From the web site at:
http://www.pirp.harvard.edu/pubs_pdf/stenbit%5Cstenbit-i03-1.pdf
-----------------------------------------------------------------


   A CONVERSATION WITH THE ASSISTANT SECRETARY OF DEFENSE FOR C3I
                        John P. Stenbit
                       March 13, 2003
                       
John P. Stenbit became the assistant secretary of defense for command,
control, communications, and intelligence (ASD(C3I)) in August 2001, and
now heads the C3I successor organization, Networks and Information
Integration. Prior to this appointment, his private and public sector
service in the telecommunications and command and control (C2) fields
spanned over thirty years. From 1973 to 1975, he served in the Department
of Defense (DOD) as principal deputy director of telecommunications
and C2 systems; for the next two years, he was staff specialist for
worldwide military command and control systems in the Office of the
Secretary of Defense (OSD). He has served as chairman of the Science and
Technology Advisory Panel to the director of central intelligence (DCI),
and was a member of the Science Advisory Group to the directors of naval
intelligence and the Defense Communications Agency. He also chaired the
Research, Engineering and Development Advisory Committee for the
administrator of the Federal Aviation Administration, and has served on
the Defense Science Board, the Navy Studies Board, and the National
Research Council Manufacturing Board. In 1968 he joined TRW and was
responsible for the planning and analysis of advanced satellite surveillance
systems; he retired from TRW as an executive vice president in 2001.
Previously, he had worked for the Aerospace Corporation on C2 systems
for missiles and satellites, and on satellite data compression and pattern
recognition. Mr. Stenbit has bachelor's and master's degrees in electrical
engineering from the California Institute of Technology, and is a member
of the National Academy of Engineering.

-------------------------------------------------------------------------


Oettinger: We are privileged to have as our guest today John
Stenbit. You have had a chance to look at his biography and find
out about his distinguished career, so I won't eat into his time
by making any further introductions. He has indicated a
willingness-indeed, a desire-to be bombarded with questions
rather than to give any kind of formal presentation. I know
you're not shy, but just to avoid the slightest risk that we
won't get off to a start, let me throw the first one out. Could
you enlighten us a bit about what pulled your office
together-what the motivations were for pulling together command,
control, and this, that, and the other thing; what the
motivations are currently for creating another office with the
intelligence label; and where that all stands practically and
rationally? Let's go around. Other questions?


                             -2-

Student: We discussed moving from n 2 communications nodes to n.
Could you talk a little bit about the bandwidth associated with
that? 

Student: I was wondering if you could talk about how the
"I" part of your organization is changing as a result of the war
on terrorism. What happened to "I" after September 11? 

Student: I'm curious about funding. Do you think that you're 
properly funded? What role does the monetary system play? 

Student: Could you maybe discuss the CONOPS [concept of 
operations] for data management and information sharing? Then 
I have a second question on the budget. Could you maybe discuss 
your thoughts on Joint Forces Command [JFCOM] and how the PPBS 
[planning, programming, and budgeting system] cycle might be 
reformed to better incorporate joint technologies? 

Student: What do you see as the changes in your office as you 
go from "C3I" to "C3"?

Student: Do you have anything to say about the relationship
between the DOD and the new Department of Homeland Defense
[DHS], and if your agency is going to be involved with that in
any way? 

Stenbit: Is this off the record? I have no problem with
anyone down here. 

Oettinger: Let me spell that out. Anything you say is not for 
attribution if you don't want it to be; however, we are recording 
it. You will have a chance to edit it before anything gets 
published, and we've had no leaks of the tapes in the past. 

Student: How is the DOD involved in the Terrorist
Threat Integration Center [TTIC]? 

Stenbit: I must admit I'm not an expert on that, so I think 
that's going to be a short answer.

Student: Rob Slade just published a damning indictment of our
national strategy to defend cyberspace in RISKS DIGEST.(1)  The
policy is supposed to make cyberspace safe. I wonder if you have
anything to do with this national strategy and what you think
about it. 

Stenbit: I assume the article attacked the policy that
came out of the White House about four months ago-and the final
version that just came out? Information assurance policy is what
you're after here. 

     Okay, that's a good group of questions. I'll see if I can 
get through those in forty-five minutes or so.  That'll leave 
enough time for additional questions. 
     
     Motivations and what happens when you go back and forth are 
interesting. Whether it's a "C3" office or an "I" office or a 
combination of the two, nobody in the OSD wanted either of them 
to be there, because they symbolize a set of problems that always 
come up. It would be
     
                         --------------- 

(1) Rob Slade, "Education and the National Strategy to Secure 
Cyberspace," The Risks Digest 22, 63, 12 March 2003, [On-line]. 
URL: http://catless.ncl.ac.uk/Risks/22.63.html#subj1 (Accessed 
22 July 2003.)
     

                               - 3 -
     
nicer if it were some sort of clean organization. For instance, 
when you talk about financing there's a comptroller. When you 
talk about personnel, there's a personnel office. Because it's 
the government and the DOD, there is always going to be a policy 
organization that's looking at what the State Department (or 
whoever) does from our point of view. Because the DOD spends an 
enormous amount of money, there's going to be some integration 
of how we procure and acquire things. Those functions are 
accepted as parts of the job, and have an evolution of their own. 
They become stovepipes. They become an entire financial mafia 
and an acquisition mafia and their attributes all get written 
into the law. 

     Both "C3" and "I," in whatever form you'd like to take them, 
are there because of a different kind of problem. Something went 
wrong. Something didn't work, and it didn't work often enough and 
consistently enough that we had to have somebody to task with 
working on solving that problem. In the period of the 1960s, neither 
office existed, as I recall. (It was slightly before my time.) In 
the early 1970s, there was created what was called an ASD(T), an
assistant secretary of defense for telecommunications, and there
was an ASD(I), an assistant secretary of defense for
intelligence. They were parallel to each other, and they were
both there for approximately the same reason, which was the
demand for intelligence information from the operational side of
the military. That meant the information had to be very specific
and very fast, as opposed to (and I'm not trying to be
pejorative when I say this, but I'm trying to make an allusion
that is at least useful for you) sitting and reading things and
then thinking about them and writing reports about what you
read. The things you have as input are a little bit more
privileged as pieces of information than you can get by reading
books or newspapers. The intelligence community was really used
to large-scale analysis kinds of issues, but the output was in
the form of papers and almost books, et cetera. 

     The interaction of various force components and what was 
going on in Europe in those days caused people to start to worry 
and ask, "Hey, wait a minute! What are the details of the Russian 
plans for attack? More important, what are the sorts of things 
that we could measure to get some inferential data that might 
actually lead to where people would go and attack things at a 
tactical level as opposed to the strategic level?" I wasn't 
there, and I can't speak for it, but my sense is that this 
happened when we first believed that we were actually going to 
do something other than drop nukes on somebody. 

Oettinger: For those of you who are interested in pursuing this 
topic further, there is a contribution to the seminar by Ruth 
Davis, who I think was director of defense research and engineering 
around that time.(2)

Stenbit: She came after this. She was there in the late 1970s,
after I left. She was at the DIA [Defense Intelligence Agency]
when all that was happening. 

Oettinger: Second, we will be hearing in April from Jim Simon, 
who would represent a somewhat different view of the balance 
between intelligence in the large versus the tactical.(3)

                     -------------------
                     
                     
(2) Ruth M. Davis, "Putting C 3 I Development in a Strategic 
and Operational Context," in Seminar on Command, Control, 
Communications, and Intelligence, Guest Presentations, Spring 
1988 (Cambridge, Mass.: Harvard University Program on Information 
Resources Policy, I-89-1, March 1989), [On-line]. URL:
http://www.pirp.harvard.edu/pubs_pdf/davis\davis-i89-1.pdf.


                           - 4 -
                           
Stenbit: He's younger than I am, so his first-hand data probably
also come from back in the 1970s. 

     Anyway, on the telecommunications side I do know what was 
happening. We were having a whole series of major failures. The 
North Koreans captured the USS PUEBLO in January 1963. [sic] It 
took them thirty hours to get the PUEBLO back to North Korea, but 
it  took us thirty-six hours to find out that there were Marine 
aircraft on Okinawa that could have intercepted it and saved it. 
The fact that the Koreans were slow is interesting; the fact that 
we were slower is even more interesting. 

     The Israelis called us up one day and said, "If you don't 
get that ship, the LIBERTY, out of this place we're going to sink 
it in twenty-four hours."(4)  We couldn't tell the ship to move 
when we got the data back because it was already under the water, 
because it took more than twenty-four hours for the data to wander 
in through the system and come out at the other end. 

     A ton of such case were going on, and there was a whole 
committee in Congress carrying out permanent investigations of the 
failures of Pentagon communications. The DOD telecommunications 
and intelligence offices were formed at about the same time, and 
they were both formed because of these problems. Actually, the key 
for both of them was to get involved in the integration of 
acquisition, development, policy, and actual strategy. We were able 
to use computers -- the environment was getting more automated --
but in those days there weren't any networks. DARPA [Defense 
Advanced Research Projects Agency] was just thinking about inventing 
the ARPANET in 1969. I think Mr. Gore got caught up in this a little
bit, but what he did was about ten years later. It was basically
a 1980 phenomenon-before there was any rigorous and robust
network. 

     On the intelligence side it was the same issue. It was
highly compartmentalized. The NSA [National Security Agency]
didn't tell anybody what it did; the CIA [Central Intelligence
Agency] didn't tell anybody what it did. We were taking pictures
in those days, and the people who took them didn't tell anybody
what they did, and so forth. The genesis was sort of "Let me
have some places to go and work on this problem." What really
happened on the "I" side in 1974, 1975, and 1976 was a whole
stretch of congressional activity dealing with the intelligence
agencies, undertaken by Senator Frank Church [Dem.-Id.] and
Congressman Otis Pike [Dem.-N.Y.]. Some of us were suspicious
about what their motives were, but in any case they were
certainly effective in challenging a lot of 

                         --------------
                         
(3) James M. Simon was assistant director of central intelli-
gence for administration. See James M. Simon, "Crucified on a 
Cross of Goldwater-Nichols," in Seminar on Intelligence, 
Command, and Control, Guest Presentations, Spring 2001 
(Cambridge, Mass.: Harvard University Program on Information 
Resources Policy, I-01-3, July 2001), [On-line]. URL:
http://www.pirp.harvard.edu/pubs_pdf/simon\simon-i01-3.pdf, 
and "Analysis, Analysts, and Their Role in Government and
Intelligence," in Seminar on Intelligence, Command, and Control,
Guest Presentations, Spring 2003 (Cambridge, Mass.: Harvard
University Program on Information Resources Policy, I-03-1, July
2003), [On-line]. URL:
http://www.pirp.harvard.edu/pubs_pdf/simon\simon-i03-1.pdf

(4) For a detailed account, see A. Jay Cristol, "The Liberty 
Incident," in Seminar on Intelligence, Command, and Control, 
Guest Presentations, Spring 1995 (Cambridge, Mass.: Harvard 
University Program on Information Resources Policy, I-96-2, 
January 1996), [On-line]. URL: http://www.pirp.harvard.edu/
pubs_pdf/cristol\cristol-i96-2.pdf and The 1967 Israeli Attack 
on the U.S. Navy Spy Ship (Washington, D.C.: Brassey's Inc., 
2002).


                        - 5 - 
                        
issues about the intelligence community. They really went on a 
crusade to challenge the removal of rights that had allowed the
intelligence communities to do certain things, compared with
normal systems. You have to remember that that's when Mr.
Rumsfeld was the secretary of defense. So when he thinks about
intelligence, what he remembers is having to hire ex-Congressman
[Robert F.] Ellsworth as another deputy secretary of defense (in
those days we had two deputy secretaries of defense, the only
time it's been like that), and he had Al Hall as the ASD(I).
They spent 100 percent of their time worrying about Church and
Pike and what we were going to do and how we were going to do
it. It became an enormous drain on the Secretary's time, in
addition dealing with all the problems that had caused the
ASD(I) to be formed in the first place. We used to refer to that
as the "Green Door Syndrome." The guys behind the green door sat
there and fondled the data and never told anyone anything about
it, et cetera. There was a lot of pressure to try to break down
some of those barriers and see if we couldn't use the
information more proactively. 

     On the C3 side, we had started enormously complex programs 
to make radios interoperate with each other. We wanted to 
communicate using secure voice. In those days, everything was 
analog. There were no digital systems, so that meant you had to 
digitize it. Analog-to-digital converters were rather complex 
in those days. Then, after you digitized it, you didn't have 
the bandwidth to send it, so you had to compress it. As soon 
as you compressed it, everybody sounded like Donald Duck. In 
fact, if you get a very low-bandwidth digital signal today 
and you try to compress it, the vocoders are much better because 
the processing gain is much better, but we didn't have any 
processing then either. 

