Pentagon's Electronic Warfare Strategy Incomplete, GAO Says

Government Accountability Office report finds DOD has not established clear lines of responsibility in electronic warfare and cyberspace operations.

Patience Wait, Contributor

July 10, 2012

3 Min Read
Dark Reading logo in a gray background | Dark Reading

Defense Tech: 20 War-Fighting Innovations

Military Transformers: 20 Innovative Defense Technologies


Military Transformers: 20 Innovative Defense Technologies (click image for larger view and for slideshow)

The Department of Defense's readiness for electronic warfare still needs improvement, according to a new report from the Government Accountability Office.

Citing an "increasing quality and availability of electronic warfare capabilities" by other governments and "non-state actors," the GAO recommended a series of steps to be taken by the Pentagon, including more clearly defining roles and responsibilities for electronic warfare management.

The GAO defines electronic warfare as "any military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or to attack the enemy." The electromagnetic spectrum includes radio, microwave, infrared, visible, ultraviolet, X-rays, and gamma rays. The DOD has invested billions of dollars in weapons and communications systems that rely on access to the electromagnetic spectrum.

[ Read about the DOD's mobile device strategy. See Pentagon Outlines Mobile Device Plan. ]

The GAO report follows the November 2011 release of DOD's annual report to Congress on its electronic warfare strategy. Last December, the DOD made the Joint Electromagnetic Spectrum Control Center (JEMSCC), which operates under the umbrella of U.S. Strategic Command, its focal point for electronic warfare operations. But GAO determined that there is no comprehensive implementation plan to define the center's objectives and major tasks.

"DOD has taken some steps to address a critical leadership gap identified in 2009, but it has not established a department-wide governance framework for planning, directing, and controlling electronic warfare activities," said the GAO.

The Air Force, Army, Marines, and Navy each acquire their own airborne electronic attack systems, and GAO observed that opportunities may exist to consolidate some of those acquisition efforts. "With the prospect of slowly-growing or flat defense budgets for years to come, the department must get better returns on its weapon system investments and find ways to deliver more capability to the warfighter for less than it has in the past," the report said.

GAO called attention to the relationship between electronic warfare and cyberspace operations, including the use of cyberspace capabilities to achieve military objectives, such as attacking or exploiting enemy computer networks. Because cyberspace capabilities require ways to communicate with networks, they must be able to make use of the electromagnetic spectrum. "Electronic warfare and cyberspace operations are complementary and have potentially synergistic effects," the report stated.

GAO made recommendations for improving DOD's management of electronic warfare operations and capabilities. They include directing the Under Secretary for Acquisition, Technology, and Logistics (AT&L) and other officials to publish performance measures to help guide strategy implementation, to identify required resources, and to articulate the roles and responsibilities of the people involved. The GAO also recommended that the objectives and major tasks of the JEMSCC be better-defined.

The Office of Management and Budget demands that federal agencies tap into a more efficient IT delivery model. The new Shared Services Mandate issue of InformationWeek Government explains how they're doing it. Also in this issue: Uncle Sam should develop an IT savings dashboard that shows the returns on its multibillion-dollar IT investment. (Free registration required.)

About the Author

Patience Wait

Contributor

Washington-based Patience Wait contributes articles about government IT to InformationWeek.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights