-Caveat Lector-

> ** Original Subject: SNET: Essential Command System At Risk For Y2K Failure
> ** Original Sender: FoE Sydney - Nuclear Campaign <[EMAIL PROTECTED]>
> ** Original Date: Sat, 6 Nov 1999 11:17:57 +1000

> ** Original Message follows...

->  SNETNEWS  Mailing List

        Essential Command System At Risk For Y2K Failure
        Computers/Internet News • Source: Defense Week
        Published: November 1, 1999
        Author: John Donnelly
        Posted on 11/01/1999 05:37:57 PST by Stand Watch Listen

        http://www.FreeRepublic.com/forum/a381d97b516b0.htm

The computer system used by the White House and top commanders to plan and
execute major military missions has not proven ready for 2000, the
Pentagon's inspector general said in a report released Friday. With two
months until the new year, the audit raises important questions about the
military's preparedness to deal with the prospect that crucial computers
could malfunction when their internal calendars roll over to 2000.

At issue is the Joint Operational Planning and Execution System (JOPES),
used in peacetime and war to manage personnel and equipment -- including
theater-level nuclear-war plans, the new report said. JOPES is an "essential
mission application" in the Global Command and Control System – the
military's single, worldwide battle-management network.

"JOPES is the foundation of conventional command and control," the auditors
wrote. "Therefore, it is a likely target for information-warfare attacks. It
is imperative that the unified commands have complete operational
contingency plans to allay the problems triggered by a JOPES failure caused
by either Y2K-related problems or by information/warfare attacks." However,
the report said, neither the Joint Staff nor commands in Europe, the
Pacific, the Middle East and elsewhere have adequate contingency plans ready
in the event the Y2K bug disables the JOPES system. The Joint Staff agreed
and is formulating such a plan.

"Without complete operational contingency plans, the DOD ability to respond
to military crises in a timely manner was reduced and there was increased
risk that DoD will not have adequate alternative ways to quickly respond to
combatant command requests for equipment and personnel," the report said.

The Pentagon has made great strides in tackling the Y2K bug. William Curtis,
the Pentagon's principal director for the Year 2000 program, said 99 percent
of the military's mission-critical systems are compliant. Moreover, given
the new report's spotlight on the JOPES shortfalls, that system, too, will
probably be made compliant, said Robert Lieberman, the assistant inspector
general for auditing.

However, if the military's worldwide battle-manage-ment network could pass
muster while a core application is not compliant, it raises serious
questions about how meaningful the positive compliance figures are, experts
say. The inspector general's report begs the question: What else has fallen
through the cracks?

Officials at the Defense Information Systems Agency, the Pentagon's
information-technology organization, think the report exaggerates the
problem. Air Force Lt. Col. Intae Kim, the agency's chief engineer for the
global command system, in a letter included in the report, said the problems
"were well documented with work-arounds or fixes ...."

But Evelyn Klemstine, the inspector general's director of International
Programs, says having a fallback option is not the same as certifying the
system itself will work.

Klemstine also said JOPES was chosen for auditing because of its importance.
In June, her team discovered that the military's system for assessing the
readiness of its personnel -- the Status of Resources and Training System --
was also inappropriately certified as fixed. Consequently, the earlier
report found, "the services' ability to report unit resources and training
in a Y2K environment was not assured."

John Pike, a military expert with the Federation of American Scientists,
expressed concern when told JOPES was not compliant.

"JOPES is the application they use to run wars," Pike said. "It's the core
application for figuring out who's supposed to be where, when. It's the
application they use to plan everything worth speaking of," from joint
exercises to peacekeeping operations to nuclear strikes in Korea or the
Middle East.

According to the Oct. 27 inspector general report, the Defense Information
Systems Agency certified the overall global command system as compliant
without proper testing of JOPES, perhaps the system's most important single
application.

"Just because your computer works doesn't mean every application does," said
Klemstine.

"They haven't fully tested the interfaces" between JOPES and several service
systems that manage the deployment of forces, said Klemstine in an
interview. "In addition, there is COTS [commercial-off- the-shelf] software
in it that they know is not Y2K compliant ...."

What's more, she said, "Our biggest problem with JOPES and the [global
command system] is they keeping changing the configuration baseline." From
one baseline to the next, 70 elements had been changed, she said. "How can
you say it's Y2K-compliant when you have so many revisions to your
baseline?"

Curtis, the Y2K director, said in an interview that configuration management
is a major focus of the Pentagon's overall effort of late. The Joint Staff's
fallback plan included use of the secret military Internet, secure faxes and
phones.

But the plan "did not offer guidance on how to orchestrate operations" and
didn't meet the criteria required for emergency plans, the report said.

As for the regional commands, the U.S. Central Command's plan "lacked the
specific procedures to safeguard the joint operational planning function in
the event of a Y2K-related disruption." Ditto for other commands. The U.S.
Pacific Command plan "included using messengers with hand-carried
information if all else fails."

