Don't wanna be here? Send us removal request.
Text
Technology, Innovation, and Modern War – Class 12 –The Space Force– General John Raymond
We just held our twelfth session of our new national security class Technology, Innovation and Modern War. Joe Felter, Raj Shah and I designed a class to examine the new military systems, operational concepts and doctrines that will emerge from 21st century technologies – Space, Cyber, AI & Machine Learning and Autonomy.
Today’s topic was The Space Force and Modern War.
Catch up with the class by reading our summaries of the previous eleven classes here.
Some of the readings for this week included: CRS Report on Space Force, Summary of the Defense Space Strategy, Space Force’s Capstone Doctrine “Space Power”, State of the Space Industrial Base 2020, Space as a Warfighting Domain, Russia gears up for electronic warfare in space, Chief of Space Operations Planning Guidance
Our guest speaker was Gen. John Raymond, Chief of Space Operations, United States Space Force.
It’s amazing to think that it’s been 75 years since the U.S. created a new service, which was when the Air Force spun out of what was the Army Air Force post-World War Two. The creation of the Space Force is an indication of everything we’ve been talking about in this class – about the changes in technology and threats, the speed at which those are happening simultaneously and the new organizational models needed to counter them.
I’ve extracted and paraphrased a few of General Raymond’s key insights and urge you to read the entire transcript here and watch the video.
Formation of the Space Force Last year, the President signed the National Defense Authorization Act, which is the birth certificate, if you will, for the United States Space Force. And I’ve been privileged and honored to lead that group of folks, some very sharp space professionals in establishing this force. There’s no checklist on how to do this. There’s really no history to go back to. But we are moving out with great speed, to be able to establish this force.
Why do we need a Space Force? The strategic environment we face today is rapidly changing. And the nature of warfare is changing. We’ve been involved in the space business in the military since the 1950s when space was a great power competition. And what started out as nation state versus nation state has evolved to where we have students building satellites. We started developing capabilities as part of that great power competition with the Soviet Union. I’ll highlight a few demarcation points where I think there was some significant shifts.
Desert Storm and Space In 1991 we went to war in Desert Storm to evict Iraq out of Kuwait. And that really was the first space war. It’s the first war where space was integrated into theater operations. The U.S and coalition forces did a left hook through the desert at night on a featureless terrain to maneuver against the adversary. And the way we did that was using a GPS constellation that wasn’t even fully up and operating. Iraq was also launching Scud missiles and we used Strategic Missile warning capabilities that we have (in space) to detect ICBMs, and we used them to be able to give warning of these smaller rockets.
Since that time my whole career has been focused on integrating space capabilities and everything that we do as a joint and coalition force. And today there’s nothing that we do that isn’t enabled by space, whether it’s humanitarian assistance, disaster relief and all the way up through conflict.
China’s Anti-Satellite Demonstration The next demarcation was 2007, when China launched a missile that blew up one of their own satellites into about 3000 pieces of debris. That was the wakeup call that space may no longer be the peaceful, benign domain we hoped, or we wished it would be. It was no longer just using our space-based capabilities and integrating those capabilities into operations. Now we had to worry about protecting and defending those capabilities. Everything from jamming of GPS and communication satellites, to laser threats, to on orbit activities, to cyber threats, to missiles that can be launched from the ground that that can blow up a satellite.
Defending Space – Part 1 – Space Command Because of this changing strategic environment, the United States over the course of the past few years has been in a dialogue on what’s the best way to organize for space.
Space had long been part of the Air Force and the thought was, we really need to elevate space to a level commensurate with its importance to national security. In the Department of Defense, we’re organized two ways. One part of the organization -the eleven combatant commands – are focused on warfighting. There used to be a command called U.S. Space Command, but it was stood down shortly after 9/11 and the responsibility for space moved underneath U.S. Strategic Command. In August 2019 we reestablished Space Command as its own combatant command.
Setting up Space Command as its own combatant command was one part of that equation. And I was privileged to plan it and then be its first commander.
Defending Space – Part 2 – The Space Force A few months later, in December 2019, the United States decided to elevate what we call the “organize, train and equip” part of the military. That’s what services like the Army, Navy, Air Force, Marines and now the Space Force do. And space moved from underneath the United States Air Force to become its own independent service. I served as both the Commander of U.S Space Command and was the The Space Force chief until August 2019, when we split the hats and now there’s a new commander for U.S Space Command, and I’m solely focused on the organize, train, equip, part – the Space Force.
As a Dual-hatted Commander it Must Have Been Fun Writing Memos to Yourself It’s interesting when you’re dual-hatted as a service chief and a combatant commander, you get to write yourself a letter saying, hey, dummy, why did you do that? And so it’s kind of fun. But a combatant commander has a much more narrow, short-term focus. He or she has to conduct operations today. A service chief tends to think longer. I want to build the service for the future. And that tension between near term and future is why that structure in the Department of Defense is so important. Where you have two different, two distinct functions, that provides a healthy tension.
In the stand up of the U.S. Space Command and the Space Force, I think Congress got it exactly right, when they said that the commander of Space Command could be the service Chief for up to a year. Because when we were standing these organizations up, I was able to make organization or enterprise level trades between the two organizations. And it was much easier. And now that we have those structures built and we have the staffs designed, almost all those trades are done. Now it’s time to split those hats and get two distinct four stars with separate focus running fast.
Organizing the Space Force as an Independent Service Let me give you a few thoughts on what an independent service needs to do and some of the things we’re thinking through.
There are five things we have to do to set up Space Force:
Developing our own people is a big piece of what we’re focusing on. We’re inventing this service, because we don’t want to just build what we had, we want to invent something new, that’s purpose built for this domain, to be able to get after the challenges that this domain provides us.
We have to have our own doctrine. And so we just published our first independent space force doctrine called “Space Power.”
We have to have our own budget. We took all the dollars that were associated for space from the Air Force and brought them into the space force.
We have to design our forces to be able to operate in a contested environment and to reduce duplication of effort, enhance our speed and reduce costs.
We have to present those forces to a warfighting commander.
There are several lines of effort that we’re focusing on:
We’re working to build the Space Force as a very Lean and Agile service. We don’t want to be big and slow, we want to go fast. The domain that we operate in is huge, it’s 100 kilometers above the surface and higher. And so that vastness of space and the speed at which things move is significant.
We also want to be able to build capabilities at speed and acquire capabilities at speed.
We’re developing this service as the first digital service; to have a digital headquarters, a more fluent digital workforce. Everybody that comes into the space force will learn coding and adopt digital engineering standards as our as our standard for acquisition.
We’re also focusing on partnerships. We believe that with this service, we can develop closer ties to our allies around the globe and to commercial industry, and be on the cutting edge of innovative industries going forward.
We need to develop space experts that understand how to operate in the contested domain. Today, we’ve got the world’s best space operators, but train them to operate in a benign domain. We’re shifting to train them to operate in a contested domain.
How Did You Organize Space Force Staff Functions? The plan was to have over 1000 people on the staff. I thought that was going to be too clunky, too big and too slow. We’ve whittled that staff size down to less than 600. However, having said that, you have to be able to operate inside the Department of Defense. And there’s overhead that’s required just to be able to do that and to do that well. You need somebody to be able to pick up the phone and be able to understand who they’re talking to. And you don’t want to get too different so that people don’t know how to plug into you. So we came up with critical functions that we had to have to operate inside the Department of Defense.
For example, if you’re going to be a member of the Joint Chiefs, you have to have a three-star that can interact for you on your behalf with the other services. And so we stood up a three-star called the S3, so everybody understands that nomenclature inside the Pentagon. We have a hybrid approach where we have the S3 bit combined with some other functions, because we wanted to have a reduced leadership structure, so we made it the S2,3,6 and we call them the Chief Operating Officer to drive a different mindset for that position.
