SlideShare una empresa de Scribd logo
1 de 28
Cyber-Command or IO 21
      Planned Words in Notes Format
What is the IO “Threat?”
Collaboration Replaces Control
What Is Integrity?
Strategic Integrity Done Wrong
Strategic Integrity Done Right
            Integrity Emergent: Chairman of the Joint Chiefs

            Phi Beta Iota Public Intelligence Blog 31 March 2011

            Captain Porter explained that US policy could benefit
            from adhering to a coherent strategic context. He was
            concerned that our leaders increasingly are becoming
            captive to temporal urgency without being able to
            consider a wider strategic perspective. We need to
            appreciate the interconnectedness and complexity of our
            strategic environment – better described as a strategic
            ecology. He said that this argues for a whole-of-nation,
            functional approach to development, diplomacy and
            defense, versus simply treating these as organizational
            stovepipes. He pointed out that such a functional
            approach has now been recognized in the National
            Security Strategy, the Quadrennial Defense Review, and
            the Quadrennial Diplomacy and Development Review.

            Reference: National Strategic Narrative

            Reference: Frog 6 Guidance 2010-2020
Army IO is Fraction of a Fraction
Human Minds Are IO Center of Gravity
Abandon the IO Legacy Mind-Set
What Should We Do?
  Open Tri-Fecta (1, 2, 3) + Education + Mind-Set (Culture)
Current Cyber-Command Proposed Cyber-Command
TIRED, Expensive, Wasted WIRED, Empowers, Leverages
Electronic Warfare          1 Open Spectrum &
                            2 Free/Open Source Software (F/OSS)
Computer Network            Data Security from Hand to Cloud +
Operations                  Time-Based Risk + Trusted Humans
Psychological Operations    3 Open Source Intelligence (OSINT)
                            i.e. Public/Global Intelligence
Military Deception          Whole of Government/Smart Nation/
                            Multinational Decision-Support
Operations Security         Education in All Possible Forms
                            Change the Mind-Set & Culture
Communications Matures
Rest of World Matures
Open Everything Especially the Open Tri-Fecta
Autonomous Internet 101
      C4I is DEAD—M4IS2 AutoNet are New Memes




Freedom Box .. Solar-Powered Internet
Mesh Networks .. Mass Steganography
Crowd-Sourced Satellite Service (Free)
Autonomous Internet 102
We the People Self-Governing Panarchy
Intelligence Matures
Brains, Not Bytes, Are Heart of IO
IO Cube
Four Forces After Next With IO
Connecting the IO Dots
Ten Trends in Education (IO)
1   Web-Searching
2   Blending Learning
3   Free/Open Source Software
4   Open CourseWare
5   Learning Portals
6   Learners as Teachers
7   Electronic Collaboration
8   Alternative Reality including Serious Games
9   Mobile Real-Time Learning
0   Networks of Personalized Learning
Key IO Topics
Authorities. Modify every single policy, acquisition, & operations authority.
Organizations. Cyber (9) in every organizations—create the distributed Army
brain.
Signal Management. Open Spectrum now, data security not network security.
Enterprise Services. Simple cell phones, OnStar, regional call & data centers.
Operationalize Cyber. Every Army body is a thinker first, a shooter second.
Execute Full Spectrum Cyber. Civil Affairs rules now, put the best & brightest
there.
Global Command & Control. Multinational, shared information as harmonizer
Agile Cyber Proponency. Everyone on Earth has an IP address. Leverage that.
21st Century Cyber-Warrior. May the crowd be with you—leading minds.
Requirements & Resources. Done right this impacts on every Army element.
Cyber-Command in Three Words: Education, Intelligence, Research.
This is Your IO Reality
Future of IO Part I
All Information, All Languages, All the Time
Future of IO Part II
 Creating a Smart Nation
Cyber-IO: The Global Context

