Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Perspectives on defense systems analysis : the what, the why, and the who, but mostly the how of broad defense systems analysis
Delaney W., The MIT Press, Cambridge, MA, 2015. 288 pp. Type: Book (978-0-262029-35-3)
Date Reviewed: May 23 2016

This book describes the evolution and history of the processes of systems analysis for defense systems, and in this I am somewhat disagreeing with the book’s subtitle. “The how,” if it can be called such, sort of begins only on page 93. Anyone wishing to understand the evolution of the discipline will do well with this book, though I have some minor reservations concerning non-American readers; the processes described (and some amount of slang terms used) may make it slightly less applicable outside the US. Someone wishing to use this book to really learn about defense systems analysis may, I think, have certain difficulties here.

A good case in point is the description of the Patriot missile system, described in Section 5.8, on pages 64 through 68. Our author here, Stein, said previously (page 59), “keep one’s eye on the forest when dealing with details in the trees.” A very apropos issue, I think. But I also think the operative word for this book is “defense.” At the end of any such process of “defense systems analysis,” one must ask whether lives have been saved. Stein describes the process of upgrading the Patriot missile system to deal with Scud missiles, from 1979, finally culminating in the PAC-II upgrade, just prior to the First Gulf War in 1991. Twelve years of effort. Unfortunately, Stein does not provide the end of this useful and interesting story. What was the result of this 12-year upgrade process? That, after all, must be the final test. Did the system function as planned? Did it save lives?

Helmuth von Moltke the Elder, Germany’s military leader in WW I, said that “no plan of operations extends with any certainty beyond the first contact with the main hostile force.” I opine that a similar statement is applicable to weapons systems, whether defensive or offensive.

In the Gulf War, the Patriot system was installed in Israel and in Saudi Arabia. (By the way, the system was “sold” to the Israelis as an antiaircraft system that had been specially modified for anti-missile, which Stein disagrees with.) During the War, 39 Scud missiles were fired at Israel. The Patriot system intercepted exactly zero incoming Scuds. In one case, there was estimated to be a ten percent chance that a missile’s course was affected by the Patriot. Falling Patriot missiles caused more economic damage than Scuds. (I was a senior defense systems analyst at the time, specializing in quality and reliability.)

The system was a total failure, bordering on disaster. After 12 years of development to upgrade an existing system, this is rather beyond disappointment. Bottom line message: in defense systems analysis, if you do not receive real data from the actual war situation, you still know nothing conclusive about your system. That is a lesson that this book unfortunately neglects to discuss. “War stories” must come from war.

The book describes the concepts of “red teaming” and “blue teaming,” which may be useful in some circumstances, though again, they may need to be “acculturated” to non-US environments.

What I think may be the most valuable statement in book occurs at the bottom of page 103. “The problem is that systems analysis involves more than merely manipulating variables and inverting matrices; it involves thinking.” Pardon my bluntness, but the statement sounds “obvious,” and it is not. If the book were otherwise of no value, and I think it is of great value, the book would be worth reading to imbibe this statement to its very dregs.

The section ends on another priceless quote: “Compared to finding a good systems engineer, it’s comparatively easy to build a factory, an insight I’m not sure was so widely shared 20 years ago as it is today.”

As to the question raised above concerning “the how,” I would place this chapter, chapter 8, at the head of my list of what this book can teach; perhaps a touch late, but that is the reason that I would define it more as a depiction of “the history and evolution of” rather than a textbook from which to study to become an analyst.

I believe I have the privilege to say that I recommend this book, albeit with the minor reservation that I have discussed. It is relatively well written and it is eminently readable. All in all, I liked it and think it is a useful addition to a professional library.

Reviewer:  Mordechai Ben-Menachem Review #: CR144434 (1608-0573)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Military (J.7 ... )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Military": Date
Inventing accuracy
MacKenzie D., MIT Press, Cambridge, MA, 1990. Type: Book (9780262132589)
Sep 1 1991
Computers in battle: will they work?
Bellin D. (ed), Chapman G. (ed), Harcourt Brace &’ Co., Orlando, FL, 1987. Type: Book (9780151212323)
Sep 1 1988
Designing secure message systems: the military message systems (MMS) project
Heitmeyer C., Landwehr C. (ed)  Computer-based message services (, Nottingham, UK,2571984. Type: Proceedings
Nov 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy