Presentation is loading. Please wait.

Presentation is loading. Please wait.

Cyber-Command or IO 21 Planned Words in Notes Format.

Similar presentations


Presentation on theme: "Cyber-Command or IO 21 Planned Words in Notes Format."— Presentation transcript:

1 Cyber-Command or IO 21 Planned Words in Notes Format

2 What is the IO Threat?

3 Collaboration Replaces Control

4 What Is Integrity?

5

6 Strategic Integrity Done Wrong

7 Strategic Integrity Done Right Integrity Emergent: Chairman of the Joint Chiefs Phi Beta Iota Public Intelligence Blog 31 March 2011 Captain Porter explained that US policy could benefit from adhering to a coherent strategic context. He was concerned that our leaders increasingly are becoming captive to temporal urgency without being able to consider a wider strategic perspective. We need to appreciate the interconnectedness and complexity of our strategic environment – better described as a strategic ecology. He said that this argues for a whole-of-nation, functional approach to development, diplomacy and defense, versus simply treating these as organizational stovepipes. He pointed out that such a functional approach has now been recognized in the National Security Strategy, the Quadrennial Defense Review, and the Quadrennial Diplomacy and Development Review. Reference: National Strategic Narrative Reference: Frog 6 Guidance 2010-2020

8 Army IO is Fraction of a Fraction

9 Human Minds Are IO Center of Gravity

10 Abandon the IO Legacy Mind-Set

11 What Should We Do? Open Tri-Fecta (1, 2, 3) + Education + Mind-Set (Culture) Current Cyber-Command TIRED, Expensive, Wasted Proposed Cyber-Command WIRED, Empowers, Leverages Electronic Warfare1 Open Spectrum & 2 Free/Open Source Software (F/OSS) Computer Network Operations Data Security from Hand to Cloud + Time-Based Risk + Trusted Humans Psychological Operations3 Open Source Intelligence (OSINT) i.e. Public/Global Intelligence Military DeceptionWhole of Government/Smart Nation/ Multinational Decision-Support Operations SecurityEducation in All Possible Forms Change the Mind-Set & Culture

12 Communications Matures

13 Rest of World Matures Open Everything Especially the Open Tri-Fecta

14 Autonomous Internet 101 C4I is DEADM4IS2 AutoNet are New Memes Freedom Box.. Solar-Powered Internet Mesh Networks.. Mass Steganography Crowd-Sourced Satellite Service (Free)

15 Autonomous Internet 102 We the People Self-Governing Panarchy

16 Intelligence Matures

17 Brains, Not Bytes, Are Heart of IO

18 IO Cube

19 Four Forces After Next With IO

20 Connecting the IO Dots

21 Ten Trends in Education (IO) 1Web-Searching 2Blending Learning 3Free/Open Source Software 4Open CourseWare 5Learning Portals 6Learners as Teachers 7Electronic Collaboration 8Alternative Reality including Serious Games 9Mobile Real-Time Learning 0 Networks of Personalized Learning

22 Key IO Topics Authorities. Modify every single policy, acquisition, & operations authority. Organizations. Cyber (9) in every organizationscreate the distributed Army brain. Signal Management. Open Spectrum now, data security not network security. Enterprise Services. Simple cell phones, OnStar, regional call & data centers. Operationalize Cyber. Every Army body is a thinker first, a shooter second. Execute Full Spectrum Cyber. Civil Affairs rules now, put the best & brightest there. Global Command & Control. Multinational, shared information as harmonizer Agile Cyber Proponency. Everyone on Earth has an IP address. Leverage that. 21 st Century Cyber-Warrior. May the crowd be with youleading minds. Requirements & Resources. Done right this impacts on every Army element. Cyber-Command in Three Words: Education, Intelligence, Research. Cyber-Command in One Word: Education.

23 This is Your IO Reality

24 Future of IO Part I All Information, All Languages, All the Time

25 Future of IO Part II Creating a Smart Nation

26 Cyber-IO: The Global Context Secret intelligence is ten percent of all-source intelligence, and all- source intelligence is ten percent of Information Operations. Renier Cruz, GS-15 (Should be DISL/SES) US Special Operations Command J-2 Pit Boss

27 Iraq Case Study Japan Case Study Strategic Lessons Secret intelligence manipulated Secret intelligence ignored Secret intelligence inadequate Obsessions block global coverage No coherent iO strategy/message Lack of policy integrity hurt bad Operational Net Assessment B Kick-Off OOB C Battle damage D Congressional debate D WMD actual status F Covert Operations Options F Global IO Images F Post-War Insurgency Intelligence F Reconstruction Intelligence Bottom Line: Intelligence irrelevant, Information Operations non-existent Strategic Lessons Long-term total cost matters Climate change a vital context Precautionary principle not present Intelligence assessment not done Integrity lacking in private sector Integrity lacking in public sector Operational Net Assessment A One guyonegot it and warned F Blown off by his corporation F Blown off by the government F No learning at all since 1952 F No calculation of consequences F No provision for Chernobyl need F Misrepresentation to public F Cost to be borne by public Bottom Line: IO 21 demands 360 view, long view, deep true cost study

28 May the Crowd Be With You… The truth at any cost lowers all other costs.


Download ppt "Cyber-Command or IO 21 Planned Words in Notes Format."

Similar presentations


Ads by Google