Last July, Secretary of Defense William Cohen told reporters: "There is no
question that on Jan. 1, 2000, and every day thereafter the Department of
Defense is going to be ready." But in late September, the Senate's special
Y2K committee was far more skeptical. Of the Pentagon's tardiness in fixing
mission-critical systems, the panel said: "These late scheduled completion
dates leave little to no time for schedule slippage or unforeseen events,
which for [information- technology]-related projects are common."

The Senate panel's conclusion? The Pentagon is at "considerable risk" of not
meeting the Jan. 1, 2000, deadline. Y2K boss Curtis had not seen the JOPES
report. But he gave Defense Week the latest overall figures: Fewer than 50
mission critical systems out of 2,414 still have to undergo "higher level
testing" - required exams that are more integrated and realistic than the
system-by-system kind. The goal is to finish by Dec. 15, he said. Will that
be enough time to solve problems? "The number of problems has been very
small" in tests to date, he said, and mostly testers found a fix "pretty
much on the spot."

Curtis said the Pentagon, which owns one-third of the government's computer
systems and operates 600 installations worldwide, wants to make New Year's
Day "the largest non-event in history."

Referring to JOPES, Lieberman, the assistant inspector general, said: "It's
a big system with lots of users and a lot of importance in a mobilization
scenario. Due to its importance to the warfighters, I'm quite sure
management will turn to and put some extra emphasis on making sure they do
everything that needs to be done."

More broadly, though, Lieberman does not expect all critical systems to be
adequately tested by Jan. 1. And he expects failures. The key question, he
says, is: Does the military have proper contingency plans in place to deal
with the problems in U.S. systems or, more likely, breakdowns in nations
that host allied forces? The question is open and will remain so for some
weeks, he said. But if, and only if, the military tackles the problem as
robustly as it has to date, all will be well, he said.

>CONTACT: Don Moniak 806-358-2622
>
>
>Government Report Describes Lack of Rigor,
>
>Structure in Y2K Nuclear Weapons Review
>
>
></bold>A recent Government Accounting Office (GAO) report described
>Department of Energy and Sandia National Laboratory Year 2000 (Y2K)
>computer compliance efforts for the United States' Nuclear Weapons
>Arsenal as, "<bold><italic>often unstructured, did not always include thorough
>documentation, and were subjected to minimal peer
>review</italic></bold>."(1) The
>Department of Energy (DOE) and Sandia National Laboratory, the
>responsible parties for insuring Y2K compliance in the nine weapons
>systems involving about 9,000 nuclear weapons, failed to develop and
>implement a standard procedure for Y2K compliance verification on the
>arsenal. As a result, great disparity and variability exists in how
>individual weapons systems were checked for Y2K compliance.
>
>
>Instead, individual weapon designers working for independent
>contractors determined and documented  Y2K compliance procedures.
>In the case of the W-88 Trident II warhead, the weapon designer relied
>upon his memory to insure Y2K compliance, and GAO personnel had to
>verify Y2K compliance for the software code in the weapon's
>microprocessor.
>
>
>In spite of the lack of documentation to justify credible assurances, the
>GAO did report that they "believe" nuclear weapons will not be affected
>by Year 2000 problems.  Only four of the weapons systems contain
>microprocessors, none of which store or generate dates nor rely upon
>dates to function properly.  However, as of August 20, 1999, two types
>of weapons testing equipment were found to be Y2K noncompliant--one
>at the Pantex Plant northeast of Amarillo, Texas and one at the Kansas
>City Plant in Missouri.  Pantex has claimed that all of its systems are Y2K
>compliant.
>
>
>"A single employee being allowed to rely upon his memory to confirm
>Y2K compliance for a weapon with 20 times the power of the Hiroshima
>and Nagasaki bombs indicates some deep-seated problems at the Labs.
>This is just the latest evidence that in the absence of external oversight,
>the Department of Energy and its Nuclear Weapons Labs still cannot be
>trusted to act in the public interest ," said Don Moniak of Serious Texans
>Against Nuclear Dumping.
>
>
>(1) <smaller> <bigger>Government Accounting Office. <italic>Y2K Status of
>the Nation's Nuclear
>Weapons</italic>.  GAO-RCED-99-272R.,  August 20, 1999.
>
>
>This particular report has to be directly ordered from GAO. It is not on
>their web site. If you would like a copy, it is only 8 pages and I can FAX
>it, but if there is no hurry for it, please try to order it from GAO. Got to
>http://www.gao.gov for ordering information.
>







-> Send "subscribe   snetnews " to [EMAIL PROTECTED]
->  Posted by: FoE Sydney - Nuclear Campaign <[EMAIL PROTECTED]>


>** --------- End Original Message ----------- **

>

DECLARATION & DISCLAIMER
==========
CTRL is a discussion and informational exchange list. Proselyzting propagandic
screeds are not allowed. Substance—not soapboxing!  These are sordid matters
and 'conspiracy theory', with its many half-truths, misdirections and outright
frauds is used politically  by different groups with major and minor effects
spread throughout the spectrum of time and thought. That being said, CTRL
gives no endorsement to the validity of posts, and always suggests to readers;
be wary of what you read. CTRL gives no credeence to Holocaust denial and
nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://home.ease.lsoft.com/archives/CTRL.html

http:[EMAIL PROTECTED]/
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to