     So the bottom line was that we had to come up with a 
standard that was DOD-wide, which was 16-kilobit voice, Vinson 
encryptors, and vocoders, et cetera. Let me assure you, every 
service already had its own systems, and none of them used 
Vinson and none of them was 16 kilobits. So there was this 
first-order problem about how to get the Air Force to talk to 
the Army, et cetera. Those were very real problems, because the 
DOD ended up with systems they developed themselves to special-
purpose specifications. There were no commercial standards for 
any of this stuff. 

     Today interoperability is a lot easier. We may not know 
whether we want to do GSM [Global System Mobile] or CDMA
[code division multiple access], but we can build a phone with
both of them in it. We didn't have any of those options then.
The phone would have been the size of a refrigerator if we had
put both in. We can do TCP/IP [Transmission Control
Protocol/Internet Protocol] and anybody can come with any
computer and hook it up to the Internet. There were no such
systems then. Ma Bell, in those days, would not allow you to buy
a handset and hook into the telephone system. It was a "foreign
attachment," and it was against the law to attach a handset to
the Bell network because it might have a resistance load that
might feed into something that might cause a relay to singe once
every 800 years, but they had convinced some court that was a
problem. So we are not talking about today's world. We're talk-
ing about everybody's stuff being proprietary and done by them-
selves. It was either done by Ma Bell or by the DOD, and so on. 

     Then other things happened. The DOD decided that it was
cheaper to buy computers in bunches rather than per application,
because computer hardware was expensive in those days. What
happens when you do a fixed-price, low-bid competition is that
you get the dog of the week. So we ended up with eighty red
Honeywell mainframes. That contract was the only thing

                      -----------------
                      
                      
                           - 6 -
                           
that kept Honeywell in business. We were their last bid. GE
[General Electric] went out of the computer business while we
were in this time frame. All kinds of people went out of the
business. We managed to buy Honeywell. Their operating system
had nothing to do with IBM. Their disk drives had nothing to do
with anybody else. We got what we deserved. We got a really
cheap set of hardware that was useless. But, having bought it,
we now set up an entire program called the Worldwide Military
Command and Control System information system to build the
software to allow these dogs actually to perform a useful
function. That's the kind of job that we used to have in ASD(T).
It changed its name, but that's a trivial issue. 

     I was there for the last four years before it reorganized, 
so I watched Mr. [James R.] Schlesinger's term as secretary and 
during Mr. Rumsfeld's term as secretary. Neither one wanted us 
there. When I would go up and see Mr. Clements, who was the deputy
secretary, and was the guy who actually made the decisions, he
would look at us coming and say "I'm going to get in trouble.
Every time you come in here, somebody screams at me right
afterwards." 

     We were discovering the National Environmental Protection 
Act, which required the government to produce environmental 
impact statements. We were trying to prove that if we modulated 
a wire in Wisconsin the moss would not grow on the south side of 
the trees instead of the north side and confuse the migrating 
birds. Sixty Minutes was all over us every month.

Oettinger: I think it was a sizable chunk of Wisconsin real
estate! 

Stenbit: No, it was a very small piece. It was about six
inches wide and a hundred miles long. In any case, the first
time we turned on one of those systems, they rang every
telephone in West Virginia, because they used the old rotary
dial telephones and every time you got any kind of electric
field they would ring. So there were some very interesting
problems going on. 

     We did some very useful things through interoperability. 
In 1975, for the first time nuclear weapons owned by the Army 
and the Air Force were fitted with devices that voided their 
ability to be used unless they had external information. Prior 
to that time, it was a highly intricate procedural set of 
controls, but it basically was up to the folks who had them in 
their hands. I think of that as an enormous stride forward in 
the balance between "minimizing maximum regret" and still 
being able to get something done if we needed to. How could we 
do that? Because we had confidence in the coding, and confidence 
in some communications systems that actually went worldwide 
and were survivable, and we converted systems that needed fifty-
two aircraft working simultaneously to make them work to needing 
three, so we saved money and made communications more reliable 
by changing frequencies and changing the way we communicated. 

     So there was a lot of integration, if you will, that went 
on in this particular timeframe, but it was all around special-
purpose stuff. Everyone could see that the end of that game was
already there: that we were going to be dominated by the 
commercial world. Even in those days it became pretty obvious 
what was going to happen. The Carter Administration decided to 
change how this worked. President Carter said, "All of this is 
just part of acquisition." That was a mistake, because he missed 
the policy aspects of that. He took a gentleman named Gerald 
Dinneen and he said, "You are now "C3" and "I," but you're also 
the deputy acquisition guy in the department." So he took what 
were fundamentally mixtures of policy, technology, and acquisition
and made them

                            ---------------
                            
                            
                                - 7 - 
                                
into an acquisition-focused system, and lost the bubble a bit 
(in my mind) about some of the more interesting interactions 
that occurred in those days. 

Oettinger: There is an account by Dinneen in the proceedings 
of the seminar if you want to follow up on that.(5) 

Stenbit: I'm not trying to say he did up, down, or indifferent. 
He was assigned a job, like everybody else. 

     In any case, that lasted for four years. Then C3I kind of
was moved out from under acquisition, and has stayed there ever
since. The structure has to do with the policy, and it has to do
with strengthening the hand of the secretary to enforce things
such as interoperability-to actually stop people from doing
things that don't work with other people, et cetera. It's been
like that since 1981, so that's twenty-two years. Now Mr.
Rumsfeld is back, and he remembers it used to be split, and so
he just split it this week. "C3" and "I" have now split.

Oettinger: Is Steve Cambone confirmed as under secretary for
intelligence?(6) 

Stenbit: He is confirmed as of this morning. All the jobs 
involving integration of information are still present,
and therefore the argument to have an end-to-end purview of
what's happening with regard to information sources and
information flows is still a very valid one within the Pentagon.

     But there's another problem, and that is the alacrity 
with which the intelligence community serves what is in fact 
an ever-expanding plethora of requirements from the Defense
Department for speed and accuracy and persistence, which are in
fact not consistent with sitting in a room doing studies and
writing reports. Once again, I'm not trying to be pejorative,
but you need to understand that there's a difference. Political
intelligence is not, in general, time sensitive. It's more like
history. It is predictive. Its utility is to help people
understand why other people are doing what they're doing. If you
happen to find out exactly what the position of the French
ambassador to the United Nations is before the vote next week,
it could be tactical, but what good does it do you? If you're a
company and you find out what the other guy is going to bid,
that's a different issue. You change your bid. So maybe it makes
a difference, but it is in fact fundamentally a slower process.

     The bottom line here is that there's an enormous pressure to
increase the flow of information from the intelligence community
to the DOD over paths that haven't been used in the past. One of
them is to the secretary, by the way. We have a very interesting
system. There are committees that control the priorities within
the intelligence community, and on those committees sit the
secretary of state or his designee, the secretary of the
treasury or his designee, the national security advisor, an Army
person, a Navy person, and an Air Force person, but there's
nobody there for the Secretary of Defense. So actually, there is
physically no voice for the Secretary in the priorities of what
gets done. He doesn't like that, to put it mildly. There's a
whole raft of 

                      ------------------

(5) Gerald P. Dinneen, "C 3 Priorities," in Seminar on Command, 
Control, Communications, and Intelligence, Guest Presentations, 
Spring 1982 (Cambridge, Mass.: Harvard University Program on 
Information Resources Policy, I-82-3, December 1982), [On-line]. 
URL: http://www.pirp.harvard.edu/pubs_pdf/Dinneen\Dinneen-i82-3.
pdf 

(6) Dr. Steven Cambone was previously principal deputy under
secretary of defense for policy.


                             - 8 - 
                             
issues about intelligence information flow that Mr. 
Rumsfeld is worried about, and he believes it's better to 
concentrate on that and take a hit on the interaction and 
the interconnectivity than it is to emphasize the inter-
connectivity. 

     He clearly thinks the interconnectivity is still import-
tant, because he wants the remaining part of whatever (we 
haven't figured out what my office is going to be called)(7) 
to emphasize end-to- end information integration, from 
intelligence all the way up. It's more like a chief information 
officer role, if you wish, than it is a special-purpose kind 
of role. So that's the evolution. 

     The terrorism aspect that you brought up made that all 
the more complex, because now the interface has to occur with 
the law enforcement community as well as with the national 
intelligence community, and that's hard. Those of you who have 
not thought that through may think that everybody in the govern-
ment just fights with everybody else, so they don't tell any-
thing. You have to understand: we have a Constitutional problem 
in our country about the difference between intelligence for 
national security purposes and law enforcement. They're very 
different. In the one case, the sanctity of grand jury investi-
gations and the secrecy of the information are in fact Consti-
tutional in nature and the information is not supposed to be 
shared. 

     They have some other problems. When prosecutors bring 
somebody to trial, their information is all subject to dis-
covery by the opponent, so it behooves them not to keep lots of 
records of alternative hypotheses of the crime. In fact, it 
behooves him to come to a conclusion quickly about the hypot-
hesis and then build a database that confirms it. That's the 
opposite of intelligence, where you're trying to search for 
alternative hypotheses. So there are institutional issues that 
are very real. 

     On our side, we are very reluctant to hand information to
a law enforcement process where discovery has to do with chain
of evidence. The chain of evidence means the lawyers for the
defense can go back and find out where we got it. In a lot of
cases, we're not interested in telling an open court where we
got the information. We have secret systems. We have security
systems we built up to attempt to keep some of that secret. So
there are real problems that are not computer problems or
egomania problems or interoperability problems, but
Constitutional in nature, that cause sharing information to be a
very tough job. 

Oettinger: Before you go on, one other footnote, because adapt-
ation to the issues that John has just mentioned is taking place 
in a very dynamic sort of way. One of the longest histories of 
accommodating to these issues is the creation by the Foreign 
Intelligence Surveillance Act [FISA] of secret courts that have 
a role of applying Constitutional principles, but in a closed 
setting, so as to maintain secrecy. If some of you get involved 
in this area, looking up the FISA court is one manifestation, 
prior to the more recent enactment of the Patriot Act following 
9/11, of adaptations, for better or worse, to these shifting 
concerns. 

Stenbit: That court is set up to protect the Constitutional 
issues that I just mentioned. You get into the angels on the 
head of a pin about "If I'm going to go do something, I have to 
prove it has a foreign intelligence value." If I say it has a 
law enforcement value, it can't go to the FISA court;

                     ---------------
                     
(7) On May 8, 2003, the assistant secretary of defense for 
command, control, communications, and intelligence became the 
assistant secretary of defense for networks and information 
integration/DOD chief information officer.



                        - 9 - 
                        
it goes to a whole different court, with a whole different set 
of procedures. Once I do that, and they give the approval, I am
then forced to live under the constraints that come with that,
which are severe, about "no American entities" and so forth. So
there's a rather intricate set of laws around what I was just
talking about. 

Student: Who's winning the battles? The civil liberties advocates 
or the security advocates? 

Stenbit: I don't think it's a battle. We're not going to give up 
our Constitution, so we're going to have a major challenge in this
world of bridging how we deal with the subject. It's not an
issue in my mind of either side winning; there are just some
fundamentals that are really hard. 

Student: For example, with regard to facial recognition, the 
security folks say that we want the cameras to recognize folks so 
we can see who the terrorists are, and the civil liberties people 
are saying "You're spying on us." 

Stenbit: That's where I was headed. Let me head as close as 
possible to the law enforcement versus foreign intelligence issue, 
which is an interesting one. The addition of terrorism forces 
us to face those issues both inside
and outside the United States. But the thing that's really a big
deal is that the DOD is not supposed to worry about anything
inside the United States. There is a constraint there, namely
the Posse Comitatus Act of 1878, and you should be happy that
there is such a constraint. It is in fact the DOD's job to
protect us from outside threats. 

Oettinger: There's an article, if I could put my hands on it, 
by Stewart Baker on the Posse Comitatus Act. It takes a somewhat 
different view: that there's ample authority and precedent for 
military intervention in a variety of domestic affairs that 
included, for example, integrating the schools. 

Stenbit: That was the National Guard. I don't think those were 
ever active duty military. 

Student: A previous speaker from Northern Command told us, "Yes, 
there is this posse comitatus, but there are enough exceptions 
that we're not too worried about it."(8)

Student: He actually said that troops were used in the inte-
gration situation and in the Los Angeles riots. 

Stenbit: All of these things have waiver rights, and they 
usually require presidential findings of some type. In fact, 
almost all of these kinds of issues do have waivers that are 
allowed. I'm not sure of the exact facts, but it's certainly
true that they would try to use the National Guard before they
would use federal troops, because of the posse comitatus issue.

     But at the fundamental level, the DOD operates against 
foreign threats, and the DHS is supposed to work domestically. 
The DHS job is a lot harder than ours, because we clearly 
have a 

                   -----------------
(8) See Dale W. Meyerrose, "Adapting the Military to the Home-
land Defense and Homeland Security Missions," in Seminar on
Intelligence, Command, and Control, Guest Presentations, Spring
2003 (Cambridge, Mass.: Harvard University Program on
Information Resources Policy, I-03-1, May 2003), [On-line]. URL:
http://www.pirp.harvard.edu/pubs_pdf/meyerro\meyerro-i03-1.pdf.


