Planned Words in Notes Format

Slides:



Advertisements
Similar presentations
Open Source Intelligence Doctrine
Advertisements

Cyber-Command 101 Planned Words in Notes Format. What is the IO Threat?
Cyber-Command or IO 21 Planned Words in Notes Format.
Navigating Customer Contact Space in the 21st Century Bill Durr Director, Global Field Marketing.
Developing the Mobile Learning Business London, 24 September 2001 Mark Watkinson e-Learning Principal, IBM Region North (c) Copyright IBM Corp m-
Doug Couto Information Systems and Technology Committee (ABJ50) Washington, DC January 25, 2011.
Security Challenges in a Connected World Security Challenges in a Connected World ISACA Roundtable, Breukelen, The Netherlands March 2013 Yiru Zhong, Analyst.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Leading 21st Century Simulation Solutions P rogram E xecutive O ffice S imulation, T raining and I nstrumentation Presented by Mr. John Wrigley Modeling.
Author: John Naisbitt ©1994 Zach Allard CS /4/2012.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
1 Corporate Capabilities. Adayana was founded in 2001 to improve human capital performance Our clients come to Adayana to help improve their people’s.
Health Informatics Series
CS691 Robin Kimzey Cell Phone Security a little computer in your pocket an easy target for malcontents.
IST DEVELOPMENT IN LATVIA
Telecommunications and Networks
Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.
J.R. Smith, CEO AVG Technologies. Introduction Privacy and cybersecurity are closely linked issues: to advance the latter it is important to adequately.
Social Networking in Education Presented by Justin R. Clark.
Campus Technology 08 Shootout! Bracing for the Next-Gen Student Wave: Myth or Mandate? Next-Gen Students “Speak Up” – Are we listening? Julie Evans Project.
Digital Identity Management Strategy, Policies and Architecture Kent Percival A presentation to the Information Services Committee.
BCS, The Chartered Institute for IT Mauritius 6 th November 2012.
WELCOME TO UNIT 7 Customer Service MT 221 Marilyn Radu, Instructor.
Research at Department of Computer and Systems Sciences – DSV.
© Copyright 2010 Hewlett-Packard Development Company, L.P. 1 MORE THAN A DIGIT(AL) SHIFT Frank Huynen Director Strategy & Innovation.
Cloud Computing Zach Ciccone Claudia Rodriguez Annia Aleman Xiaoying Tu Nov 14, 2013.
Business Computing 550 Lesson 1. Fundamentals of Information Systems, Fifth Edition An Introduction to Information Systems in Organizations.
INTERNET- A BOON OR A CURSE AYUSHI PRADHAN. WHAT IS IT? Internet or INTERnational NETwork is a network of networks that crisscrosses the globe and even.
1 - 1 The Networked Economy: A new way of doing business Copyright © 2001 by Harcourt, Inc. All rights reserved. Part 1.
Specification section 6.2. What do you need to learn? The application and advantages/disadvantages of the following digital media and new technology in.
CONFIDENTIAL 1. 2 Designing the Intelligent Energy Gateway 2009 CONFIDENTIAL.
 ByYRpw ByYRpw.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
ICT SUPPORT TO CRISIS OPS Larry Wentz Senior Research Fellow Center for Technology and National Security Policy, National Defense University
SBIR Final Meeting Collaboration Sensor Grid and Grids of Grids Information Management Anabas July 8, 2008.
TECHNOLOGY FOR A CHANGING WORLD. Partners in WP Austrian Technologies DSTS Hamburg Fire Brigade Research Institute of the Red Cross University of Defense.
Future ICT Landscapes – Security and Privacy Challenges & Requirements Simone Fischer-Hübner IVA Workshop, Stockholm 24th May 2012.
CS4HS Why Computer Science? Ed Lazowska Bill & Melinda Gates Chair in Computer Science & Engineering University of Washington July 2013.
By Jared.  Under the terms of the alliance, epals this fall will add Microsoft’s
Learning Commons: Learning Commons: A Whole School Approach to Learning for the Future Carol Koechlin Thunder Bay CDSB October 18, 2010
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
What is The Internet?. Internet Vs Intranet Internet –Computers connected throughout the world. PUBLIC Network Intranet- Secure connected computers within.
Telecommunications and Networking
Two trends that will change the Internet
Chapter 1 An Introduction to Information Systems
Defense Daily Cyber Summit
US CYBER COMMAND The overall classification of this brief is: UNCLASSIFIED 1 Perspectives from the Command to APEX LtGen Robert E. Schmidle USMC Deputy.
Wel come –Prepared by: BHAVIN TANK MILAN VEGAD. What is the.
E-COMMERCE & MOBILE COMPUTING. On Technicals… Considerations for evaluating platform Ecommerce Applications Development Process Integration Options Middlewares.
1 Data Versus Information WestCharles Mann 79154TM Shoes Monthly Sales Report for West Region Sales Rep: Charles Mann Emp No Item Qty Sold.
IT Security vs Office Administration Efficiency Office Administration Efficiency Date: João Stott.
WELCOME TO UNIT 7. Unit 7 The Impact of Globalization on Customer Service Objectives Understand the impact globalization has had on the world economy.
CS4HS Why Computer Science? Ed Lazowska Bill & Melinda Gates Chair in Computer Science & Engineering University of Washington August 2012.
温州市实验中学 陈玫月. Give opinions in different ways. I think students should be allowed to …. I don’t think students should …. I agree / disagree that … I think.
NATIONAL EDUCATION INITIATIVE FOR K–12 CLASSROOMS.
Computer Science skill sets
Digital Workplace.
Computer Literacy – Grade 8
DISA Global Operations
Computer Science Courses
Gather Valuable Customer Data
Wonderware Online Cost-Effective SaaS Solution Powered by the Microsoft Azure Cloud Platform Delivers Industrial Insights to Users and OEMs MICROSOFT AZURE.
Future Technologies FTC 2016 Future Technologies Conference December 2016 San Francisco, United States.
Customer Services Single view of the customer, enabling wide variety of customer requests to be dealt with at the point of contact Self-Service Portal.
Digitalization of Manufacturing
Computer Literacy – Grade 8
Cloud adoption NECOOST Advisory | June 2017.
Computer Science Courses in the Major
Presentation transcript:

Planned Words in Notes Format These slides are online at my Blog, and also at the IO Stash, www.oss.net/IO. I’m not here to criticize. We all know that IO today is Frankenstein squared. If I were briefing LtGen Hernandez, this is what I would place before him. Cyber-Command or IO 21 Planned Words in Notes Format

What is the IO “Threat?” This has not changed much since the 1990’s, and in fact has gotten worse as our processes have atrophied. Not only does the acquisition community make a lot of mistakes, today it’s starting point is so far removed from reality that every system in our inventory—down to the infantry pop-guns that are ineffective beyond 300 meters—is a de facto failure.

Collaboration Replaces Control Command & Control is dead. Transparency, truth, and trust are ascendant. INTEGRITY is the word of the century. Only consensus rooted in legitimacy is sustainable and therefore affordable.

Army IO is Fraction of a Fraction US secret intelligence has wasted one trillion dollars in the last 20 years because it has refused to accept the fact that 96% of what we need to know is not secret, not digital, and not in English. This is your operating environment. We are the beneficiaries of what others know, not the benefactors.

Human Minds Are IO Center of Gravity My latest US Army Strategic Studies Institute monograph covers this, it is free online. Not only does Army IO need to own and re-educate the four secret slices, it needs to get a grip and nurture the other eleven to achieve 360 degree integrity across the Army brain.

Abandon the IO Legacy Mind-Set I am an honorary hacker and in 1994 told both the US Army and the National Information Infrastructure managers, in writing, what they needed to do. They did not listen. We have wasted over fifteen years. Unless our new flag officers break from the legacy systems and legacy mind-sets, the US Army is going to become largely irrelevant to a future dominated by hybrid networks sharing information.

What Should We Do? Open Tri-Fecta (1, 2, 3) + Education + Mind-Set (Culture) Current Cyber-Command TIRED, Expensive, Wasted Proposed Cyber-Command WIRED, Empowers, Leverages Electronic Warfare 1 Open Spectrum & 2 Free/Open Source Software (F/OSS) Computer Network Operations Data Security from Hand to Cloud + Time-Based Risk + Trusted Humans Psychological Operations 3 Open Source Intelligence (OSINT) i.e. Public/Global Intelligence Military Deception Whole of Government/Smart Nation/ Multinational Decision-Support Operations Security Education in All Possible Forms Change the Mind-Set & Culture Personally, I would finesse this by deferring to LtGen Alexander and the strategic cyber-command on all matters having to do with legacy concepts of information warfare. I was one of the pioneers, there is little to be gained from spending $12 billion on vendor vaporware. The center of gravity is the Open Tri-Fecta, whole of government/multinational, and the education of the force in all possible forms. We must change the mind-set.

Communications Matures This is what the Dutch do. While we have been legalizing bad business practices the Dutch have built the highways of the mind such that data can travel at light speed and low cost at lower layers, not just the top layer. I am one of those helping create the Autonomous Internet, this is my only technical slide, from OpenBTS to crowd-sourced free satellites, the world has changed dramatically and Army IO is—I believe—wildly out of touch with the art and science of what is and what could be.

Intelligence Matures I am a former spy, I have created a national intelligence analytic center, programmed for imagery satellites, stolen signals codebooks, and managed offensive counterintelligence. My books are all free online. Our secret intelligence community is not just in elementary school, it is in the section reserved for the “challenged.” Army cyber could lead the way on both open multinational sources and methods, and on holistic measures, what General Al Gray in 1989 called “peaceful preventive measures.”

