Cyber-Command or IO 21 Planned Words in Notes Format.

Slides:



Advertisements
Similar presentations
The Truth About Electronic Publishing David R Worlock Cambridge, February 2010.
Advertisements

DoD Logistics Human Capital Strategy (HCS) Executive Overview 1 October 2008.
Open Source Intelligence Doctrine
® Iraq Intel/InfoOps Assessment & Summary of Joint Lessons Learned Robert David Steele Updated 24 October 2003.
Cyber-Command 101 Planned Words in Notes Format. What is the IO Threat?
® Modern Strategic Governance Director General Global Strategy Deputy Director Global Strategy Deputy Director Response Management Associate Directors.
® Seven Generations of War, Intelligence, & Information Operations: Placing Iraq on the Continuum of the Possible.
Open Source Intelligence (OSINT): Defense Overview 26 August 2009 Version 3.1 LEADERSHIP BRIEF (6 Slides) As Created by Robert Steele.
Planned Words in Notes Format
©SHRM 2008 Managing Virtual Work Teams by Frankie S. Jones, Ph.D. Employee and Labor Relations.
1 Developed by the Canadian Nurses Association and the Registered Nurses Association of Ontario Adapted for use by [name of PEACE site]
Management, Leadership, & Internal Organization………..
Developing the Mobile Learning Business London, 24 September 2001 Mark Watkinson e-Learning Principal, IBM Region North (c) Copyright IBM Corp m-
E GOVERNANCE FOR DEVELOPMENT
Steele-Yale-6 Reality Intelligence Tired Wired Ethics Solutions Eight Tribes OSE M4IS2 New Mind Robert David Steele CEO (pro bono) Earth Intelligence Network.
Organization, Implementation, and Control
Used with permission ©Mentor Plus 2014 All Rights Reserved How Does Your Company Keep Score?
Information Systems in Business
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Information Warfare Psychological Operations Implications for 21 st Century Organizational Leadership Federal Information Systems Security Educator’s Association.
Applications in Acquisition Changing Defense Environment.
Strategy to improve Internet Security in Sweden ITU-T SG 17 Geneva Dec 12, 2006 Christoffer Karsberg Network Security Department National Post.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
Principles and Learning Objectives
1 Corporate Capabilities. Adayana was founded in 2001 to improve human capital performance Our clients come to Adayana to help improve their people’s.
Understanding Boards Building Connections: Community Leadership Program.
UNESCO ICTLIP Module 1. Lesson 71 Introduction to Information and Communication Technologies Lesson 7. What are the trends and issues in ICT development.
FUTURE OF CROATIAN MILITARY EDUCATION To DEVERSIFY or to SPECIALIZE?
Social Networking in Education Presented by Justin R. Clark.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
WHO EURO – ECEH, Bonn Methods and models to estimate the impact of transport on health and the environment in cities Pierpaolo Mudu THE PEP INTERNATIONAL.
PMBA 8125 Course Map and purpose. Why bother studying the management of IS? Annual worldwide expenditures on IS/IT is estimated to be between $
12 Enterprise and Global Management of e-Business Technology.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
Deliberative Working Document - Predecisional FOUO Supporting the Secretary’s Top Priorities Eric Coulter, Deputy Director OSD Program Analysis and Evaluation.
BUSINESS DRIVEN TECHNOLOGY Chapter Sixteen: Integrating Collaborative Partnerships.
GLOBALIZATION. Globalization describes a process of increasing interdependence or the building of networks between individuals, firms, countries or regions.
Vodafone Global Enterprise & Huawei
World Future Society Washington, DC Executive Office of the President of the United States: The Need for New Capabilities Lessons From Singapore and the.
Information Sharing Challenges, Trends and Opportunities
Public Administration Politics not politics What is the connection? Politics sets the tasks for administration. but should not manipulate it’s offices.
Supporting Corporate Business Dr Christopher Kinsey Defence Studies Department King’s College London.
Social Accountability Approaches to Monitor and Enhance EI Local Development. Community Social Accountability Initiative for mining in Sierra Leone Ambrose.
INTELLIGENCE SERVICES. The Stratfor Advantage As the world’s leading private intelligence company, Stratfor is able to analyze and deliver timely, accurate.
Enterprise and Global Management of e-Business Technology
ICT SUPPORT TO CRISIS OPS Larry Wentz Senior Research Fellow Center for Technology and National Security Policy, National Defense University
The Pedagogical ICT Licence ICT in initial teacher training Professional development of teachers in ICT Denmark.
An R&D Manager’s Perspective TechExpo October 5, 2004 Presented by: Veena Rawat.
TECHNOLOGY FOR A CHANGING WORLD. Partners in WP Austrian Technologies DSTS Hamburg Fire Brigade Research Institute of the Red Cross University of Defense.
Managing Records in the Cloud Central Missouri Chapter Jesse Wilkins April 16, 2009.
Africa Center for Strategic Studies Tuesday, 10 July 2007 Africa Center for Strategic Studies Dr. Louis A. Picard Senior Research Fellow AFRICOM: The Three.
Internet Safety Mr. Richard Orr Technology Teacher Murphy Jr. High School.
CEOS Priorities for 2013 Agenda 3 Kerry Ann Sawyer CEOS Executive Officer CEOS SIT-28 Meeting Hampton, Virginia, USA 12 March 2013.
| Copyright© 2011 Microsoft Corporation 1 journey to the cloud KOEN VAN TOLHUYZEN TSP OFFICE 365 MICROSOFT CORPORATION.
DEVELOPING ADULT SAFEGUARDING ON THE ISLE OF MAN 9 th December, 2013 Barrool Suite, Douglas noon – 4.30 p.m.
SPK – 4 Golomazov Artem in my life. Hello! My name is Artem and I’d like to tell you about Information Technology by using Information Technology! It.
2nd GEO Data Providers workshop (20-21 April 2017, Florence, Italy)
TeleManagement Forum The voice of the OSS/BSS industry.
Digital Workplace.
Computer Literacy – Grade 8
Management in the Marketplace
An ICT role in key sectors of development of society.
Africa Center for Strategic Studies
Management in the Marketplace
Computer Literacy – Grade 8
Character, Trust, and Mission Command
Phase Zero Social Media Applications
Real-Time Information (RTI):
Be the hub of a smart nation, heart of the world brain
Presentation transcript:

Cyber-Command or IO 21 Planned Words in Notes Format

What is the IO Threat?

Collaboration Replaces Control

What Is Integrity?

Strategic Integrity Done Wrong

Strategic Integrity Done Right Integrity Emergent: Chairman of the Joint Chiefs Phi Beta Iota Public Intelligence Blog 31 March 2011 Captain Porter explained that US policy could benefit from adhering to a coherent strategic context. He was concerned that our leaders increasingly are becoming captive to temporal urgency without being able to consider a wider strategic perspective. We need to appreciate the interconnectedness and complexity of our strategic environment – better described as a strategic ecology. He said that this argues for a whole-of-nation, functional approach to development, diplomacy and defense, versus simply treating these as organizational stovepipes. He pointed out that such a functional approach has now been recognized in the National Security Strategy, the Quadrennial Defense Review, and the Quadrennial Diplomacy and Development Review. Reference: National Strategic Narrative Reference: Frog 6 Guidance

Army IO is Fraction of a Fraction

Human Minds Are IO Center of Gravity

Abandon the IO Legacy Mind-Set

What Should We Do? Open Tri-Fecta (1, 2, 3) + Education + Mind-Set (Culture) Current Cyber-Command TIRED, Expensive, Wasted Proposed Cyber-Command WIRED, Empowers, Leverages Electronic Warfare1 Open Spectrum & 2 Free/Open Source Software (F/OSS) Computer Network Operations Data Security from Hand to Cloud + Time-Based Risk + Trusted Humans Psychological Operations3 Open Source Intelligence (OSINT) i.e. Public/Global Intelligence Military DeceptionWhole of Government/Smart Nation/ Multinational Decision-Support Operations SecurityEducation in All Possible Forms Change the Mind-Set & Culture

Communications Matures

Rest of World Matures Open Everything Especially the Open Tri-Fecta

Autonomous Internet 101 C4I is DEADM4IS2 AutoNet are New Memes Freedom Box.. Solar-Powered Internet Mesh Networks.. Mass Steganography Crowd-Sourced Satellite Service (Free)

Autonomous Internet 102 We the People Self-Governing Panarchy

Intelligence Matures

Brains, Not Bytes, Are Heart of IO

IO Cube

Four Forces After Next With IO

Connecting the IO Dots

Ten Trends in Education (IO) 1Web-Searching 2Blending Learning 3Free/Open Source Software 4Open CourseWare 5Learning Portals 6Learners as Teachers 7Electronic Collaboration 8Alternative Reality including Serious Games 9Mobile Real-Time Learning 0 Networks of Personalized Learning

Key IO Topics Authorities. Modify every single policy, acquisition, & operations authority. Organizations. Cyber (9) in every organizationscreate the distributed Army brain. Signal Management. Open Spectrum now, data security not network security. Enterprise Services. Simple cell phones, OnStar, regional call & data centers. Operationalize Cyber. Every Army body is a thinker first, a shooter second. Execute Full Spectrum Cyber. Civil Affairs rules now, put the best & brightest there. Global Command & Control. Multinational, shared information as harmonizer Agile Cyber Proponency. Everyone on Earth has an IP address. Leverage that. 21 st Century Cyber-Warrior. May the crowd be with youleading minds. Requirements & Resources. Done right this impacts on every Army element. Cyber-Command in Three Words: Education, Intelligence, Research. Cyber-Command in One Word: Education.

This is Your IO Reality

Future of IO Part I All Information, All Languages, All the Time

Future of IO Part II Creating a Smart Nation

Cyber-IO: The Global Context Secret intelligence is ten percent of all-source intelligence, and all- source intelligence is ten percent of Information Operations. Renier Cruz, GS-15 (Should be DISL/SES) US Special Operations Command J-2 Pit Boss

Iraq Case Study Japan Case Study Strategic Lessons Secret intelligence manipulated Secret intelligence ignored Secret intelligence inadequate Obsessions block global coverage No coherent iO strategy/message Lack of policy integrity hurt bad Operational Net Assessment B Kick-Off OOB C Battle damage D Congressional debate D WMD actual status F Covert Operations Options F Global IO Images F Post-War Insurgency Intelligence F Reconstruction Intelligence Bottom Line: Intelligence irrelevant, Information Operations non-existent Strategic Lessons Long-term total cost matters Climate change a vital context Precautionary principle not present Intelligence assessment not done Integrity lacking in private sector Integrity lacking in public sector Operational Net Assessment A One guyonegot it and warned F Blown off by his corporation F Blown off by the government F No learning at all since 1952 F No calculation of consequences F No provision for Chernobyl need F Misrepresentation to public F Cost to be borne by public Bottom Line: IO 21 demands 360 view, long view, deep true cost study

May the Crowd Be With You… The truth at any cost lowers all other costs.