 “ Secret intelligence is ten percent
 of all-source intelligence, and all-
 source intelligence is ten percent of
 Information Operations.”
            Renier Cruz, GS-15 (Should be DISL/SES)
        US Special Operations Command J-2 Pit Boss
Iraq Case Study                         Japan Case Study
Strategic Lessons                       Strategic Lessons
• Secret intelligence manipulated       • Long-term total cost matters
• Secret intelligence ignored           • Climate change a vital context
• Secret intelligence inadequate        • Precautionary principle not present
• Obsessions block global coverage      • Intelligence assessment not done
• No coherent iO strategy/message       • Integrity lacking in private sector
• Lack of policy integrity hurt bad     • Integrity lacking in public sector

Operational Net Assessment              Operational Net Assessment
B Kick-Off OOB                          A One guy—one—got it and warned
C Battle damage                         F Blown off by his corporation
D Congressional debate                  F Blown off by the government
D WMD actual status                     F No learning at all since 1952
F Covert Operations Options             F No calculation of consequences
F Global IO Images                      F No provision for Chernobyl need
F Post-War Insurgency Intelligence      F Misrepresentation to public
F Reconstruction Intelligence           F Cost to be borne by public

Bottom Line: Intelligence irrelevant,   Bottom Line: IO 21 demands 360
Information Operations non-existent     view, long view, deep true cost study
May the
Crowd
Be With
You…


The truth at any
cost lowers all
other costs.

Más contenido relacionado

La actualidad más candente

The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018Pukhraj Singh
 
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)Pukhraj Singh
 
Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operationsClifford Stone
 
Information Warfare
Information WarfareInformation Warfare
Information Warfaredibyendupaul
 
Fail To Plan
Fail To PlanFail To Plan
Fail To Planbfuesz
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligenceDoing What I Do
 
Information Operations: What It Is and Why It Matters
Information Operations:  What It Is and Why It MattersInformation Operations:  What It Is and Why It Matters
Information Operations: What It Is and Why It MattersJeffrey Malone
 
Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...Jeffrey Malone
 

La actualidad más candente (11)

The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
 
2009 perhaps we should have shouted
2009 perhaps we should have shouted2009 perhaps we should have shouted
2009 perhaps we should have shouted
 
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
BSides Delhi-2018 Keynote by Pukhraj Singh (Politics & Power in Cybersecurity)
 
Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operations
 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
 
Fail To Plan
Fail To PlanFail To Plan
Fail To Plan
 
402 chapter 7 counterintelligence
402 chapter 7 counterintelligence402 chapter 7 counterintelligence
402 chapter 7 counterintelligence
 
Information Operations: What It Is and Why It Matters
Information Operations:  What It Is and Why It MattersInformation Operations:  What It Is and Why It Matters
Information Operations: What It Is and Why It Matters
 
Sneaksend
SneaksendSneaksend
Sneaksend
 
Sovereignty in Cyberspace
Sovereignty in CyberspaceSovereignty in Cyberspace
Sovereignty in Cyberspace
 
Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...Equity Dilemmas for Psychological Operations and Public Information in Milita...
Equity Dilemmas for Psychological Operations and Public Information in Milita...
 

Similar a Army global io 28 slides 3.2 (2011)

Intelligence Collection and Analysis
Intelligence Collection and AnalysisIntelligence Collection and Analysis
Intelligence Collection and Analysisatrantham
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_masterbodaceacat
 
NetHope Chairman Report -- 2012 NetHope Global Member Summit
NetHope Chairman Report -- 2012 NetHope Global Member SummitNetHope Chairman Report -- 2012 NetHope Global Member Summit
NetHope Chairman Report -- 2012 NetHope Global Member SummitNetHopeOrg
 
MASINT and Global War on Terror
MASINT and Global War on TerrorMASINT and Global War on Terror
MASINT and Global War on TerrorTpeisi Nesby
 
Analyzing Intelligence
Analyzing IntelligenceAnalyzing Intelligence
Analyzing Intelligencehfrancob
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationHinne Hettema
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Quinnipiac University
 
2013 steele reflections on inspectors general 1.7
2013 steele reflections on inspectors general 1.72013 steele reflections on inspectors general 1.7
2013 steele reflections on inspectors general 1.7Robert David Steele Vivas
 
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South AfricaPukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South AfricaPukhraj Singh
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Jim Geovedi
 
Steele the craft of intelligence 3.4 pdf
Steele the craft of intelligence 3.4 pdfSteele the craft of intelligence 3.4 pdf
Steele the craft of intelligence 3.4 pdfRobertDavidSteeleVivas
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
Spain work tech 2050 scenarios and national workshops
Spain work tech 2050 scenarios and national workshopsSpain work tech 2050 scenarios and national workshops
Spain work tech 2050 scenarios and national workshopsJerome Glenn
 
2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_secSara-Jayne Terp
 

Similar a Army global io 28 slides 3.2 (2011) (20)

2013 workshop-on-intelligence
2013 workshop-on-intelligence2013 workshop-on-intelligence
2013 workshop-on-intelligence
 
2009 do d osint staff briefing
2009 do d osint staff briefing2009 do d osint staff briefing
2009 do d osint staff briefing
 
Intelligence Collection and Analysis
Intelligence Collection and AnalysisIntelligence Collection and Analysis
Intelligence Collection and Analysis
 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master
 
2004 information peacekeeping-1.1-1
2004 information peacekeeping-1.1-12004 information peacekeeping-1.1-1
2004 information peacekeeping-1.1-1
 
2009 perhaps we should have shouted
2009 perhaps we should have shouted2009 perhaps we should have shouted
2009 perhaps we should have shouted
 
NetHope Chairman Report -- 2012 NetHope Global Member Summit
NetHope Chairman Report -- 2012 NetHope Global Member SummitNetHope Chairman Report -- 2012 NetHope Global Member Summit
NetHope Chairman Report -- 2012 NetHope Global Member Summit
 
MASINT and Global War on Terror
MASINT and Global War on TerrorMASINT and Global War on Terror
MASINT and Global War on Terror
 
Final Thesis_Bessinger
Final Thesis_BessingerFinal Thesis_Bessinger
Final Thesis_Bessinger
 
2006 failure of 20th century intelligence
2006 failure of 20th century intelligence2006 failure of 20th century intelligence
2006 failure of 20th century intelligence
 
Analyzing Intelligence
Analyzing IntelligenceAnalyzing Intelligence
Analyzing Intelligence
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...Research in Information Security and Information Warfare- The economics, warf...
Research in Information Security and Information Warfare- The economics, warf...
 
2013 steele reflections on inspectors general 1.7
2013 steele reflections on inspectors general 1.72013 steele reflections on inspectors general 1.7
2013 steele reflections on inspectors general 1.7
 
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South AfricaPukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
Pukhraj Singh - Keynote - ITWeb Security Summit-2019, Johannesburg, South Africa
 
Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?Is Cyber-offence the New Cyber-defence?
Is Cyber-offence the New Cyber-defence?
 
Steele the craft of intelligence 3.4 pdf
Steele the craft of intelligence 3.4 pdfSteele the craft of intelligence 3.4 pdf
Steele the craft of intelligence 3.4 pdf
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Spain work tech 2050 scenarios and national workshops
Spain work tech 2050 scenarios and national workshopsSpain work tech 2050 scenarios and national workshops
Spain work tech 2050 scenarios and national workshops
 
2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec
 

Más de Robert David Steele Vivas

2013 five r-brief-school-world-brain-ose-2.3 r
2013 five r-brief-school-world-brain-ose-2.3 r2013 five r-brief-school-world-brain-ose-2.3 r
2013 five r-brief-school-world-brain-ose-2.3 rRobert David Steele Vivas
 
2012 steele 1.3-two-party-tyranny-battle-for-the-soul-of-the-republic
2012 steele 1.3-two-party-tyranny-battle-for-the-soul-of-the-republic2012 steele 1.3-two-party-tyranny-battle-for-the-soul-of-the-republic
2012 steele 1.3-two-party-tyranny-battle-for-the-soul-of-the-republicRobert David Steele Vivas
 
2012 gwu osa-36-slides-1.4-general-briefing-words-in-notes-format
2012 gwu osa-36-slides-1.4-general-briefing-words-in-notes-format2012 gwu osa-36-slides-1.4-general-briefing-words-in-notes-format
2012 gwu osa-36-slides-1.4-general-briefing-words-in-notes-formatRobert David Steele Vivas
 
2012 gwu osa-10-slides-1.6-leadership-briefing-words-in-notes-format1
2012 gwu osa-10-slides-1.6-leadership-briefing-words-in-notes-format12012 gwu osa-10-slides-1.6-leadership-briefing-words-in-notes-format1
2012 gwu osa-10-slides-1.6-leadership-briefing-words-in-notes-format1Robert David Steele Vivas
 
2010 state of global intelligence at hackers
2010 state of global intelligence at hackers2010 state of global intelligence at hackers
2010 state of global intelligence at hackersRobert David Steele Vivas
 
2009 ubc-the-ultimate-hack-slides-2.0-final-with-notes
2009 ubc-the-ultimate-hack-slides-2.0-final-with-notes2009 ubc-the-ultimate-hack-slides-2.0-final-with-notes
2009 ubc-the-ultimate-hack-slides-2.0-final-with-notesRobert David Steele Vivas
 
2009 real time information national press club
2009 real time information national press club2009 real time information national press club
2009 real time information national press clubRobert David Steele Vivas
 
2008 information sharing orientation dia international fellows
2008 information sharing orientation dia international fellows2008 information sharing orientation dia international fellows
2008 information sharing orientation dia international fellowsRobert David Steele Vivas
 

Más de Robert David Steele Vivas (20)

2014 steele @-yale1
2014 steele @-yale12014 steele @-yale1
2014 steele @-yale1
 
2014 steele @-tarleton-modern-conflict-1.6
2014 steele @-tarleton-modern-conflict-1.62014 steele @-tarleton-modern-conflict-1.6
2014 steele @-tarleton-modern-conflict-1.6
 
2013 overview-on-intelligence
2013 overview-on-intelligence2013 overview-on-intelligence
2013 overview-on-intelligence
 
2013 oas healing americas-1.7
2013 oas healing americas-1.72013 oas healing americas-1.7
2013 oas healing americas-1.7
 
2013 five r-brief-school-world-brain-ose-2.3 r
2013 five r-brief-school-world-brain-ose-2.3 r2013 five r-brief-school-world-brain-ose-2.3 r
2013 five r-brief-school-world-brain-ose-2.3 r
 
2012 steele at-was-on-reflexivity-1-mb
2012 steele at-was-on-reflexivity-1-mb2012 steele at-was-on-reflexivity-1-mb
2012 steele at-was-on-reflexivity-1-mb
 
2012 steele 1.3-two-party-tyranny-battle-for-the-soul-of-the-republic
2012 steele 1.3-two-party-tyranny-battle-for-the-soul-of-the-republic2012 steele 1.3-two-party-tyranny-battle-for-the-soul-of-the-republic
2012 steele 1.3-two-party-tyranny-battle-for-the-soul-of-the-republic
 
2012 gwu osa-36-slides-1.4-general-briefing-words-in-notes-format
2012 gwu osa-36-slides-1.4-general-briefing-words-in-notes-format2012 gwu osa-36-slides-1.4-general-briefing-words-in-notes-format
2012 gwu osa-36-slides-1.4-general-briefing-words-in-notes-format
 
2012 gwu osa-10-slides-1.6-leadership-briefing-words-in-notes-format1
2012 gwu osa-10-slides-1.6-leadership-briefing-words-in-notes-format12012 gwu osa-10-slides-1.6-leadership-briefing-words-in-notes-format1
2012 gwu osa-10-slides-1.6-leadership-briefing-words-in-notes-format1
 
2011 gmu global strategies simple briefing
2011 gmu global strategies simple briefing2011 gmu global strategies simple briefing
2011 gmu global strategies simple briefing
 
2010 state of global intelligence at hackers
2010 state of global intelligence at hackers2010 state of global intelligence at hackers
2010 state of global intelligence at hackers
 
2009 ubc-the-ultimate-hack-slides-2.0-final-with-notes
2009 ubc-the-ultimate-hack-slides-2.0-final-with-notes2009 ubc-the-ultimate-hack-slides-2.0-final-with-notes
2009 ubc-the-ultimate-hack-slides-2.0-final-with-notes
 
2009 unicef open everything nyc
2009 unicef open everything nyc2009 unicef open everything nyc
2009 unicef open everything nyc
 
2009 steele peace from above 3.3 pptx
2009 steele peace from above 3.3 pptx2009 steele peace from above 3.3 pptx
2009 steele peace from above 3.3 pptx
 
2009 real time information national press club
2009 real time information national press club2009 real time information national press club
2009 real time information national press club
 
2009 do d osint leadership briefing
2009 do d osint leadership briefing2009 do d osint leadership briefing
2009 do d osint leadership briefing
 
2008 spy improv at hackers on planet earth
2008 spy improv at hackers on planet earth2008 spy improv at hackers on planet earth
2008 spy improv at hackers on planet earth
 
2008 information sharing orientation dia international fellows
2008 information sharing orientation dia international fellows2008 information sharing orientation dia international fellows
2008 information sharing orientation dia international fellows
 
2008 earth intelligence network at hope
2008 earth intelligence network at hope2008 earth intelligence network at hope
2008 earth intelligence network at hope
 
2007 un dss class before one briefing
2007 un dss class before one briefing2007 un dss class before one briefing
2007 un dss class before one briefing
 

Último

Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 

Último (20)

Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 

Army global io 28 slides 3.2 (2011)

  • 1. Cyber-Command or IO 21 Planned Words in Notes Format
  • 2. What is the IO “Threat?”
  • 5.
  • 7. Strategic Integrity Done Right Integrity Emergent: Chairman of the Joint Chiefs Phi Beta Iota Public Intelligence Blog 31 March 2011 Captain Porter explained that US policy could benefit from adhering to a coherent strategic context. He was concerned that our leaders increasingly are becoming captive to temporal urgency without being able to consider a wider strategic perspective. We need to appreciate the interconnectedness and complexity of our strategic environment – better described as a strategic ecology. He said that this argues for a whole-of-nation, functional approach to development, diplomacy and defense, versus simply treating these as organizational stovepipes. He pointed out that such a functional approach has now been recognized in the National Security Strategy, the Quadrennial Defense Review, and the Quadrennial Diplomacy and Development Review. Reference: National Strategic Narrative Reference: Frog 6 Guidance 2010-2020
  • 8. Army IO is Fraction of a Fraction
  • 9. Human Minds Are IO Center of Gravity
  • 10. Abandon the IO Legacy Mind-Set
  • 11. What Should We Do? Open Tri-Fecta (1, 2, 3) + Education + Mind-Set (Culture) Current Cyber-Command Proposed Cyber-Command TIRED, Expensive, Wasted WIRED, Empowers, Leverages Electronic Warfare 1 Open Spectrum & 2 Free/Open Source Software (F/OSS) Computer Network Data Security from Hand to Cloud + Operations Time-Based Risk + Trusted Humans Psychological Operations 3 Open Source Intelligence (OSINT) i.e. Public/Global Intelligence Military Deception Whole of Government/Smart Nation/ Multinational Decision-Support Operations Security Education in All Possible Forms Change the Mind-Set & Culture
  • 13. Rest of World Matures Open Everything Especially the Open Tri-Fecta
  • 14. Autonomous Internet 101 C4I is DEAD—M4IS2 AutoNet are New Memes Freedom Box .. Solar-Powered Internet Mesh Networks .. Mass Steganography Crowd-Sourced Satellite Service (Free)
  • 15. Autonomous Internet 102 We the People Self-Governing Panarchy
  • 17. Brains, Not Bytes, Are Heart of IO
  • 19. Four Forces After Next With IO
  • 21. Ten Trends in Education (IO) 1 Web-Searching 2 Blending Learning 3 Free/Open Source Software 4 Open CourseWare 5 Learning Portals 6 Learners as Teachers 7 Electronic Collaboration 8 Alternative Reality including Serious Games 9 Mobile Real-Time Learning 0 Networks of Personalized Learning
  • 22. Key IO Topics Authorities. Modify every single policy, acquisition, & operations authority. Organizations. Cyber (9) in every organizations—create the distributed Army brain. Signal Management. Open Spectrum now, data security not network security. Enterprise Services. Simple cell phones, OnStar, regional call & data centers. Operationalize Cyber. Every Army body is a thinker first, a shooter second. Execute Full Spectrum Cyber. Civil Affairs rules now, put the best & brightest there. Global Command & Control. Multinational, shared information as harmonizer Agile Cyber Proponency. Everyone on Earth has an IP address. Leverage that. 21st Century Cyber-Warrior. May the crowd be with you—leading minds. Requirements & Resources. Done right this impacts on every Army element. Cyber-Command in Three Words: Education, Intelligence, Research.
  • 23. This is Your IO Reality
  • 24. Future of IO Part I All Information, All Languages, All the Time
  • 25. Future of IO Part II Creating a Smart Nation
  • 26. Cyber-IO: The Global Context “ Secret intelligence is ten percent of all-source intelligence, and all- source intelligence is ten percent of Information Operations.” Renier Cruz, GS-15 (Should be DISL/SES) US Special Operations Command J-2 Pit Boss
  • 27. Iraq Case Study Japan Case Study Strategic Lessons Strategic Lessons • Secret intelligence manipulated • Long-term total cost matters • Secret intelligence ignored • Climate change a vital context • Secret intelligence inadequate • Precautionary principle not present • Obsessions block global coverage • Intelligence assessment not done • No coherent iO strategy/message • Integrity lacking in private sector • Lack of policy integrity hurt bad • Integrity lacking in public sector Operational Net Assessment Operational Net Assessment B Kick-Off OOB A One guy—one—got it and warned C Battle damage F Blown off by his corporation D Congressional debate F Blown off by the government D WMD actual status F No learning at all since 1952 F Covert Operations Options F No calculation of consequences F Global IO Images F No provision for Chernobyl need F Post-War Insurgency Intelligence F Misrepresentation to public F Reconstruction Intelligence F Cost to be borne by public Bottom Line: Intelligence irrelevant, Bottom Line: IO 21 demands 360 Information Operations non-existent view, long view, deep true cost study
  • 28. May the Crowd Be With You… The truth at any cost lowers all other costs.

