased combat power.  The secure, networking capabilities inherent in the Global Information Grid provide the fused, timely information essential for joint mission success.  It enables commanders to create a dynamically integrated fighting force by linking sensors to shooters to generate massed effects.  Because of this inextricable tie to combat power, the Global Information Grid must be treated like a weapon system.  Treating the Global Information Grid like a weapon system has several significant implications for its deployment and employment.

Operationalize the GIG: Our CINCs and warfighters must be confident they have the information superiority capabilities they need to fight and win.  We must standardize our network operational concepts and doctrine.  We must institutionalize our tactics, techniques and procedures (TT&P) and demand the requisite training of our network system administrators and the personnel who employ the GIG’s global applications (e.g. Global Command and Control System).  We must provide end-to-end visibility into the health and readiness of these critical components to decision makers as they make trade-off decisions to balance limited resources against operational demands. 

Organize for Combat: We must organize units that operate, maintain, and protect our networks as an integral part of our warfighting command structure, just as we do with all other warfighting resources.  We need to consolidate responsibility and operational control under a single warfighting commander.  This will place the authority for allocating essential, limited resources based on operational exigencies under a commander charged with the responsibility for the Global Information Grid. 

Protect and Defend the GIG: Defending our military capabilities is second nature to us.  Protecting and defending our networks and the information that is collected, processed, aggregated and stored over them should be as well.  We are committed to protecting the network with the same vigor that we protect other important elements of our force structure, such as the deployed Carrier Battle Group or a bomber enroute to its target.  All of these weapons systems use an analogous  Defense-In-Depth strategy.   This strategy employs techniques on the perimeter to detect intruders, capabilities to assess threats within our boundaries and technology to respond to attacks when necessary to restore the force structure.

Improve GIG Performance: As quickly as the technology evolves to allow us to prioritize and manage the flow of information over the network, we must adopt the means to optimize our systems.    There must be enough capacity to support the way the warfighter wants to fight now and in the future. A key lesson learned from Operation Allied Force is that today’s battlefield is information intensive.  Unmanned Aerial Vehicles (UAVs), Video Teleconferencing, and Imagery require lots of bandwidth.  Precision guided munitions rely on global positioning data for accuracy.  Dispersed units rely on secure voice and data for situational awareness and command and control.  Our networks must be optimized to support all of these capabilities when needed.   Another key lesson learned was that our ability to manage the radio spectrum and the limitations of current tactical ground terminals directly impact the end-to-end network performance.  During Operation Allied Force, over 44,000 radio frequencies were deconflicted, permitting an uninterrupted flow of information.

Expand the GIG: The Multinational warfighting and peacekeeping environment in which the military operates today requires an ability to be able to “connect” with allied and coalition partners in order to operate effectively.  The need for a Coalition-wide WAN (Wide Area Network) has been validated over and over again in recent operations involving our multi-national partners.  Security technology, information releasability and other policy matters are key to making this a reality.  We must continue developing technology to reduce the manual burden of information releasability and secure connectivity while also working the policy issues to ensure we can share information within an international scenario.  In addition, improved cryptographic capabilities supporting high speed, high bandwidth communications must be part of the gameplan.

          Fund and Acquire GIG Capabilities: We have to compete and resource the Global Information Grid like any other weapon system. The Global Information Grid is a continually evolving system of systems that must be funded in a synchronized and coordinated manner.  Training to operate and protect these complex systems must be an integral component of our fielding strategy for successful employment of forces.  Research and development for advanced technologies to improve the communications and computing capability of the network must be a priority.

          Value the GIG: In today’s military, we value what we can depend on for mission success.  The Global Information Grid is the linchpin in both our military operations and business processes.  We must consider it an essential, precious resource in our arsenal of weapons.  The Global Information Grid is the entry fee for the DoD transformation and the combat power associated with our Joint Vision and it must be valued as any other essential component.   Deploying the Global Information Grid is a Strategic, not a Tactical decision. It is not a C4 decision -- it is a decision about increasing combat power.

