The Co-Intelligence Institute // CII home // Y2K home


What are we doing with nuclear weapons in the Year 2000?




JUNE 8, 1998

U.S. to share Y2K nuclear data

BY BOB BREWIN (antenna@fcw.com) AND HEATHER HARRELD (heather@fcw.com)
Federal Computer Week [http://www.fcw.com/pubs/fcw/1998/0608/fcw-frontnuke-6-8-1998.html]

The Pentagon plans to share data with the world's other nuclear powers to ensure that the Year 2000 millennium bug does not lead to an accidental nuclear exchange.

John Hamre, Deputy Secretary of Defense, last week told the Senate Armed Services Committee that while the Pentagon does not believe the Year 2000 problem will cause an accidental nuclear exchange, the department intends to mitigate the risk with operational procedures that call for sharing data about nuclear early-warning systems and missile warnings"information zealously guarded during the Cold War"with Russia and other nuclear nations.

Concerns such as this, Hamre added, have elevated the Year 2000 from an information technology issue to "a national security issue." Hamre said the Pentagon plans to set up a formal, cooperative Year 2000 program with other nuclear nations to ensure "that the screens don't go blank" in the world's nuclear command and control centers because of bad Year 2000 date code. Hamre said the U.S. Strategic Command (Stratcom), which controls the U.S. nuclear triad of manned bombers, intercontinental ballistic missiles and submarine-based missiles from its headquarters at Offutt Air Force Base, Neb., has already held "technical discussions" with its counterparts in Russia.

Stratcom officials could not comment before press time. However, Brig. Gen. Robert Behler, Stratcom's director of command, control, communications and computer systems, in May told intercom, an Air Force Communications Agency publication, that the command would carry out an end-to-end systems test during a 1999 exercise to check the Year 2000 conversion work. "The [Year 2000] problem is serious because it could disrupt system operations required for nuclear planning or create erroneous data used to make command and control decisions," Behler said.

Air Force Lt. Gen. Kenneth Minihan, director of the National Security Agency, a super-secret eavesdropping agency also charged with computer security, told the Senate hearing that the United States is concerned that military leaders of other nations have not yet grasped the potential implications of perilous date code problems in their systems. "Countries that represent threats" in the nuclear arena "have only emerging awareness of [the Year 2000 problem]," Minihan said. "Their academics are aware...but it has not yet made it into their military.... Our concern is that Russia and China have only a rudimentary understanding" of the impact that the Year 2000 could have on their nuclear command and control systems.

Paul Strassmann, who was the Pentagon's director of Defense information in the Bush administration, said the true extent of the Year 2000 problem for governments around the world is "deeply, deeply buried in a mess of code that nobody understands." He said the key to a successful intergovernmental agreement will be the ability to move beyond diplomacy and study the computer code used in critical systems. That may prove challenging in Russia because old Soviet computer code was traditionally "handmade," which will further complicate the process, Strassmann said.

Also testifying before the committee, Sen. Robert Bennett (R-Utah) sounded a sharp warning that the Year 2000 problem also could impact the operation of a variety of computer systems used to control the civilian and military infrastructure worldwide. Bennett warned of power disruptions in transportation systems due to Year 2000 glitches in the computer systems that control most of the world's infrastructure. Bennett said the United States faces power "brownouts and blackouts" at the turn of the century. He quickly added, "I believe the U.S. power grid will survive [the Year 2000].... But I cannot make the same claim about other countries."

Hamre testified that he is concerned that computer hackers, who already have made many incursions into military and civilian computer systems, will try to leverage the potential confusion caused by the Year 2000 problem. "Hackers will take advantage of Y2K," Hamre said.


Mail questions to webmaster@fcw.com
Copyright 1998 FCW Government Technology Group

____


1) What is the nature of the security we achieve by having the capacity to destroy all life on earth many times over, when that capacity is governed by technologies over which we do not have absolute control?

2) What assumptions about who we are and our role in the world (as humans, as Americans, as organisms, as spirits) need to be questioned -- and which need to be reinforced -- if we are to survive through the next century?

3) Where does such technology come from? Should we handle technological development differently?

4) What would be different if we based our security on cooperation, openness and the pursuit of positive possibilities for all, rather than competition, secrecy, protection and fear? What would that look like? What might we do to move in that direction -- using cooperation, openness and the pursuit of positive possibilities for all?

5) What is it about our society that helps us forget about the power of nuclear weapons until something like this comes along? Is this good? bad? Is there something important to learn here?

6) What else do we need to explore about this?

7) What will happen to us if we do not take the time and care to explore these questions together and change our direction?