This document discusses information management and defines key terms like data, information, knowledge, and understanding. It explains that information management aims to take raw data and transform it into useful knowledge through organizing, analyzing, and applying experience and education. However, different organizations like the military branches define these terms differently, causing challenges. The document advocates for better collaboration between staff sections like intelligence and operations, which need to share information to effectively do their jobs. Overall it stresses the importance of understanding what information you are trying to manage and focusing on organizational needs over just the tools.
Analystik est experte pour développer des applications pour le monde de la finance. ERP i est notre logiciel pour la gestion de crédit-baux. Analystik a gagné plusieurs prix chez GE Capital pour cette application.
This paper will examine why its become important for organizations to develop an comprehensive Information Technology (IT) Modernization strategy that focuses on improving their business process and protecting their network infrastructure by leveraging modern-day cybersecurity tools. Most of the topic will focus on the U.S. Department of Defense’s (DOD) strategy towards improving their network security defenses for the department and the steps they’ve taken at the agency level where components under DOD such as DISA (The Defense Information Systems Agency) are working towards adding tools that provides additional capabilities in the cyber space. This approach will be analyzed to determine if DOD goals address any of their vulnerabilities towards protecting their networks. One of the agencies under the DOD umbrella called DISA (The Defense Information Systems Agency) provides DOD a template on how to build a network that relies upon layers of security to help it combat cyber attacks against its network. Whether that provides an effective solution to DOD remains a question due to the many components that operate under its direction. Managing these networks is the principle responsibilities for the Department of Defense. Nevertheless, it does demonstrates that there are tools available to help DOD build an strong enterprise cyber network of situational awareness that strengthens the ability to protect their network infrastructure.
Running Head: cyber security
Emerging Cyber security Technologies
Jacqueline Snyder
CSEC 670
UMUC
2/21/2014
Emerging cyber security Technologies
ii
Table of Contents
Introduction ................................................................................................................................................... 1
Establishment ................................................................................................................................................ 2
Cited Works Survey ...................................................................................................................................... 4
Moving Target Technologies ..................................................................................................................... 4
Govt Support of Moving Target [mt] Technologies ............................................................................. 5
Remote Agent Technologies ..................................................................................................................... 6
Government Support for Remote Agent Technologies ......................................................................... 7
Consistent Forensic Analysis ..................................................................................................................... 8
Government Support of the time period Forensic Analysis .................................................................. 9
Cloud information ................................................................................................................................... 10
Quite Good Privacy ............................................................................................................................. 10
Government Support of superb Privacy .............................................................................................. 11
Fingerprinting and ID Devices on the Network ....................................................................................... 11
Expenses of protective against Cyber Attacks stay High ........................................................................ 14
Danger sagacity is discriminating, however still in unanticipated stages ............................................... 15
With danger debilitating to quantify, protection remains risky ............................................................. 16
Huge learning dissection ......................................................................................................................... 17
Exchange / Results ...................................................................................................................................... 18
Conclusion .................................................................................................................................................. 21
References ..................
Analystik est experte pour développer des applications pour le monde de la finance. ERP i est notre logiciel pour la gestion de crédit-baux. Analystik a gagné plusieurs prix chez GE Capital pour cette application.
This paper will examine why its become important for organizations to develop an comprehensive Information Technology (IT) Modernization strategy that focuses on improving their business process and protecting their network infrastructure by leveraging modern-day cybersecurity tools. Most of the topic will focus on the U.S. Department of Defense’s (DOD) strategy towards improving their network security defenses for the department and the steps they’ve taken at the agency level where components under DOD such as DISA (The Defense Information Systems Agency) are working towards adding tools that provides additional capabilities in the cyber space. This approach will be analyzed to determine if DOD goals address any of their vulnerabilities towards protecting their networks. One of the agencies under the DOD umbrella called DISA (The Defense Information Systems Agency) provides DOD a template on how to build a network that relies upon layers of security to help it combat cyber attacks against its network. Whether that provides an effective solution to DOD remains a question due to the many components that operate under its direction. Managing these networks is the principle responsibilities for the Department of Defense. Nevertheless, it does demonstrates that there are tools available to help DOD build an strong enterprise cyber network of situational awareness that strengthens the ability to protect their network infrastructure.