The Global Information Grid to Date

The Joint Community is making real and tangible progress towards treating the network like a weapon system and making the GIG a reality.  Examples of this transformation are abundant.

United States Pacific Command (PACOM) is in the midst of operationalizing theater networks by establishing a Theater C4ISR Coordination Center (TCCC) and developing associated Techniques, Tactics, and Procedures (TT&P).  The TCCC will provide USCINCPAC with unprecedented visibility into theater networks.  The TCCC will provide a readiness assessment based on specific metrics enabling USCINCPAC to provide operational direction to Service components and other operators of networks, systems, and applications to optimize the Global Information Grid for current operations.  The TCCC will provide health and status information concerning theater networks to the Global Network Operations and Security Center that monitors DoD’s backbone communications networks. 

The first step in acquiring and funding the components of the Global Information Grid occurs in the requirements generation process.  Two separate but interrelated events are currently taking place which have significant impact on the evolution of the Global Information Grid.

U.S. Joint Forces Command is responsible for authoring a Capstone Requirements Document (CRD) describing the essential elements of the Global Information Grid.  This is the first time a single, overarching capstone document will provide a definitive architectural framework describing the inter-relationships and components of the weapons systems, connectivity, computing capabilities, applications, basic foundation concepts, network operations and information management components that comprise the Global Information Grid.  Rather than disparate, isolated networks, the CRD will call for interoperable, accessible, secure, reliable, inter-networked capabilities to enable effective global military operations. 

In addition, the requirements generation system as a whole has been strengthened with the rewrite of the Joint Staff instruction that governs this process.  It specifically requires C4 interoperability in future systems be demonstrated at key acquisition milestones.  This will improve the link between systems acquisition and end-to-end interoperability in an operational context.   The Joint Requirements Oversight Council (JROC) along with the Military Communications-Electronics Board (MCEB) and the new DoD Chief Information Officer (CIO) Executive Board will collaborate throughout the systems acquisition process to ensure capabilities are fielded that meet CINC, Service and Joint interoperability requirements.

End-to-end network performance is being enhanced through modeling and simulation.  The Network Warfare Simulation (NETWARS) initiative provides the first modeling and simulation capability to assess the performance of the Global Information Grid.  The Joint Staff-led NETWARS program was developed from a leading commercial network simulation tool, OPNET.  NETWARS is being used today to model the effectiveness of operational plans using the Global Information Grid as it currently exists.  Not only will we begin to assess the capability of our networks to support specific Joint operations during the planning stage, but NETWARS will help us understand where and how to employ advanced technologies to expand and improve the Global Information Grid.  For example, NETWARS will help understand the extent to which a new capability, such as the Advanced Wideband Satellite System, will improve the performance of the Global Information Grid.

Network performance and radio frequency (RF) spectrum usage are inextricably linked.  Over the past year, Congress has championed protection of the RF spectrum that is so critical to military operations.  You have returned 8 Megahertz of previously reallocated spectrum for DoD use.  Under your scrutiny the Federal Communications Commission (FCC) reassigned 50 Megahertz to preserve contiguous bandwidth required by the Navy’s Cooperative Engagement Capability - a program which provides networked sensor capability to shooters.  These and similar initiatives saved hundreds of millions of dollars for the Department and had a direct impact on our ability to employ and protect our fighting forces.  Thank you for your tenacity and objective assessment of our needs. 

Protecting and defending the Global Information Grid is a fundamental, mainstream military imperative.  Our strategy for information assurance is one which employs multiple layers that we call “defense in depth.”  This strategy establishes a set of minimum capabilities required for each of the four levels of Defense in Depth: the network, the enclave, the computing environment and the infrastructure.  These capabilities include automated and verifiable access control of database and software applications as well as a department-wide policy for virtual private network configurations.  They will enable the Department to keep pace with rapid technological advances while allowing for the integration of legacy equipment with existing capability.  Procedural changes are underway as well to take advantage of the technology currently employed.  We learned much from our experience with the most significant threat to the Global Information Grid that we have ever experienced – Y2K from both a technological as well as a procedural perspective.  We now have the tightest configuration control of the networks and computer systems that we have ever had and we intend to maintain this standard.

The Department is well on its way to organizing the Global Information Grid for combat operations.  A significant development in FY99 was the assignment of the Computer Network Defense (CND) mission to USCINCSPACE through the Unified Command Plan (UCP) 99.    This change gave a Commander in Chief (CINC) the responsibility and authority to protect and defend the Global Information Grid for assured operations and mission success.  The action arm of USCINCSPACE is the Joint Task Force Computer Network Defense (JTF-CND) operating here in Washington DC and co-located with the Global Network Operations Systems Center (GNOSC) of the Defense Information Systems Agency.  The GNOSC can display the operational picture of critical DoD networks worldwide. The co-location of these two operations results in tremendous synergy and synchronization. One of the success stories of placing the CND mission under a CINC was the operationalizing of readiness conditions as they apply to our worldwide networks.  Global Information Conditions or INFOCONs, are set by USCINCSPACE based on the level of threat to the Global Information Grid.   Each INFOCON level requires specific actions by personnel at every camp, post, base, station, and deployed unit.  This standardizes protection of this resource; a resource that is only as strong as its weakest link.  

Our ongoing Navigation Warfare (NAVWAR) initiative addresses potential vulnerabilities to the Global Positioning System (GPS).  This initiative is a major step in assuring access to the Global Information Grid.

Improvements to the Global Information Grid come from technological as well as procedural advances.  There has been much discussion about the challenges associated with exploiting rapidly emerging technology.  Let me tell you about some of our successes using Advanced Concept Technology Demonstrations (ACTDs), Joint Warrior Interoperability Demonstrations (JWID), the Joint C4ISR Battle Center and evolutionary acquisition processes. 

We currently have a Pilot Program in the Pacific that employs the information dissemination management capabilities developed in the Battlefield Awareness and Data Dissemination Advanced Concept Technology Demonstration (ACTD).  This capability will allow Commanders to “pull” information from multiple sources on demand as well as allow information sources to “push” critical information to specific warfighters as required.  The Information Assurance: Automated Intrusion Detection Environment (IA: AIDE) ACTD at U.S. Strategic Command promises to provide analysis and warning of information attack by integrating and displaying data from multiple intrusion detection sensors.  This capability will decrease time required to assess attacks on our networks and help discriminate serious threats from casual hacking attempts. 

Joint Warrior Interoperability Demonstrations provide an opportunity for the evaluation of emerging technology within a warfighting scenario to solve interoperability problems.  The last demonstration focused on coalition interoperability and resulted in establishing a coalition federated battlelab network that continues today.  This network will allow further studies in the operation of a secure network with our coalition partners.  Upon completion, warfighters identify the most promising, low cost technologies for immediate fielding.  Examples of these “golden nuggets” include data compression, collaborative planning tools, and secure information exchange capabilities.   

The Joint C4ISR Battle Center (JBC) is focussed on assessing new and emerging technologies to meet current and near-term CINC C4ISR requirements.  They measure the efficiency, effectiveness, and technical feasibility of commercial products.  For example, the Joint Battle Center evaluated and recommended Rosetta technology as a near-term solution to tactical data link interoperability problems.  Once deployed, this technology will help us provide the warfighter with a consistent composite air/ground picture.      

