Robert Garigue & Robert Steele: From Old IO to New IO

Advanced Cyber/IO, Analysis, Balance, Capabilities-Force Structure, Citizen-Centered, Collection, Earth Orientation, Geospatial, ICT-IT, Innovation, Languages-Translation, Leadership-Integrity, Multinational Plus, Policies-Harmonization, Processing, Reform, Strategy-Holistic Coherence, Threats, Tribes, True Cost
Click to Enlarge

Old Information Operations (IO) is too focused on the “Maginot Line” of legacy technology badly integrated and poorly understood.  New Information Operations (IO) is the “Maneuver Warfare” of the Information Age.  The integrity is in the user and data, not the system. Truth & trust rather than deception & jamming are the primordal enablers.

This is an improvisation working off Robert Garigue's slide, “Control Framework is a hierarchy of accountability structures”from his briefing,Robert Garigue: The New Information Security Agenda–Managing the Emerging Semantic Risks and Robert Steele's slide, Epoch B Leadership.  It is NOT POSSIBLE to “command” cyber-security from the “top down.”  One can only build in accountability and resiliency–which is to say, intelligence and integrity–from the bottom up.  Education, not technology, is the core change agent.  Human-centered design driven by intelligence is the architect, NOT pseudo-engineering from contractors seeking profit at any cost.

See Also:

Graphic: Balance Matters

Graphic: Business Intelligence Hits the Wall

Search: memetic leadership design

Robert Garigue: Security as the Guarantor of Values Executed by Systems–Security as Truth & Trust

Advanced Cyber/IO, Citizen-Centered, ICT-IT, Innovation, Leadership-Integrity, Multinational Plus, Policies-Harmonization, Processing, Reform, Strategy-Holistic Coherence, Tribes, True Cost
Click to Enlarge

This is a hugely important slide, and in our view a major advance in understanding of the function of security–it is NOT about defense per se, but rather about accountability and reliability–security is a guarantor of the values of truth & trust as embedded in every datum, every algorithm, every function, every time sequence.

See Also:

Robert Garigue: Truth & Trust as Security Requirements

As Found In:

Robert Garigue: The New Information Security Agenda–Managing the Emerging Semantic Risks

Robert Garigue: Feedback for Dynamic System Change

Advanced Cyber/IO, Analysis, Balance, Citizen-Centered, ICT-IT, Innovation, Leadership-Integrity, Multinational Plus, Policies-Harmonization, Processing, Reform, Strategy-Holistic Coherence, Threats, Tribes, True Cost
Click to Enlarge

Information security is not a static process–you cannot “lock down” information the way the Air Force has tried to do, prohibiting all flash drives because it has failed over decades to actually embed security in every aspect of the process from human to download alerts.  Interactive feedback loops are simple and effective.  Winn Schwartau pioneered time-based security and risk-based security.  Now if we just accept the fact that 80% or more of the information we need to be effective is not secret, not in English, and often not online at all, this represents a 180 degree turn away from the current focus on centralized cyber-security to the exclusion of all else (such as mission effectiveness).  As Russell Ackoff put forward: we have been doing the wrong thing righter, and are about to spend $12 billion doing the wrong thing righter, instead of going ALL STOP and redesigning all systems, human to technical, around M4IS2 (multinational, multiagency, multidisciplinary, multidomain information-sharing and sense-making).  One can no more merge all the Serious Games into one World Game than one can merge all the stovepipes into  one “all-source” system.  We have to do a clean-sheet requirements review and design for M4IS2 success, otherwise we automatically default to more of the failures that NSA and its various contractors are so notorious for….

See Also:

Robert Garigue, “Technical Preface” to Book Three

Robert Garigue, CISO Briefing

Graphic: OODA Loop (Observe, Orient, Decide, Act)

Advanced Cyber/IO, Analysis, Citizen-Centered, Innovation, Processing, Strategy-Holistic Coherence

Simplified:

Click to Enlarge

Nuanced:

Click to Enlarge

Credit Simplied

Credit Nuanced

See Also:

Journal: Spinney, Boyd, Green, Kuhn on “Can America Be Salvaged?–Public Intelligence Aspects”

Review: Boyd–The Fighter Pilot Who Changed the Art of War

Review (Guest): Science, Strategy and War–The Strategic Theory of John Boyd

Graphic: Open Everything

About the Idea, Advanced Cyber/IO, Africa, Analysis, Balance, Capabilities-Force Structure, Citizen-Centered, Collection, Earth Orientation, Geospatial, History, ICT-IT, Innovation, Languages-Translation, Leadership-Integrity, Multinational Plus, Policies-Harmonization, Political, Processing, Reform, Strategy-Holistic Coherence, Threats, Tribes

Click to Enlarge

See Also:

2007 Open Everything: We Won, Let’s Self-Govern

2010 M4IS2 Briefing for South America — 2010 M4IS2 Presentacion por Sur America (ANEPE Chile)

Graphic: Top Business Intelligence Companies

Analysis, Processing, Strategy-Holistic Coherence, Tribes
For Reflection

This is Gartner's latest.   It comes as we are thinking about the convergence among software, hardware, and services companies, all trying to stovepipe their clients, none of them trying to help their clients actually do multinational eight-tribe information-sharing and sense-making.

Then there is the complete absence of visionaries, at least that Gartner has noticed or deigned to list.

It merits comment that “Business Intelligence” is nothing more than internal data mining, it does not integrate the other three quadrants, for that see Graphic: Four Quadrants J-2 High Cell SMS Low and Graphic: Human Intelligence (HUMINT) J-2 Central.  Links to other graphics can be seen atSearch: information sharing graphic dod.