                           -10- 
                           
decentralized security system within the country, what with
all the police and fire and various special services and so on.
That's not something that's ever been pulled together
particularly well, and that is a big job. 

     The one thing that we would like not to happen is what 
happened after September 11. I'm not complaining, and I think 
it's not inappropriate that what happened did happen, but it 
was a true change in our assumptions as well. We were about 
to go to Afghanistan, and we were looking around for all the 
people it takes to do that. We had 89,000 people deployed in 
the United States doing things that had nothing to do with the 
DOD, but we happened to be the only ones around who could stand 
around with guns in the airports and at border stations and so 
on. Some of the things we were doing, like flying F-16s and 
AWACS [Airborne Warning and Control System] and so on were a 
little more specialized toward the DOD, and in fact we have 
the role of protecting against enemy aircraft. We never thought 
those aircraft would be flown by American Airlines. 

So lots of changes have occurred, but I would say to you that 
the kinds of problems that I have about integration of inform-
ation within the DOD are absolutely trivial compared to those 
of whoever is going to have that job in the DHS. It's going 
to be a very tough problem. 

Oettinger: To underscore this, he's dealing with three services 
and twenty-eight agencies, but it's a two-digit number, as opposed
to three-, four-, or five-digit numbers in terms of the
jurisdictions and responsibilities involved in that fragmented
homeland security environment. 

Stenbit: One of the things that I worry about is that the DOD 
has been asked to be the executive agent for a lot of national 
things. One of them is the National Communications System [NCS], 
which has to do with how communications are provided not for the 
DOD, but for the nation in certain cases. For instance, there's 
a system for senior government officials so that when all the 
phones jam up on Mother's Day, for example, we have a system 
that gets around that. It's called GETS [Government Emergency 
Telecommunications Service] -- GETS gets around it. On 9/11, 
the cell phones all blocked up. We've had, in the same NCS, 
a proposal on the table for quite a while about how to unblock 
cell phones for privileged users. That now exists in three 
cities in the United States. The DOD is not going to do that 
anymore, because NCS has transferred over to DHS. Since that 
was done in the DOD as sort of an incremental additive to all 
the stuff we were already doing, I think it's going to be very 
hard for a long time for those functions to be done in DHS. 
There are some interesting issues wrapped around what you 
asked, not only on the intelligence side, but also on the 
communications side.

Oettinger: It was created during the Kennedy or Johnson
administration. 

Stenbit: But it was really reenergized when Judge [Harold] 
Green broke up Ma Bell in 1982. All of a sudden, in a heart-
beat, we had to be able to negotiate with multiple vendors 
in a legal way to create networks when a disaster strikes. 
For instance, rebuilding the switches in Lower Manhattan was 
entirely done by DOD folks through the NCS kinds of mechanisms, 
although it was done for FEMA [Federal Emergency Management 
Agency] and FEMA paid us. That could not have been done 
without this infrastructure that's been around for a while.

Oettinger: This was augmented by the National Security
Telecommunications Advisory Committee [NSTAC]. It's an
interesting trend, because the NCS was sort of a paper tiger.
Then

                     ------------------
                     
                     
                          - 11 - 
                          
the NSTAC brought in the chief executives of the increasingly 
fragmented telecommunications industry, and over the last couple 
of years people from the computer industry and the networks were 
generally brought in as well. So the solutions to this problem 
are not exactly right there, but they're working on them. 

Stenbit: There are twelve outreaches from the DHS to industrial 
groups for critical infrastructure protection. One of them is 
telecommunications. That exists in the NSTAC. It's the only one 
of the twelve that works. The other eleven-finance, food, energy, 
chemicals…pick the twelve sectors that represent the basic 
economy of the country-are pick-me-up teams that are trying to 
figure out when to have a meeting and who's who.

Oettinger: Each of them has an Information Sharing and Analysis
Center that is supposed to coordinate among the various elements
of these industries within which the competitors won't give each
other the time of day. There are many unresolved issues.

Stenbit: I'm going to stop there. I could keep going, but it's
not my job and I'm happy I'm not over there. 

