Robert Garigue & Robert Steele: From Old IO to New IO

Advanced Cyber/IO, Analysis, Balance, Capabilities-Force Structure, Citizen-Centered, Collection, Earth Orientation, Geospatial, ICT-IT, Innovation, Languages-Translation, Leadership-Integrity, Multinational Plus, Policies-Harmonization, Processing, Reform, Strategy-Holistic Coherence, Threats, Tribes, True Cost
Click to Enlarge

Old Information Operations (IO) is too focused on the “Maginot Line” of legacy technology badly integrated and poorly understood.  New Information Operations (IO) is the “Maneuver Warfare” of the Information Age.  The integrity is in the user and data, not the system. Truth & trust rather than deception & jamming are the primordal enablers.

This is an improvisation working off Robert Garigue's slide, “Control Framework is a hierarchy of accountability structures”from his briefing,Robert Garigue: The New Information Security Agenda–Managing the Emerging Semantic Risks and Robert Steele's slide, Epoch B Leadership.  It is NOT POSSIBLE to “command” cyber-security from the “top down.”  One can only build in accountability and resiliency–which is to say, intelligence and integrity–from the bottom up.  Education, not technology, is the core change agent.  Human-centered design driven by intelligence is the architect, NOT pseudo-engineering from contractors seeking profit at any cost.

See Also:

Graphic: Balance Matters

Graphic: Business Intelligence Hits the Wall

Search: memetic leadership design

Robert Garigue: Security as the Guarantor of Values Executed by Systems–Security as Truth & Trust

Advanced Cyber/IO, Citizen-Centered, ICT-IT, Innovation, Leadership-Integrity, Multinational Plus, Policies-Harmonization, Processing, Reform, Strategy-Holistic Coherence, Tribes, True Cost
Click to Enlarge

This is a hugely important slide, and in our view a major advance in understanding of the function of security–it is NOT about defense per se, but rather about accountability and reliability–security is a guarantor of the values of truth & trust as embedded in every datum, every algorithm, every function, every time sequence.

See Also:

Robert Garigue: Truth & Trust as Security Requirements

As Found In:

Robert Garigue: The New Information Security Agenda–Managing the Emerging Semantic Risks

Robert Garigue: Truth & Trust as Security Requirements

Advanced Cyber/IO, Historic Contributions, ICT-IT, Innovation, Leadership-Integrity, Multinational Plus, Policies-Harmonization, Reform, Strategy-Holistic Coherence, Tribes, True Cost
Click to Enlarge

This is the first and only time we have seen truth & trust properly identified as fundamental to security.  The only other related works are those of Dr. Col Max Manwaring, whose edited work, The Search for Security–A U.S. Grand Strategy for the Twenty-First Century makes the point that legitimacy is the core value enabling peace and prosperty; and the Nobel Prize awarded in the 1990's to the scholar that demonstrated that trust lowers the cost of doing business.

Cyber-space, if it is to contribute to the evolution of humanity, must be imbued with truth & trust.  THIS is the core focus of any information security program in support of information operations, NOT “mere” “control” of potential data loss or “defeat” of potential enemies.  We sorely miss Robert Garigue–he was illuminating a very righteous path, and to our knowledge, none have stepped forth to fill his shoes.

See Also:

Robert Garigue: Security as the Guarantor of Values Executed by Systems–Security as Truth & Trust

As Found In:

Robert Garigue: The New Information Security Agenda–Managing the Emerging Semantic Risks

Robert Garigue: Feedback for Dynamic System Change

Advanced Cyber/IO, Analysis, Balance, Citizen-Centered, ICT-IT, Innovation, Leadership-Integrity, Multinational Plus, Policies-Harmonization, Processing, Reform, Strategy-Holistic Coherence, Threats, Tribes, True Cost
Click to Enlarge

Information security is not a static process–you cannot “lock down” information the way the Air Force has tried to do, prohibiting all flash drives because it has failed over decades to actually embed security in every aspect of the process from human to download alerts.  Interactive feedback loops are simple and effective.  Winn Schwartau pioneered time-based security and risk-based security.  Now if we just accept the fact that 80% or more of the information we need to be effective is not secret, not in English, and often not online at all, this represents a 180 degree turn away from the current focus on centralized cyber-security to the exclusion of all else (such as mission effectiveness).  As Russell Ackoff put forward: we have been doing the wrong thing righter, and are about to spend $12 billion doing the wrong thing righter, instead of going ALL STOP and redesigning all systems, human to technical, around M4IS2 (multinational, multiagency, multidisciplinary, multidomain information-sharing and sense-making).  One can no more merge all the Serious Games into one World Game than one can merge all the stovepipes into  one “all-source” system.  We have to do a clean-sheet requirements review and design for M4IS2 success, otherwise we automatically default to more of the failures that NSA and its various contractors are so notorious for….

See Also:

Robert Garigue, “Technical Preface” to Book Three

Robert Garigue, CISO Briefing