We’ve done the same thing on the resourcing side. And we’ve done the same thing for our human capital development where we have a hybrid approach. And then we also stood up a Chief Technology and Innovation Officer and made that a direct report to me as well. That’s the leadership team.
What’s the Role of the Space Force in Promoting Positive Norms of Behavior in Space? Space is a warfighting domain just like air, land and sea. We do not want to get into a conflict that begins or extends into space. We want to deter that from happening. We are working to develop norms of behavior to address what is safe and professional behavior in space. We want to develop those by demonstrating good behavior on how we act. We’re very transparent, we share data broadly across the globe.
A lot of people talk about space deterrence. I just talk about deterrence – the calculus of imposing costs and denying benefits. All combatant commands have a deterrence role, U.S. Space Command does as well in the capabilities that we provide, help feed into that deterrence.
How Will You Bring in Talent from Commercial Companies? We’ve developed a human capital plan that’s really innovative. We want to be able to bring people in from industry, laterally into the service. We want to be able to send people from the Space Force and have them go work at a company and come back. We want to do things differently. There are a lot of authorities that that we have that are underutilized; we want to use all of them.
Our first 10 months have been about building the processes to get people into the Space Force. On 20 December 2019, when the President signed the law, I was the first one. And then we got a command senior enlisted advisor, that was number two. Next, we got 86 cadets coming out of the Academy. That made 88. And then we held boards and who at the Air Force is going to apply to come in? We had ~ 9,000 applicants for 7,000 positions. Now we’re looking at doing the innovative pieces. This human capital plan will be the model for others going forward. We built the plan, we built the strategy, and now we’re focusing on implementing that.
How are You Tackling Classification? Classification is an issue that we’re working through. Space has largely been in the classified realm. In my opinion it is overly classified. And we’re working hard to develop a strategy. If your goal is to deter conflict, you want to be able to message any potential adversary to be able to change their calculus. It’s kind of hard to do that when you can’t talk about things.
What is the Space Force Doing Differently in Innovation- With Commercial Partners and Internally? First, one of the big things we’re doing is adopting digital engineering as our standard. And it’s more than just the digital engineering of the thing. It’s all the way from requirements, to acquisition, to developing the capability, to testing the capability, to operating the capability. We want to have that digital thread.
We’ve worked hard over the last couple years to expand our defense industrial base. I’m not saying that the partners that we have aren’t good. They provide great capabilities, but we want to expand that. The work we’re doing with what we call SpecOT is trying to get others involved.
We are looking to build a Space Systems Command that will have disruptive innovators sitting side by side with more traditional innovators. We think there’s room and value for all. If you look at the domain and where it’s headed, and where industry is headed, there are a lot of opportunities to come up with a hybrid type of architecture. Not just a one size fits all. And we think expanding that industrial base is going to be important to us.
We’re also looking at developing a relationship with industry that is closer than the relationship that we have today. That’s going to require some different rules for operating under. We’re really focusing on pushing decision-making down to the lowest level. I want folks managing their programs, not managing the Pentagon bureaucracy. We’re really trying to delegate down to the lower levels. And if we do this right that will be another model for others to emulate.
One of the things that you can’t do: You can’t go out and kill somebody for making a mistake. We want to be able to fail forward. And we want to be able to move at speed. I think you have to do that in a domain that’s so big and where operations happen so fast.
How Does the Space Force Approach Cybersecurity? One of those threats on that spectrum of threats is a cyber threat. And so if you look at who we’re bringing into the space force, one of the career fields that we’re bringing in are cyber professionals. We need to understand the cyber terrain to be able to operate in this contested domain. We’ve actually integrated cyber professionals on our operations floors as part of our crews to be able to protect our ability to operate. We’ve really put a lot of focus on this over the last few years to harden ourselves from any kind of cyber threat. And it’s a constant, constant vigilance thing for us. And it’s something that we take very seriously.
What Did you Think of the Netflix Show About Space Force? No matter what you think of the show, it shows the excitement and the imagination that is going across the country about space. I think it’s going pay dividends for us. Again, it’s not just about military space, it’s about all the different sectors of space.