Evolutionary acquisition processes have been developed to leverage the advantages offered by a technology that leaps ahead every 12-18 months.  Our Global Command and Control System (GCCS) serves as the model for this novel approach to acquisition.  The GCCS model, supported by the Defense Information Infrastructure Common Operating Environment (DII COE) and the Joint Technical Architecture (JTA), allows rapid insertion of applications which add value to the warfighter.  Tight configuration control, stringent security and standard software are the keys to GCCS.  Our premier command and control capability provides the warfighter with a fused, near real-time common operational picture of the battlespace and the ability to coordinate, direct and respond vertically and horizontally to prosecute the mission.  The lessons we have learned in the GCCS program over the last three years are being applied directly to the Global Combat Support System (GCSS) today – an evolving capability whose utility was demonstrated during the war in Kosovo.

Our efforts to partner with Industry are proceeding along a number of fronts.  We have entered into an ongoing dialogue to address technological advances in the satellite communications and computing arenas to increase our understanding of how technology can improve our warfighting capabilities, as well relaying our broad requirements for the future.  These technical exchange opportunities help pave the way for capability development with an eye toward the feasible and the practical.

Appropriate levels of funding for the components of the Global Information Grid must be considered in relationship to the global capability as a whole.  The Global Information Grid satisfies requirements of tactical and strategic missions in an integrated and complex end-to-end fashion.  Lack of funding in one area, such as connectivity or computers, impacts the capability of the whole.  The Services and Agencies have submitted plans to provide bandwidth, computing power, network operations, information assurance, and applications as well as other related programs, all designed to achieve the single goal of the Global Information Grid.  These funding requests approach our minimum requirements today within the resources available.  The Services’ budget requests are based on operational requirements, many of which were highlighted in demonstrations and experiments.  The unifying theme of the Global Information Grid provides a conceptual framework for developing an investment strategy to achieve Information Superiority.

Integrating across Service experimentation efforts has given us insights into the joint combat power enabled by the Global Information Grid.  In the Army’s Advanced Warfighting Experiments (AWEs) tactical internets increased combat power by up to 250% as compared to a non-networked environment.  The Air Force has demonstrated a 250% increase in the kill ratio of an F-15C employing data links.  The Navy has demonstrated significant improvement in warfighting effectiveness in the counter-Special Forces mission area.  Similar results have been seen in the Marine Corps.

These capabilities highlight the key role of “the network” in enabling Information Superiority and demonstrates that Information Superiority is not just about technology, but about using people who use information to develop a competitive advantage.  This, however, provides both challenges and opportunities.

 

The Challenges  Ahead

 

There is no shortage of challenges and opportunities in the Information Superiority arena.  Let me outline a few of the ones we face, with a special emphasis on Information Assurance. 

The Military and Commercial Sectors must co-exist.  A strong economy and a strong military are both increasingly dependent on networks.   In some cases, our information rides through the same pipes. In other cases, we are in contention for resources that cannot be shared, such as frequency spectrum.  To preclude mutual interference, we continue to work with our civil, commercial and international partners to preserve our access to RF spectrum.
          As we move forward in deploying the Global Information Grid, we must continue to balance investments in our satellite communications capacity.  Our objective is to determine the appropriate mix of military and commercial capabilities to ensure worldwide coverage for our tactical and strategic users.  We are entering an era of great technological improvements in the satellite communications marketplace that provide significant promise for increased capability for the warfighter.

When working with coalition partners, we must accommodate multi-national technologies, many of which are developed outside of the U.S.  Our challenge is to ensure interoperability of these different but similar capabilities to ensure success with our coalition partners.

Kosovo pointed out the need for more communications capacity in our theaters. Thanks to some quick reaction by our Services and Agencies, we were able to provide adequate communications capacity to support the Air war.  Had we been involved in a ground operation in Kosovo our communications limitations would have impacted the conduct of operations.  Although we are working on ways to reduce the communications demand, our need for bandwidth has grown dramatically in the last few years because of the increased reliance on video teleconferencing, real-time video, imagery and web-based technology.  We need your continued support in funding critical components of the Global Information Grid, especially connectivity and computing power.  Information Assurance (IA) studies conducted over the past few years have provided ample guidance in determining the technology required for our defense in depth strategy.  The challenge before us is to apply precious resources to field capabilities.  We can’t afford to allow the “best” to get in the way of the “good enough.”  The difficult part is determining the “good enough.” 

As we continue to operationalize information assurance, we will field equipment and promulgate policies to optimize CINC-centric operations.    We are developing an Information Assurance Concept of Operations (CONOPs) for the deployed environment.   This document will help standardize and professionalize IA in every Joint Task Force we send to the field.   We are also orchestrating the deployment of a suite of equipment and software to ensure Joint Task Force Commanders leave home with the right IA capabilities to protect initial and follow-on operations rather than evolving to some level of protection over time.

Joint directed exercises and training are critical evolutions in institutionalizing joint doctrine and TT&P associated with operating and securing our critical networks, and maintaining our Global Information Grid.  Future exercises will focus on specific cyber threats and risk mitigation techniques as well as dynamic allocation of network resources.  We must expand these activities into the coalition training environment.

We are engaged in an aggressive validation of our current doctrine and guidance documentation that provides the direction to the components of the Global Information Grid.  These include two doctrinal publications, 22 policy and guidance instructions and five detailed procedural manuals.   Particular emphasis is being paid to the Defense in Depth strategy that directs the CINCs, Services and Agencies to put in place a minimum set of capabilities for the network, enclave, computing environment and the critical security infrastructure including use of Public Key Infrastructure (PKI) technology.  Although we are moving in the right direction, we are only moving as fast as the funding allows.

 Another area needing attention is our ability to “red team”—that is, allowing our technical experts to attack and exploit our own networks.  These teams would act as independent assessors, able to show us our own vulnerabilities.  Currently, however, the red teaming process is cumbersome and sometimes slow.  As a result, there are very few “no-notice” red teaming efforts today.  We must address the barriers that inhibit our ability to identify our own weaknesses before the enemy has the opportunity to exploit them. 

Although DOD networks were not affected by the rash of recent attacks against commercial web sites such as E-Bay and CNN, DoD continues to see an ever-growing number of attacks against our information systems.  It is time to reevaluate the penalties associated with deliberate hacking.  The recent case law developed from cases such as Melissa virus attacks, and numerous, highly publicized hacking events provides enough evidence for the legal community to review current laws to determine if they are sufficient to deter future attacks against our systems.

We cannot operate the Global Information Grid without people.  We are using “special skill” rewards to attract, train, and retain our best Soldiers, Sailors, Airmen, and Marines.  However, our Total Force Information Technology Warriors are faced with choosing between their military professions and opportunities in the commercial sector that will compensate them at a much higher rate.  We must continue to assess our retention programs, proficiency pay, and operational tempo, which affect these highly trained and experienced people.  They are truly our Nation’s most precious resource.

Finally, we cannot view the command, control, communications and computers (C4) systems and the intelligence, surveillance and reconnaissance (ISR) budgets as bill payers for traditional Weapon Systems, but rather as the entry fee for the transformation that must be paid up front.

 

Conclusion

 

Ten to twenty years from now, I believe that people will look back on this period at the beginning of the 21st century and say one of two things.   There was an tremendous opportunity for transformation – but it was squandered, because the key role of the Global Information Grid was not appreciated, or... there was a tremendous opportunity and it was capitalized upon by the DoD and Congress working together to make a difference.

In conclusion, I believe we are making solid progress toward implementing a Joint Strategy for Information Superiority that supports our Warfighters.  Mr. Chairman and Members of the Committee, I look forward to helping make the Information Superiority strategies that I have shared with you this afternoon a reality, and to addressing you in the future regarding our successes and way ahead.  On behalf of the Chairman of the Joint Chiefs of Staff, I appreciate the opportunity to present the Joint Staff's insights on how to advance this issue of growing national importance – Information Superiority.