Title: The Global Context
1(No Transcript)
2The Global Context
- We are a nation at war
- This is a prolonged period of conflict for the US
with great uncertainty about the nature and
location of that conflict - We must be able to defuse crises and/or defeat
aggression early, at home and abroad, to prevent
escalation, and limit damage - Thus, we need flexible, rapidly deployable forces
and sufficient depth and strength to sustain
multiple, simultaneous operations
3Transforming the Army
- Restructuring Elimination of Cold War structure
- Trading Information For Armor Makes C4ISR Key
- Mobility and Agility in Size and Mission Diversity
Decrease
Increase
- Military Police Units
- Transportation Units
- Intelligence Units
- RSTA/HUMINT Units
- Civil Affairs Units
- PSYOPS Units
- Biological Detection Units
- Field Artillery Units
- Air Defense Units
- Engineer Units
- Armor Units
- Logistics Units
2004-2009
Smaller, Quicker, Smarter
Most Ambitious Army Restructuring in 50 Years
4INTEL Changes
Future Force
Current
Single INT Sensors
Multi-INT Sensor Capability
Correlation/Fusion of Multiple Sensor Data Inputs
into a Single Output
Minimal Integrated EW Suites Multiple Data Outputs
Vertically and Horizontally Integrated Sensor and
Net-Centric Enterprise Architecture
Platform Centric, Stove-Piped Sensor Architecture
Lengthy Sensor-to-Shooter Processing
Real Time Sensor-to-Shooter Decision Process
Timely Red, Blue and Grey SA at all Levels
Limited Red Force Picture
5Intelligence Reform Act of 2004
INTELLIGENCE COMMUNITY, APPARATUS, AND RD
6Historical Legislation
Intelligence Reform ActGeorge W. Bush2004
National Security ActHarry S. Truman 1947
EO 12333 Ronald W. Reagan 1982
COLD WAR
NSA 1952
NRO 1960
Goldwater-Nichols 1986
Department ofHomeland Security 2002
7- The debate over Intelligence Reform rapidly
devolved into the typical issues
8What are the Implications of the Intelligence
Reform Act on Us?
America's intelligence agencies must work
together as a single, unified enterpriseunder
this new law, our vast intelligence enterprise
will become more unified, coordinated and
effective. President George W. Bush
S.2845 H.R.10
9Executive Summary
- The law creates a Director of National
Intelligence (DNI) - The law also creates a National Counter-Terrorism
Center (NCTC) - The law also extends to the DHS and TSA more
funding and authority to use ISR capabilities
10Director of National Intelligence
- The DNI will have broad strategic authority over
budgets, personnel and missions. - The president's principal adviser on intelligence
matters - Leads a unified intelligence community
- Determines and controls the annual budgets of US
intelligence agencies, including the CIA, DIA,
and NSA - Has the authority to order the collection of new
intelligence, to ensure the sharing of
information among agencies, and to establish
common standards for intelligence personnel - Appointed by the President with the consent of
the Senate
11DNI (contd)
This director will not abrogate the statutory
responsibilities of the Department of Defense
- The DoDs "statutory responsibilities" for
intelligence cover the personnel, operations, and
budgets of the DIA, the Services, NRO, NGA, and,
most critically, the NSA, the largest US
intelligence apparatus - These activities comprise about 80 of the US
Intelligence Community's budgets, and 7 of 15
agencies - In short, this "reform" bill places about 80 of
the entity that's being reformed outside the
control of the NDI
12National Counter-Terrorism Center
- The National Counterterrorism Center (NCTC) will
direct terrorist-related intelligence gathering
and counter-terrorism operations for the United
States - Authority to plan intelligence and
counterterrorism operations - No authority to tell civilian or military
agencies how to execute those missions - an
important distinction for military commanders who
do not want conflicting signals coming from the
NCTC and their bosses at the Pentagon
13Border Security
- The law includes many provisions to strengthen
border security with ISR capabilities - The DHS will begin testing a pilot
border-security program along the US - Canadian
border, and another along the southwestern US
border - The law permits testing of advanced technologies,
such as sensors, video, and unmanned aerial
vehicles, for broad area systematic surveillance
between ports of entry
14Opportunity for ST
Key Sections of Law that Could Also Influence
Our RD Investment Strategy
- Sec 1016 Information Sharing
- Sec 1019 Analytic Integrity
- Sec 1020 Safeguarding of analytic objectivity in
intelligence analysis - Sec 1051 Service and national labs and the
intelligence community - Sec 1052 Open Source intelligence
- Sec 1053 National Intelligence Reserve Corps
- Sec 4013 Deployment and use of detection
equipment at airport screening checkpoints - Sec 4014 Advanced airport checkpoint screening
devices
- Sec 4020 Checked baggage screening area
monitoring - Sec 4021 Wireless communication
- Sec 4024 Improved explosive detection systems
- Sec 4026 MANPADs
- Sec 4029 Extension of TSA funding
- Sec 5201 Border Surveillance
- Sec 6906 Viruses
- Sec 6907 Interception of communications
- Sec 7108 Promotion of free media
- Sec 8402 Enterprise architecture
15- Where Do We Go From Here?