When I was a little kid, I remember sitting on the living room floor in West Point, NY, where my dad was a teacher and watching man first walk on the moon. And then going to the dining room table and building Apollo models. I think that with what we’re seeing, there’s going to be this enthusiasm for space that is going to help our country. If you look across the board at schools, the schools that I have engaged with over the last few months, they’ve all told me that their interest and their applications for space types of engineering things have gone up. So I think there’s value there for our country.
How Receptive Are the Other Services to Reimagine and Fix Old Organizational Structures? First of all, we’re just beginning, we’re just creating this. It’s probably a little early to say what have you built that others our now are emulating. For example, when we did the organization for Space Force, we collapsed two layers of command. I know there’s value to us already.
And you’ll hear the department talk a lot about JADC2, joint all domain command and control. The data part of that was designed and built by the Space Force that has now been integrated into JADC2.
And if you look at the challenges that we face in the space domain today, they’re largely Big Data challenges. We track 20 or 30,000 objects in space and probably a half a million objects that we don’t track because they’re because of their size. A small portion of those are actually satellites. Though that number is growing significantly with these proliferated LEO constellations. We take 400 or so observations a day to make sure that nothing collides with other space objects, and we keep the domain safe. Those are all big data challenges. And so we’ve spent a lot of a lot of time building the data infrastructure.
How Can Students Get Involved in Space? As we’re building the service, if anybody wants to do a research project, I can give you a laundry list of topics where we could really use your brain bytes to help us think through. And I think when you graduate, I think there are plenty of opportunities to get into the space business, including through commercial segments that traditionally haven’t been involved in the space business.
We’d love to have you in the Space Force. A lot of parents come up to me and say, “I wouldn’t want my son or daughter to join the military, but I want them to join the Space Force.” And we think there’s an opportunity to tap into a broader population. I’m excited for the opportunity to build a relationship with Stanford and other schools.
Read the entire transcript of General Raymond’s talk and watch the video below.
youtube
If you can’t see the video click here.
Lessons Learned
Historically the U.S. treated space as a safe haven for the few exquisite, billion-dollar national assets that we owned (imaging, communications, navigation) that no one else could approach
They became the backbone of how our DoD functions
Space is now a contested domain
Potential adversaries have targeted all our existing assets
Space Force was started as a separate military service to own everything 60 miles above the earth
It is trying to do things differently, building a lean and agile organization
Flatter organization, with a COO and CTO
Deeper partnerships with commercial providers
Space Force has the excitement of NASA, but with the mission focus of keeping us safe and secure at home
In an existing organization, when you when you have something disruptive and new almost everybody wants to strangle it in its crib
General Raymond has managed to thread the needle to make this a service
0 notes
Text
Technology, Innovation, and Modern War – Class 11 – Cyberwarfare –– Sumit Agarwal
We just held our eleventh session of our new national security class Technology, Innovation and Modern War. Joe Felter, Raj Shah and I designed a class to examine the new military systems, operational concepts and doctrines that will emerge from 21st century technologies – Space, Cyber, AI & Machine Learning and Autonomy.
Today’s topic was Military Applications of Cyber.
Catch up with the class by reading our summaries of the previous ten classes here.
Some of the readings for this week’s included:
DoD Cyber Strategy, How to compete in cyberspace, Defense Primer: Cyberspace Operations, Geopolitical Impact on Cyber Threats from Nation State Actors, Divided by a Common Language: Cyber Definitions in Chinese, Russian and English.
Our guest speaker was Sumit Agarwal, former Deputy Assistant Secretary of Defense and Senior Advisor for Cyber Innovation. Out of MIT, Sumit joined the US Air Force as part of Cyber Command and was one of the first officers in network warfare. He’s spent almost 20 years in the National Guard. But in the private sector he’s done a number of amazing things; he headed up mobile at Google, then went back into the Pentagon where he was the youngest Deputy Assistant Secretary of Defense ever in the Pentagon. Then most recently, he co-founded Shape Security, one of the leading cybersecurity companies in the country. Earlier this year, Shape Security was sold to F5 for over a billion dollars.