Rest of World Matures Open Everything Especially the Open Tri-Fecta Like it or not, this is the real world. The US Government has become so dysfunctional that the rest of the world is starting to route around us—we no longer have the influence we once had because might no longer makes right, and legitimacy at the bottom of the pyramid really does matter. “Because we say so” no longer cuts it. Today there is a premium on clarity, diversity, integrity, and respect for the whole. Truth and transparency are the new currency of international as well as domestic stability. Trust should be IO’s coin.

Brains, Not Bytes, Are Heart of IO In my view, national information infrastructure took a wrong turn in 1992 and went over the cliff in 1994. I lectured NSA’s first public conference in Las Vegas on this in 2000. Peter Drucker and I share the view that in this era, it is not the technology but rather the information that matters. How we collect, process, analyze, share, and act upon information is the center of gravity. Shutting off USB drives is the equivalent of putting a bullet in your brain so you won’t accidentally blurt out a secret.

IO Cube Along with maturity comes responsibility. It is no longer excusable for any element of the US Government to be out of touch with reality, including historical reality, and the best available projections of the future. At the graduate level, IO must integrate Sciences, Humanities, and Faith. Security today is about everything, always. The US Army, alone among all elements, has the most to gain from getting a grip on reality.

Four Forces After Next With IO The critical point here is that unclassified IO needs to be dominant if IO in particular and the US Army generally are going to be fully effective. Secret multinational, or time-based secret that rapidly becomes unsecret upon release, is also a major player. We cannot—as we do now—optimize for system high operations that demand that every unclas or secret interaction be treated as an exception.

Connecting the IO Dots Here I put it all together. No one in the US Government is capable of doing this for a single service or agency, much less Whole of Government, and certainly not a Multinational Coalition. This is the future. My HUMINT Trilogy at Phi Beta Iota provides more information about the art and science of the possible in this arena. We are operating at less than 20% of our potential.

Ten Trends in Education (IO) Web-Searching Blending Learning Free/Open Source Software Open CourseWare Learning Portals Learners as Teachers Electronic Collaboration Alternative Reality including Serious Games Mobile Real-Time Learning 0 Networks of Personalized Learning Wrapping up this presentation, I offer you here ten trends in education from a spectacular book entitled The Web is Open: How Web Technology is Revolutionizing Education. If the US Army is to be a learning organization, a smart organization, then the US Army Cyber-Command has to be about education, not about closing down USB drives while letting vendors profit from butts in seats and vapor-ware.

Key IO Topics Authorities. Modify every single policy, acquisition, & operations authority. Organizations. Cyber (9) in every organizations—create the distributed Army brain. Signal Management. Open Spectrum now, data security not network security. Enterprise Services. Simple cell phones, OnStar, regional call & data centers. Operationalize Cyber. Every Army body is a thinker first, a shooter second. Execute Full Spectrum Cyber. Civil Affairs rules now, put the best & brightest there. Global Command & Control. Multinational, shared information as harmonizer Agile Cyber Proponency. Everyone on Earth has an IP address. Leverage that. 21st Century Cyber-Warrior. May the crowd be with you—leading minds. Requirements & Resources. Done right this impacts on every Army element. Cyber-Command in Three Words: Education, Intelligence, Research. Cyber-Command in One Word: Education. This is some fine print stuff. Right now Army IO is right back where Army Communications was in 1994 when I reviewed the Army plan for the National Research Council. You are destined to continue doing the wrong things righter for the next decade, and all of you will be long retired before someone like me is standing here in ten years saying the same thing to your replacements. It’s time we start doing the right thing.

This is Your IO Reality CIA still does not read Facebook pages, not because it cannot but because it refuses to take open sources seriously. At the same time, the US is best pals with 42 of 44 dictators on the planet, and they generally demand that CIA not be allowed to talk to their dissidents. Revolution 2.0 has started, and it is being Tweeted. It is generally non-violent, and it is focused on ending corruption.

Future of IO Part I All Information, All Languages, All the Time This was the heart of a white paper that L-3 paid me to write for DNI Negroponte. Nothing came of it because the stovepipes continue to rule and the $70-90 billion a year we spend on highly classified vendor vapor-ware would be called into question if we actually got good at the new meme in town, multinational, multiagency, multidisciplinary, multidomain information-sharing and sense-making: M4IS2. There is no reason why the US Army could not adapt this to its own needs.

Future of IO Part II Creating a Smart Nation I devoutly believe that the US Army in particular and the US military in general are a solid foundation for creating a Smart Nation, but only if Army IO rapidly matures to make the US Army both a learning organization, and an organization able to serve as the hub for a whole of government and multinational decision-support operations. You can do this. I certainly am available to help, and I absolutely wish for the success of Army IO.

May the Crowd Be With You… I hope I don’t have to explain this. Crowd-sourcing….leveraging the cognitive surplus of humanity…harnessing the collective intelligence of all. May the Crowd be With You.