     Let's chat a bit about the issue of the budget and the 
CONOPS and the n2 to n. I talked to you a bit about how twenty-
five years ago we were doing TRI-TAC [Tri-Service Tactical 
Communications Program], which was trying to superimpose a 
16-kilobit voice standard on everybody, and basically built 
these big interoperability machines that cost an awful lot of 
money. Nobody wanted them.  They didn't work very well. 
They were always late. The software didn't work. It was a 
typical government program. Ultimately, though, had there been 
a war in Europe, that's what would have been the glue that held 
everything together. 

Student: Didn't it get unglued in Desert Storm? When I started 
with the Air Force, that stuff was still around. 

Stenbit: I was going to say that we had started down the cell 
phone world by Desert Storm, but we clearly hadn't facilitated 
the whole place, so it was a mixture of the two. 

Student: Was that the STU-III [secure telephone unit]? 

Stenbit: No, STU-III is a wire-line system. It has nothing to 
do with this. STU-IIs were 2.4-kilobit systems. That was a 
different idea. Then we were in the world where AT&T had been 
broken up and you could add stuff to the net, so now what
we needed to do was produce our own fancy handset, compared to
somebody else's handset. We had some solutions that we could
use, other than the ones that were prescribed before Judge
Green. 

     In any case, I was talking about 1975, and I would assert
that, in those days, like the Athenians when they were fighting
Sparta in 1000 B.C., we in military operations were forced to be
synchronous in space and time. Let me chat about that for a
second, because I think it's a big-picture principle. We were
forced to be constrained in time because everybody had to be in
the same place at the same time in order to have a fight. Think
of World War II movies, with the Navy battleships lined up off
the coast of the invasion beach going "One, two, three, NOW!"


                    - 12 - 
                    
WHAM! All the shells go. "Okay, one, two, three, NOW!" WHAM! 
All the shells go. That is my definition of synchronization in 
time and space. 

     We were synchronized in time because we were 
in a switched telephone world that was run with erlangs(9) and 
calculations and so on -- a decidedly smart push world. Anybody 
who knew anything needed to know the total state of the universe 
in order to figure out whom to tell -- or to push it to. When 
the captain of the Pueblo was captured, if he had only known the 
phone number of the Marines in Okinawa it would have been over in 
half an hour. But what process would he ever have used to know 
the phone number of the Marines in Okinawa? I would assert to you 
that it was an impossible problem. It was made even more im-
possible by the fact that whatever radio he had would have been 
different from whatever radio the Marines had.

     That's what this n2 issue is. To have interoperability, if
there were n different devices you needed to have n2 solutions.
Each one had to have a solution. I guess it's really n times
n-1, so I'm off a bit. It's on the order of n2 . (I'm a Van
Gogh person, not a Norman Rockwell person. What's a factor of n
here and there?) We were forced to be synchronous in time,
because if somebody called you and you didn't answer, nothing
happened. We were forced to be synchronous in space, because
basically we didn't know whom to call, other than the ones who
were on the little plastic sheet we had in front of us. So while
you could be anywhere, you had to stay in the same place or else
nobody would be able to catch you. That was really what TRI-TAC
and some of these other systems were trying to fix -- to allow the
logical equivalent of telephones to move in the battlefield and
be useful. Certainly we never were able to connect aircraft,
other than in the most rudimentary of possible ways. We never
could correlate where they were with what we were saying, or
anything else. That was just impossible. 

     That has an implication, and it is that a guy named F.W. 
Lanchester, a British engineer of the late nineteenth and early
twentieth-century wrote some stuff (you probably know this
better than I do, and I fully accept that if I'm off you'll help
me) that basically said that in a military engagement, whether
it's the Athenians and the Spartans or 1900 or the mid-1970s,
the defense has an advantage over the offense of three to one.10
It worked out over time. There were deviations from that. This
assumes they were more or less equally matched folks. If the
longbow comes out after the French horsemen, and there's a
technological leap, it doesn't work, but after it balances out
again it's a three-to-one kind of problem. 

     Why does that happen?  It's easy. I don't know why it's 
three, but I certainly know why it's an advantage: because the 
defense gets to choose the place. Unless they're stupid, they 
pick one that's good. They also have the smallest internal lines 
of communication, so they can communicate better, by definition. 
The bottom line, after you've wrapped all that together, is that 
it's about three to one.

                    -------------------------

Return to the opening page



Jim Ennes and Joe Meadors

USS Liberty