Notas del editor

  1. Let me begin by observing that last night’s gathering was hugely helpful to me. I came here with a particularly negative view of PSYOP, and that has been fixed. The “do not surrender” success story was for me especially impressive. Still, I am sure that there is much more that IO can do and that needs to be done. I hope this briefing is provocative, and that it reaches those most in a position to craft the future of the US Army.
  2. This has not changed much since the 1990’s, and in fact has gotten worse as our processes have atrophied. Not only does the acquisition community make a lot of mistakes, today it’s starting point is so far removed from reality that every system in our inventory—down to the infantry pop-guns that are ineffective beyond 300 meters—is a de facto failure. We continue to be our own worse enemy.
  3. Command & Control is dead. Transparency, truth, and trust are ascendant. INTEGRITY is the word of the century. Only consensus rooted in legitimacy is sustainable and therefore affordable.
  4. Integrity is about wholeness of view, completeness of effort, and accuracy or reliability. In other words, a lie lacks integrity. Falsified reporting and misinformation lack integrity. Integrity is a natural attribute of large groups and emerges from self-organizing over time. Public access to the truth is a multiplier.
  5. This is the strategy that I have devised for cyber-IO. It begins with accepting reality, sharing information openly, coming together across all boundaries to focus on the long-term. Faith matters—accountability matters. Ultimately Gandhi had it right, not just because he sought the truth, but because he changed the game . The truth at any cost reduces all other costs. That is practical ethics in being.
  6. Cyber-IO is a national state of mind and a national state of being. No amount of operational or tactical excellence, sacrifice, or expenditure can overcome strategic decrepitude. If the national leadership cannot control itself, and our morons, we should expect the enemy to leverage our ethical failures. This past week-end a UN contingent was overrun and killed by unarmed normal Afghans, not the Taliban. Koran burning was the enemy IO tool. We handed it to them.
  7. As you all know, I consider most of our so-called “leaders” to be lacking in integrity—analytic coherence, consistency, and credibility. They have sold us out in favor of their own careers, confusing loyalty to the chain of command with loyalty to the Constitution, focusing on budget share instead of outcomes beneficial to the public. Capt Wayne Porter is in my view a signal—one of several I have seen—that Admiral Mike Mullen is trying to achieve an ethical break-out, even as he prepares to retire.
  8. US secret intelligence has wasted one trillion dollars in the last 20 years because it has refused to accept the fact that 96% of what we need to know is not secret, not digital, and not in English. This is your operating environment. We are the beneficiaries of what others know, not the benefactors. Until we get serious about multinational IO, we are part of the problem.
  9. My latest US Army Strategic Studies Institute monograph covers this, it is free online. Not only does Army IO need to own and re-educate the four secret slices, it needs to get a grip and nurture the other eleven to achieve 360 degree integrity across the Army brain. IO needs to start with humans—who do we know, what can we know, what can be sense. Humans, not bits and bytes, are core.
  10. I am an honorary hacker and in 1994 told both the US Army and the National Information Infrastructure managers, in writing, what they needed to do. They did not listen. We have wasted over fifteen years. Unless our new flag officers break from the legacy systems and legacy mind-sets, the US Army is going to become largely irrelevant to a future dominated by hybrid networks sharing information.
  11. I recognize that you have had successes on the left, but I continue to believe that the current mix of five traditional specialties is a form of Frankenstein, a term used by LtCol Andrew B. Seward, writing for the Army War College in 2004. Personally, I would finesse this by deferring to LtGen Alexander and the strategic cyber-command on all matters having to do with legacy concepts of information warfare. I was one of the pioneers, there is little to be gained from spending $12 billion on vendor vaporware. That is a dead end, Army should not follow the secret cyber-cluster over the cliff. The center of gravity is the Open Tri-Fecta, whole of government/multinational, and the education of the force in all possible forms. We must change the mind-set, to include going multinational—real multinational—as quickly as possible.
  12. This is what the Dutch do. While we have been legalizing bad business practices the Dutch have built the highways of the mind such that data can travel at light speed and low cost at lower layers, not just the top layer. I am one of those helping create the Autonomous Internet, from OpenBTS to crowd-sourced free satellites, the world has changed dramatically and Army IO is—I believe—wildly out of touch with the art and science of what is and what could be. Leveraging the crowd requires that we connect to the crowd.
  13. Like it or not, this is the real world. The US Government has become so dysfunctional that the rest of the world is starting to route around us—we no longer have the influence we once had because might no longer makes right, and legitimacy at the bottom of the pyramid really does matter. “ Because we say so” no longer cuts it. Today there is a premium on clarity, diversity, integrity, and respect for the whole. Truth and transparency are the new currency of international as well as domestic stability. Trust should be IO’s coin.
  14. We just do not have the time to cover all this. Suffice to say that Egypt in particular has been a kick in the butt for the Autonomous Internet movement, and the US Government is neither trusted nor capable of shutting down this Internet at home or abroad. Here are some of the key terms. To the side is shown a small $169 device that turns any cell phone into a satellite phone.