Running Head: cyber security
Emerging Cyber security Technologies
Jacqueline Snyder
CSEC 670
UMUC
2/21/2014
Emerging cyber security Technologies
ii
Table of Contents
Introduction ................................................................................................................................................... 1
Establishment ................................................................................................................................................ 2
Cited Works Survey ...................................................................................................................................... 4
Moving Target Technologies ..................................................................................................................... 4
Govt Support of Moving Target [mt] Technologies ............................................................................. 5
Remote Agent Technologies ..................................................................................................................... 6
Government Support for Remote Agent Technologies ......................................................................... 7
Consistent Forensic Analysis ..................................................................................................................... 8
Government Support of the time period Forensic Analysis .................................................................. 9
Cloud information ................................................................................................................................... 10
Quite Good Privacy ............................................................................................................................. 10
Government Support of superb Privacy .............................................................................................. 11
Fingerprinting and ID Devices on the Network ....................................................................................... 11
Expenses of protective against Cyber Attacks stay High ........................................................................ 14
Danger sagacity is discriminating, however still in unanticipated stages ............................................... 15
With danger debilitating to quantify, protection remains risky ............................................................. 16
Huge learning dissection ......................................................................................................................... 17
Exchange / Results ...................................................................................................................................... 18
Conclusion .................................................................................................................................................. 21
References ..................
REPORT DOCUMENTATION PAGE
1. Report Security Classification: UNCLASSIFIED
2. Security Classification Authority:
3. Declassification/Downgrading Schedule:
4. Distribution/Availability of Report: DISTRIBUTION STATEMENT A: APPROVED FOR
PUBLIC RELEASE; DISTRIBUTION IS UNLIMITED.
5. Name of Performing Organization :
JOINT MILITARY OPERATIONS DEPARTMENT
6. Office Symbol :
C
7. Address: NAVAL WAR COLLEGE
686 CUSHING ROAD
NEWPORT, RI 02841-1207
8. Title (Include Security Classification): FOREIGN DENIAL AND DECEPTION: MINIMIZING THE IMPACT TO
OPERATIONAL INTELLIGENCE (UNCLASSIFIED)
9. Personal Authors : Major Brian P. Cyr, USMC
10.Type of Report: FINAL 11. Date of Report: 4 February 2002
12.Page Count : 26 12A Paper Advisor (if any): Professor Richard Martin
13.Supplementary Notation : A paper submitted to the Faculty of the NWC in partial satisfaction of the
requirements of the JMO Department. The contents of this paper reflect my own personal views and are not
necessarily endorsed by the NWC or the Department of the Navy.
14. Ten key words that relate to your paper:
Denial, Deception, Network-Centric Warfare, Operational Intelligence, North Korea, Kosovo, Iraq, Analyst,
Counterdeception, Sensor
15.Abstract: Foreign Denial and Deception (D&D) is as old as warfare itself and is still practiced across
the globe today. Both countries and non-state actors use D&D as a means to gain comparative advantage
over their opponents. Indeed, the weaker one is in relation to their adversary, the greater the appeal to use
D&D. Since foreign practitioners have frequently employed denial and deception against the United States,
it is incumbent upon both joint force commanders (JFCs) and their intelligence staffs (J-2) to increase their
knowledge of this asymmetric challenge.
Countering the foreign D&D threat will not be easy. Since we will never be able to completely
eliminate D&D, one must take steps to lessen its impact upon operational art. By defining D&D, examining
denial and deception means & techniques, and looking at various foreign models, JFCs and their J-2s begin
an important step in understanding the adversary. Perhaps the best methodology to “knowledge advantage”
over an enemy remains centered on the human dimension. Increasing D&D awareness, emphasizing a
multi-collection/analytical approach, and incorporating D&D concepts into our joint doctrine, will allow
both the operational commander and his J-2 to not just mitigate foreign D&D, but also to exploit an
opponent’s biases and perceptions.
Currently, Network-Centric Warfare (NCW) has the potential to leave us vulnerable to foreign denial
and deception. While most of the news on this Information Technology Revolution in Military Affairs (IT
RMA) centers around technological development, the importance of NCW's organizational, doctrinal, and
REPORT DOCUMENTATION PAGE Form A ...
Books2Byte – 2002 (Archives)
Write-ups about the following books: From 0 to 1, Software Rules, Successful Talent Strategies, Managing Einsteins, The Bible Code 2
1. www.mca-marines.org/gazette DE15Marine Corps Gazette • December 2012
Digital EDition (intElligEncE)
C
learly defining the roles and
responsibilities of informa-
tion managers and provid-
ing core competency train-
ing is essential to proper employment
of a rapidly emerging warfighting tool.
Information management (IM) is the
latest buzzword, and a variety of tech-
niques are becoming vogue within the
Department of Defense (DoD), as are
the tools with which IM is being con-
ducted. Since emerging on the scene as
a discipline some 15 years ago, IM has
created quite a stir as it attempts to find
a rightful place within the DoD and,
more specifically, the Marine Corps.
We have thrown numerous applications
and publications at the problem without
truly understanding the root of the is-
sue. That issue is that we do not know
what information we are trying to man-
age. Without a better understanding of
that issue, we are chasing our proverbial
tails and establishing a rather elaborate
house of cards that those Marines called
upon to be IM officers (IMOs) have
to contend with, maintain, and man-
age to the ultimate satisfaction of the
commander.
Coming from an application devel-
opment background and armed with
a degree from the Naval Postgraduate
School in information technology (IT)
management, I am well acquainted
with the definitions of data, informa-
tion, knowledge, and understanding.
This seems to be a problem, though,
as in the joint world, the Army defines
them slightly (if not fundamentally)
differently than the IT world, and has
thus caused some translation problems
within the DoD as we refine IM and
the IMO.
At its most fundamental level, data
is disorganized, unrefined, unprocessed
bits and pieces of something that we
have taken an interest in and wish to
make sense of, akin to the letter tiles in
a box of Scrabble. Once we arrange the
letters into words, sentences, and para-
graphs that make sense to us, it becomes
information, and we can then begin
to apply our experience and education
to begin our processing. We and our
fellow subject matter experts (SMEs)
begin to shape the information so that it
eventually becomes knowledge to us as
an organization. Here is where a trans-
formation occurs; as we submit this
knowledge to a superior organization
in our chain of command, it returns to
being nothing more than information to
How Does One
Manage
‘Information’?
Making sense of the information being received
by Maj Randall J. Simmons
>Maj Simmons is a 7588 E/A–6B
electronic warfare officer with an
1802 (tank officer) secondary MOS.
He is currently assigned to the
MAGTF Staff Training Program as
an IMO.
“By wisdom a house is built, and through understand-
ing it is established.”
—Proverbs 24:3
We need to know what information we are trying to manage. (Photo by PFC Franklin E. Mercado.)
2. Report Documentation Page
Form Approved
OMB No. 0704-0188
Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and
maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information,
including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington
VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it
does not display a currently valid OMB control number.
1. REPORT DATE
DEC 2012 2. REPORT TYPE
3. DATES COVERED
00-00-2012 to 00-00-2012
4. TITLE AND SUBTITLE
How Does One Manage ’Information’? Making sense of the information
being received
5a. CONTRACT NUMBER
5b. GRANT NUMBER
5c. PROGRAM ELEMENT NUMBER
6. AUTHOR(S) 5d. PROJECT NUMBER
5e. TASK NUMBER
5f. WORK UNIT NUMBER
7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES)
Marine Corps Gazette,715 Broadway Street,Quantico,VA,22134
8. PERFORMING ORGANIZATION
REPORT NUMBER
9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S)
11. SPONSOR/MONITOR’S REPORT
NUMBER(S)
12. DISTRIBUTION/AVAILABILITY STATEMENT
Approved for public release; distribution unlimited
13. SUPPLEMENTARY NOTES
14. ABSTRACT
15. SUBJECT TERMS
16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF
ABSTRACT
Same as
Report (SAR)
18. NUMBER
OF PAGES
4
19a. NAME OF
RESPONSIBLE PERSON
a. REPORT
unclassified
b. ABSTRACT
unclassified
c. THIS PAGE
unclassified
Standard Form 298 (Rev. 8-98)
Prescribed by ANSI Std Z39-18
3. DE16 www.mca-marines.org/gazette Marine Corps Gazette • December 2012
Digital EDition (intElligEncE)
that organization. Despite the amount
of time devoted to crunching the in-
formation, the man-hours, the educa-
tion required, the experiences gained
to apply our expertise so the informa-
tion assists our organization from our
perspective, the next higher group of
SMEs has not had the opportunity to
apply their education and experiences
to the product, and thus it is not yet
knowledge to them.
The ultimate goal of all we do as
general staff officers is to provide op-
tions for the commanding general (CG)
in order for him to reach a conclusion
and then a decision by which the force
can take action. In order to do this,
the CG must apply all of his educa-
tion, experience, and knowledge to the
resulting product of his small units, in-
telligence collectors, major subordinate
commands (MSCs), and coded staff
sections (G–1 (personnel), G–2 (in-
telligence), etc.). This becomes what
we call understanding. At the highest
level, understanding is the pinnacle of
an organization as it can apply no more
education, experience, knowledge, or
processes in order to make it any more
understandable to that organization.
The head of that organization (the CG
in this instance) can now make a deci-
sion that will be acted upon to satisfy
all or part of his mission. Finally, in
what I describe as the IM continuum or
loop, the resulting actions taken upon
the CG’s decision returns to the lowest
echelons of command as information to
renew the process. Figure 1 explains the
IM continuum graphically.
Collaboration is also a buzzword
and has fast become part of the IM
lexicon, adding to a rapidly building
dictionary of terms of reference that
spans the chasm between IT-types and
the warfighters who make up the re-
mainder of our beloved Corps. Simply
put, collaboration is nothing more than
working together (more salty Marines
may recall this as “gung ho”), and in the
context of IT and IM it means working
together across great distances.
With this construct, we are now able
to address the MSC and staff section as
microcosms of information processors.
The tough nut to crack is how each of
these processors collaborates with each
other and external entities. Currently,
the DoD has called upon Adobe’s ap-
plication, Connect Pro, and Micro-
soft’s SharePoint to satisfy the needs
of the many. As tools, they are as good
as any available; however, they can be
quite the bandwidth hog in an already
tapped network. Adobe Connect Pro
has provided a venue by which leaders
can conduct battle rhythm (BR) events,
share files, and conduct briefings with
voice and visual presentations (sans
video) when a physical meeting may
be prohibitive because of the cost of
travel or the inherent dangers of being in
a combat zone. An additional resource
in the IMO’s stock list is online chat, be
it Transverse, SPARK, Mako, or mIRC
(Microsoft Internet Relay Chat, cur-
rently unauthorized in garrison). These
instant messaging applications allow
for text-based conversations to span
the various networks. However, what
commanders, staff, and information
managers alike must bear in mind is
that the focus must rest on the informa-
tion requirements of the organization
and not the requirements of the tools.
Organizational staff sections were
derived from the Napoleonic paradigm
and have grown as military cultures
have adapted to modern conflicts, add-
ing sections to better suit the uniqueness
of their focus, such as plans and com-
mand and control. The one thing that
has not changed is the stovepipe that
each section has created with regard to
its processes and the information that
gets processed. This is a natural con-
clusion of highly specialized training
and not an indictment of the system.
However, these sections cannot work
independently and must rely upon ex-
ternal information to competently ac-
complish their tasks. For example, the
intelligence section (G–2) must be in
contact with a variety of agencies (Joint
Analysis Center Molesworth, Central
Intelligence Agency, Defense Intelli-
gence Agency, etc.), as well as weather
bureaus and topographical and demo-
graphical data on a country, in order to
give the CG a virtual picture of where he
will be conducting combat operations.
The operations section (G–3) contends
with troop strength and composition,
force structure, supporting arms and
coalitions, battle plans, and contingen-
cies designed to win the fight. Neither
can operate effectively without informa-
tion from each other and should provide
it continually as the G–3 cannot plan
Figure 1. IM continuum.
4. www.mca-marines.org/gazette DE17Marine Corps Gazette • December 2012
properly without knowledge on the area
of operations (AO), and the G–2 cannot
possibly know everything about the en-
tire country but must tailor his product
to the AO. This symbiotic relationship
is shared among the staff sections and
must be cultivated in order to maintain
a healthy operational tempo.
The term for the collection of pro-
cesses that integrate and develop effec-
tive plans is B2C2WG (boards, bureaus,
centers, cells, and working groups). The
B2C2WG contains staff officers and
SMEs who meet at times designated on
the BR and smooth out the grinding of
gears that inevitably takes place as plans
are made and we encounter the enemy
and environment. Groups, such as the
fires and effects coordination cell that
have focus groups (such as the targeting
huddle, targeting steering group, and
the targeting working group) and the
aviation support working group, meet
to further support the ground scheme of
maneuver and prosecute the air tasking
order (ATO), just to name a couple. The
BR is complex but structured and “cal-
endar designed” to meet mission goals.
It must remain adaptive to changing
situations but static enough to attenuate
a rather disorganized combat environ-
ment and prevent surges and lulls in
the operations cycle.
The IMO has been tasked with the
nebulous duty of managing “informa-
tion,” but without guidance and experi-
ence his job is nearly impossible. The
foundation that the IMO must have is
experience with how a staff commu-
nicates and what type of information
goes into, through, and out of the staff
sections. (In my opinion, this requires
a field grade officer at the MEF and
division levels.) He must have a work-
ing knowledge of their processes so he
may improve upon them and attempt to
reduce the instances of redundancy and
waste. Further, the IMO must maintain
cognizance of all BR events, especially
the B2C2WGs (and their 7-minute
drills), that populate the BR calendar.
To achieve this goal it is imperative that
each section maintain its standing oper-
ating procedures (SOPs) and utilize the
IM representative (IMR) each section
should assign to provide advice to the
IMO. If a section fails to keep its SOPs
current and relevant, then the SOPs
are nothing more than a publication
of stuff, and not very interesting stuff
at that.
The final slice of the IM pie consists
of the applications that the staff sections
require to do their jobs. While the IMO
does not choose these applications, he
must have the awareness of how they
fit into the conduct of the CG’s guid-
ance and how they support the mission.
He must be able to provide advice in
choosing the right application. Appli-
cation software is written to perform a
specific task or function, and it becomes
increasingly difficult to make a one-size-
fits-all program, but that does not stop
us from wanting them. Theater battle
management core systems (TBMCS)
is such a system used to prosecute the
air war and facilitate the creation of the
ATO. Prior to the launch of TBMCS,
there were three applications required
to do the same thing (force, unit, and
intelligence). This is merely an example
of a complex application that the aviation
combat element required to perform its
part of the mission. The IMO must be
aware of how to configure and make
TBMCS available to the user audience.
He must do this with other such sys-
tems that support other staff sections
(advanced field artillery tactical data sys-
tem, common logistics command and
control system, command post of the
future, command and control personal
computer, information operations system
v1, etc.), and he must provide the means
for stakeholders to coordinate their ef-
forts with these systems (and by the word
“systems,” I refer to the suite of applica-
tions, not the network) and execute their
mission. The most crucial part of this
aspect is that the IMO is not there to
automate their jobs but to provide a tool
with which they can perform their jobs
more effectively and efficiently.
Now that we have a more concise
look at the information that the IMO
has been tasked with managing, we can
begin to codify how he will go about do-
ing so. While each command is unique
and brings with it a wealth of knowledge
and experience that can be applied to
the mission, categories emerge that pro-
vide a path that the IMO can follow to
make the staff function more effectively
and efficiently in providing the CG the
information he needs in order to make
decisions that accomplish his mission. I
belong to a group of stakeholders within
the Marine Corps that is working this
issue and providing more clearly de-
fined roles and responsibilities for the
IMOs of the Operating Forces and has
recommended numerous solutions to
the IM collective, such as following the
command and control roadmap and
applying the use of common data, virtu-
alizing machines for all software (using
one computer/server, but dividing it into
logical segments), and standardizing
training across the enterprise. This last
piece, training, is critical and one that
must be bought into by senior leader-
ship so that the IMO does not become
simply an ISMO (information systems
management officer) on steroids. There
must be a clear distinction between the
G–6 (communications) world and the
IMO. The IMO works for the chief
of staff for a specific reason as he is
the enforcer of the CG’s guidance and
provides a crucial service to the staff
that leverages the product that the G–6
provides but goes the further step to
facilitate collaboration within the staff.
