Robert Garigue & Robert Steele: From Old IO to New IO

Advanced Cyber/IO, Analysis, Balance, Capabilities-Force Structure, Citizen-Centered, Collection, Earth Orientation, Geospatial, ICT-IT, Innovation, Languages-Translation, Leadership-Integrity, Multinational Plus, Policies-Harmonization, Processing, Reform, Strategy-Holistic Coherence, Threats, Tribes, True Cost
Click to Enlarge

Old Information Operations (IO) is too focused on the “Maginot Line” of legacy technology badly integrated and poorly understood.  New Information Operations (IO) is the “Maneuver Warfare” of the Information Age.  The integrity is in the user and data, not the system. Truth & trust rather than deception & jamming are the primordal enablers.

This is an improvisation working off Robert Garigue's slide, “Control Framework is a hierarchy of accountability structures”from his briefing,Robert Garigue: The New Information Security Agenda–Managing the Emerging Semantic Risks and Robert Steele's slide, Epoch B Leadership.  It is NOT POSSIBLE to “command” cyber-security from the “top down.”  One can only build in accountability and resiliency–which is to say, intelligence and integrity–from the bottom up.  Education, not technology, is the core change agent.  Human-centered design driven by intelligence is the architect, NOT pseudo-engineering from contractors seeking profit at any cost.

See Also:

Graphic: Balance Matters

Graphic: Business Intelligence Hits the Wall

Search: memetic leadership design

Robert Garigue: Security as the Guarantor of Values Executed by Systems–Security as Truth & Trust

Advanced Cyber/IO, Citizen-Centered, ICT-IT, Innovation, Leadership-Integrity, Multinational Plus, Policies-Harmonization, Processing, Reform, Strategy-Holistic Coherence, Tribes, True Cost
Click to Enlarge

This is a hugely important slide, and in our view a major advance in understanding of the function of security–it is NOT about defense per se, but rather about accountability and reliability–security is a guarantor of the values of truth & trust as embedded in every datum, every algorithm, every function, every time sequence.

See Also:

Robert Garigue: Truth & Trust as Security Requirements

As Found In:

Robert Garigue: The New Information Security Agenda–Managing the Emerging Semantic Risks

Robert Garigue: Feedback for Dynamic System Change

Advanced Cyber/IO, Analysis, Balance, Citizen-Centered, ICT-IT, Innovation, Leadership-Integrity, Multinational Plus, Policies-Harmonization, Processing, Reform, Strategy-Holistic Coherence, Threats, Tribes, True Cost
Click to Enlarge

Information security is not a static process–you cannot “lock down” information the way the Air Force has tried to do, prohibiting all flash drives because it has failed over decades to actually embed security in every aspect of the process from human to download alerts.  Interactive feedback loops are simple and effective.  Winn Schwartau pioneered time-based security and risk-based security.  Now if we just accept the fact that 80% or more of the information we need to be effective is not secret, not in English, and often not online at all, this represents a 180 degree turn away from the current focus on centralized cyber-security to the exclusion of all else (such as mission effectiveness).  As Russell Ackoff put forward: we have been doing the wrong thing righter, and are about to spend $12 billion doing the wrong thing righter, instead of going ALL STOP and redesigning all systems, human to technical, around M4IS2 (multinational, multiagency, multidisciplinary, multidomain information-sharing and sense-making).  One can no more merge all the Serious Games into one World Game than one can merge all the stovepipes into  one “all-source” system.  We have to do a clean-sheet requirements review and design for M4IS2 success, otherwise we automatically default to more of the failures that NSA and its various contractors are so notorious for….