  15. Around the world there is new energy for Open Everything, and that energy is inherently against fraud, waste, and abuse. The collective intelligence of the world is being unleashed and empowered. It is inherently in favor of dignity for all, democracy as the primary process, and an end to corruption.
  16. I am a former spy, I have created a national intelligence analytic center, programmed for imagery satellites, stolen signals codebooks, and managed offensive counterintelligence. My books are all free online. Our secret intelligence community is not just in elementary school, it is in the section reserved for the “challenged.” Army cyber could lead the way on both open multinational sources and methods, and on holistic measures, what General Al Gray in 1989 called “peaceful preventive measures.”
  17. In my view, national information infrastructure took a wrong turn in 1992 and went over the cliff in 1994. I lectured NSA’s first public conference in Las Vegas on this in 2002. Peter Drucker and I share the view that in this era, it is not the technology but rather the information that matters. How we collect, process, analyze, share, and act upon information is the center of gravity. Shutting off USB drives is the equivalent of putting a bullet in your brain so you won’t accidentally blurt out a secret.
  18. Along with maturity comes responsibility. It is no longer excusable for any element of the US Government to be out of touch with reality, including historical reality, and the best available projections of the future. At the graduate level, IO must integrate Sciences, Humanities, and Faith. Security today is about everything, always. The US Army, alone among all elements, has the most to gain from getting a grip on reality by first creating a multinational global information sharing and sense-making grid.
  19. The critical point here is that unclassified IO needs to be dominant if IO in particular and the US Army generally are going to be fully effective. Secret multinational, or time-based secret that rapidly becomes unsecret upon release, is also a major player. We cannot—as we do now—optimize for system high operations that demand that every unclas or secret interaction be treated as an exception.
  20. Here I put it all together. No one in the US Government is capable of doing this for a single service or agency, much less Whole of Government, and certainly not a Multinational Coalition. This is the future. My HUMINT Trilogy at Phi Beta Iota provides more information about the art and science of the possible in this arena. We are operating at less than 20% of our potential.
  21. Wrapping up this presentation, I offer you here ten trends in education from a spectacular book entitled The Web is Open: How Web Technology is Revolutionizing Education . If the US Army is to be a learning organization, a smart organization, then the US Army Cyber-Command has to be about education, not about closing down USB drives while letting vendors profit from butts in seats and vapor-ware.
  22. This is some fine print stuff. Right now Army IO is right back where Army Communications was in 1994 when I reviewed the Army plan for the National Research Council. You are destined to continue doing the wrong things righter for the next decade, and all of you will be long retired before someone like me is standing here in ten years saying the same thing to your replacements. It’s time we start doing the right thing.
  23. CIA still does not read Facebook pages, not because it cannot but because it refuses to take open sources seriously. At the same time, the US is best pals with 42 of 44 dictators on the planet, and they generally demand that CIA not be allowed to talk to their dissidents. Revolution 2.0 has started, and it is being Tweeted. It is generally non-violent, and it is focused on ending corruption.
  24. This was the heart of a white paper that L-3 paid me to write for DNI Negroponte. Nothing came of it because the stovepipes continue to rule and the $70-90 billion a year we spend on highly classified vendor vapor-ware would be called into question if we actually got good at the new meme in town, multinational, multiagency, multidisciplinary, multidomain information-sharing and sense-making: M4IS2. There is no reason why the US Army could not adapt this to its own needs.
  25. I devoutly believe that the US Army in particular and the US military in general are a solid foundation for creating a Smart Nation, but only if Army IO rapidly matures to make the US Army both a learning organization, and an organization able to serve as the hub for a whole of government and multinational decision-support operations. You can do this. I certainly am available to help, and I absolutely wish for the success of Army IO.
  26. Now just to put this in black and white, I offer this quote from a professional that I admire very much, Renier Cruz, the J-2 pit boss at SOCOM during the years when I supported their OSINT program. Take a minute to think about this. Pause. Intelligence is broken and IO—your successes not-withstanding—is non-existent in the multinational “everything always” sense that I have spent twenty years articulating. That is your starting point.
  27. In the aftermath of the Japanese twin disasters of the tsunami and the nuclear meltdowns, now five in number with estimated 100 year containment costs, I thought to offer this slide for online study. IO has enormous potential for good, provided two conditions are met: First, that it have a strategic analytic model that is holistic, persistent, and deep. Second, that it have absolute integrity.
  28. Crowd-sourcing….leveraging the cognitive surplus of humanity…harnessing the collective intelligence of all. IO can be, should be the World Brain and Global Game. Lies and secrecy do not cut it. I have been saying this since 1988 within the government, and since 1992 to the world at large. The truth at any cost lowers all other costs. May the Crowd be With You. [email_address]