As with our civilian counterparts,
when it comes to informational needs
of any organization, we must first define
the requirements; to Marines this is the
mission. This is the foundation of IM
and must be clearly understood by all
parties. Operations orders, fragmentary
orders, and subsequent tasking define
the force structure, roles, and respon-
sibilities of the command. Each MSC
and staff section must then develop,
author, and publish SOPs that codify
all processes, information exchange re-
quirements, billets, duties, and required
inputs and end products; further, these
SOPs must be completely understood by
all members of their respective sections
as this is typically the first symptom of
communications breakdown. The pro-
cesses in the SOPs are what the IMO
has awareness of and should be his point
of reference for his IMRs whenever is-
sues arise.
Next, the IMO must generate a plan
for information lifecycles as they per-
tain to the command and the mission,
meaning limit the use of shared drives.
5. DE18 www.mca-marines.org/gazette Marine Corps Gazette • December 2012
Digital EDition (intElligEncE)
These are dinosaurs in the IT world and
cause many lost man-hours as Marines
search for some document in the endless
forest of subfolders. They must be con-
stantly aware of how old documents are,
updating or deleting them as necessary.
Additionally, the IMO must develop a
plan for the unit website to facilitate
the ease of communications across the
command and to provide access to SOPs
and information that is needed and may
need to be provided to other entities.
Current best practice is to follow a
three-click rule (meaning you should
be able to find what you are looking for
in three mouse clicks). In this respect,
less is more and simpler is better. Re-
sist the temptation to fill up your sites
with photos or graphics as they do little
more than increase the aesthetics of the
page and tend to increase the wait time
as pages load; instead, use links that
open separate windows for such things
as maps and charts. The CG’s portal
must contain commander’s critical in-
formation requirements and requests for
information, items that the boss needs
to have at his fingertips when he has
time to visit his computer. Numerous
examples exist of CG dashboards that
are functional as well as chocked full
of feng shui, technically speaking that
is.
Publish a use matrix of all systems
utilized by the command and provide
user guides when available. Link these
to your Annex U (IM) of the operations
order and keep the links current. Do the
same with whatever chat application
you use. Provide chat moderators within
each section who are responsible for
oversight of the chat rooms, and publish
a chat room matrix that clearly defines
who should be communicating in what
room. Links to the applications should
be provided on the SharePoint site as
well so access may be attained via the
sections portal and easily maintained.
Keep your IMO working group ac-
tive and relevant. Assign tasks to your
IMRs that require them to involve their
section chiefs or officers in charge to
keep the SOPs up to date. Solicit their
feedback on IM issues, such as process
improvement and communications
issues. Visit the staff leads (i.e., G–1
actual) to discuss ways to improve cross-
section collaboration. Are they able to
give and receive info easily? Can they
find what they need on the SharePoint
site? Is the site too complicated or too
busy? Are any links broken? Always
seek self-improvement as well as staff
improvement.
As best as possible, provide links to
outputs from all sections and MSCs
as this gives others opportunity to re-
view the span of knowledge across the
command and makes for a better access
point when a staff section needs infor-
mation. This acts also as the command
library and is more easily maintained by
those tasked with care and maintenance
of critical documents. Allow each sec-
tion to have its own SharePoint site, but
review them and keep them maintained
in accordance with Marine Corps and
DoD policy as well as CG’s guidance.
Changes should come through the IM
working group and have the IMO as
ultimate authority over content and ac-
cess.
Conclusion
The Marine Corps has taken dra-
matic steps on the IM path and appears
to be headed in the right direction but
runs the risk of sliding down the slip-
pery slope of marginalizing the IMO
by making him the whipping boy when
a section does not understand or follow
their SOPs. Reducing the importance
of the IMO to little more than a Share-
Point administrator is an enormous pro-
fessional faux pas that must be avoided
as it can lead to sections reverting back
to stovepiping information and slowing
down the decision cycle that the CG
relies upon to succeed in his mission.
The information that a command has
available is overwhelming when taken
as a whole and must be digested in less
than elephant-sized chunks, or it will
be impossible to function as a staff. The
IMO plays a critical role in streamlining
how information flows into, through,
and out of an organization by provid-
ing the resources each section needs to
perform its tasks. Long gone are the
days of waiting for mail and carrier pi-
geon. Now we have e-mail, chat, and
SharePoint. But even these are nothing
more than venues. The IMO helps a
command make sense of the informa-
tion flowing through them and provides
tools to make the command’s work sim-
pler and less time-consuming.
Face-to-face discussions can lead to a better understanding of processes and SOP develop-
ment and currency. (Photo by LCpl D.J. Wu.)