16The Road Ahead
- Integration/Fusion/Information Management is Key
- A holistic approach to advanced RD and systems
development is a necessity - Information and data moving at the speed of
analysis must now be moved at the speed of
warning - Specific information that could lead to the
identification and apprehension of a terrorist
must flow unimpeded from the most classified and
integrated data bases to the solider in the
foxhole or the patrolman making a routine traffic
stop - Refocus on the Human Being/Soldier
- Asymmetric warfare increases human to human
interaction - 70 of all intelligence in OIF/OEF has been
HUMINT derived - Human brain still our most vital decision-making
tool
17The Road Ahead
- US intelligence requires a special effort to
focus future development on capabilities that are
not only advanced, but a leap into areas unknown
or insufficiently understood by our opponents and
targets - HPC and quantum computing
- Tremendous implications for real-time processing
and analytics - Nanotechnology offers new ways to get closer to
targets - Undetected penetration
- Labs on a Chip" to provide long-term detection
of biological, chemical, radiological, or other
weapons of mass destruction - Miniature cameras for real-time video used in
precision targeting - Maxwell's Rainbowreferring to the spectrum
beyond the visual and electromagnetic
bandsprovides thermal, atomic, and other MASINT
signatures
18The Road Ahead
- Intensify cooperation and collaboration with
Industry and Academia - "Breakthrough" scientific advances may occur well
away from the traditional, large,
government-supported labs and research
establishments - Increase Entrepreneurship
- More Experimentation, QRC, and Tech Insertion
- Refocus ST on the kinds of activities it has
historically done wellspecifically, serving as a
skunk works to field new technology faster
19The Road Ahead
- Strengthen core competencies
- Although the CIA is the best known member of the
Intelligence Community, the bulk of the nations
intelligence effort is undertaken by the
intelligence agencies of the Department of
Defensethe distinction between strategic and
tactical ISR systems gradually has melted away as
military requirements shifted from the nuclear
and conventional threat posed by Cold War enemies
to more diverse dangers arising from rogue states
and terrorists. - Report for Congress, CRS, Library of Congress,
Dec 6, 2004 - Boldly go where no scientist has gone before
- ONS/Capability-based vs. lab coat research
- RDECOM FAST teams
20The Road Ahead
- Change the mindset and culture of our combatant
commanders and warfighters to better understand
EW - EMS is another battlespace on par with land,
sea, air, and space. - EW 2005 Roadmap, CJCS/USD(ATL)
- 3 of Top 10 OIF/OEF shortcomings are EW related
- C-RCIED
- Counter-Media (PSYOPS)
- MANPADs
- Boost the declining skilled EW workforce Note
The NSA is hiring! (7,500 slots!) - IO Security Dont allow modularity, agility,
COTS and net-centric warfare to become an
Achilles heel
21Will It Work?
NDI
22Pete Drucker Presidential Medal of Freedom
Recipient