See Also:

Robert Garigue, “Technical Preface” to Book Three

Robert Garigue, CISO Briefing

Robert Garigue: Three Information Security Domains–the Physical (Old), the Process (Current), and the Content (Future)

Advanced Cyber/IO, Citizen-Centered, ICT-IT, Policies-Harmonization, Strategy-Holistic Coherence, Threats, True Cost
Click to Enlarge

Core Point:  The US national security world is still operating under a two conflicting paradigms: stovepipes within which authorized users have access to everything in the stovepipe (more or less); and isolated stovepipes in which external authorized users have to spend 25% of their time gaining access to 80+ databases (or worse, don't bother), and if they forget their password, a 2-3 day gap while access is restored.  What SHOULD have happened between 1986 when this was first pointed out and 1994 when the national alarm was sounded, was full excryption at rest of all documents, and a combination of automated access roles and rules together with anomaly detection at any point in the system including external drives.  The good news: 90% or more of what needs to be shared is NOT SECRET.  Bad news: someone other than the US Government “owns” that 90%.  The US system is not capable of ingesting and then exploiting that 90%.

See Also:

Robert Garigue, “Technical Preface” to Book Three

Robert Garigue, CISO Briefing

Graphic: OODA Loop (Observe, Orient, Decide, Act)

Advanced Cyber/IO, Analysis, Citizen-Centered, Innovation, Processing, Strategy-Holistic Coherence

Simplified:

Click to Enlarge

Nuanced:

Click to Enlarge

Credit Simplied

Credit Nuanced

See Also:

Journal: Spinney, Boyd, Green, Kuhn on “Can America Be Salvaged?–Public Intelligence Aspects”

Review: Boyd–The Fighter Pilot Who Changed the Art of War

Review (Guest): Science, Strategy and War–The Strategic Theory of John Boyd

Reference: Remembering Laos and the Hmong

About the Idea, Blog Wisdom, Citizen-Centered
Marcus Aurelius Recommends

Phi Beta Iota: Laos was both an inspiring success story at the operational and tactical levels, and a massive strategic failure in context.  On the one hand, a handful of CIA officers and a very modest amount of money kept entire divisions pinned down or occupied or distracted.  On the other hand, in the words of Ted Shackley's deputy in Laos, we got a lot of people killed with nothing to show for it in the end.  Today this would not be possible to achieve by kinetic means because it would be too easy to first spot with commercial imagery, and then cover all of the air strips with covert hides able to shoot down the light airplanes as they landed.  However, today there are other means of empowering indigenous peoples, centered on Open Spectrum, Open Source Software, and Open Source Intelligence–the Open Tri-Fecta: Information Operations (Advanced).

Click to Enlarge

Comment by Contributing Editor Tom Briggs:

I've never tried to work up the numbers, but I would be very surprised to learn that the ratio of Hmong soldiers to lowland Lao/other mountain tribe soldiers was greater than 50/50.
Having been a Marine, I'm sure you know the old saying that every Marine squad goes into combat with its own photographer.  Merely jealousy, I'm sure, for all the favorable publicity the Marines have had over the years, but not unlike all the favorable publicity the Marines have had (not that they don't deserve it) the Hmong have been the beneficiaries of a similar favorable publicity to the exclusion of the part the lowland Lao and all the other tribal peoples played in the “Secret War.”

See Also:

Review: Cash on Delivery–CIA Special Operations During the Secret War in Laos

Review: Spymaster–My Life in the CIA

Review: Blond Ghost

Review: The World Is Open–How Web Technology Is Revolutionizing Education

Review: Ideas and Integrities–A Spontaneous Autobiographical Disclosure

2006 INFORMATION OPERATIONS: All Information, All Languages, All the Time

Graphic: Open Everything

About the Idea, Advanced Cyber/IO, Africa, Analysis, Balance, Capabilities-Force Structure, Citizen-Centered, Collection, Earth Orientation, Geospatial, History, ICT-IT, Innovation, Languages-Translation, Leadership-Integrity, Multinational Plus, Policies-Harmonization, Political, Processing, Reform, Strategy-Holistic Coherence, Threats, Tribes

Click to Enlarge

See Also:

2007 Open Everything: We Won, Let’s Self-Govern

2010 M4IS2 Briefing for South America — 2010 M4IS2 Presentacion por Sur America (ANEPE Chile)