I’ve extracted and paraphrased a few of Sumit’s key insights and urge you to read the entire transcript here and watch the video.
Safety and Security Online The way we are going about creating safety and security online in cybersecurity and defending against cybercrime isn’t quite rational. In cybersecurity, any individual, any business of any size, from a small business all the way up to a giant bank, is at the end of the day subjected to the worst that adversaries of any sort – foreign nations, organized criminal gangs – can throw their way. And that makes no sense.
The thinking about online security is absolutely at odds with how we think about security on the land, sea, air and space. Our Army, Navy, Air Force defend our borders. So the result of no defenders in cyberspace is what one would predict. It’s a mismatch. The result is that we are less secure. You end up with companies that are losing more money online, losing more assets that belong to them and more customer data that they’re in trusted with, than they would ever lose in an offline context. And so that’s a really strange thing in the domain that we created, we are having a harder time safeguarding and securing ourselves than we do in the national domains.
I think that it’s a matter of understanding who has the authorities and the norms to defend. Who has the right to defend? Who has the obligation to defend? So that was my thesis when I left the Pentagon in 2011.
How Would You Architect a More Secure Environment? It’s not okay the way it is. it’s as if the military said, “Hey, we protect U.S. citizens as long as they’re hanging out on a military base. I’m sorry, but if you’re not on a military base, you are totally exposed to any form of threat that can possibly exist in the world.” That is absurd in the real world.
I think that there are two or three fundamental components to it. The first one is, we as a society have spy agencies like NSA that have the preponderance of cybersecurity expertise and capability. At the national level, there really are not a lot of other agencies that have that level of expertise. What you end up with is a choice that we as a society have been unwilling to make. Which is, do we let a spy agency safeguard us domestically at home on the internet? Or do we say, it’s the DHS, the Department of Homeland Security who is the only one chartered with the mission and has the authorities to safeguard U.S. persons or people at home?
That choice is profoundly broken because DHS does not have the necessary level of capability. So with the benefit of hindsight, I think what we need is an agency that has every bit the level of technological expertise that NSA does in the area of cybersecurity, that is not a spy agency. And that agency would need to have the titles and the authority, and the charter to protect U.S. persons. And you see that same dichotomy in the FBI versus the CIA. The CIA is externally facing, it’s effectively a spy agency. FBI is all about domestic issues that exist primarily at home. So that is a very clear, bright shiny line, which we didn’t really realize in the ‘80s and ‘90s, was going to become such a problem. But at this point, we have two unpalatable choices. You can let a spy agency be in charge. Or you can let DHS which has the charter be in charge but doesn’t have the expertise. And so what you end up with is no defense. So that’s what I would do at the national level in terms of creating an agency and organizing things differently and better.
On the second piece, which is how do you create a little bit more clarity between what’s real and what’s fake? That is very challenging, because anonymity is a key, cherished belief system and value online. We all prize privacy and anonymity. So if you swing the pendulum over to say, we would have a lot more secure online experience if everybody had a hard identity. And you needed to basically jack your driver’s license into a little key card reader in order to get online, you would have a more secure environment. (A CAC card for civilians.) You would have a lot less vitriol, you’d have a lot less trolling, you’d have a lot less of the nasty things that we don’t like online, including crime. But what you would lose is anonymity and privacy. A CAC card is what we use in the military.
I’m not sure if there’s a good answer to how would I balance the reality that it’s a totally insecure, wild, wild west on the Internet, with the idea that the privacy and anonymity of the Internet, in many countries, is really important. It’s allowed the Internet to be a tool of great good, not just great bad.
What Trends Are You Seeing That Attackers Are Doing? Attackers are always going after the softest targets. So in many ways, the softest target is everybody in society. The people who are least capable of defending themselves against sophisticated attackers are not the large corporations that have billion-dollar cybersecurity budgets, that have IT staffs and teams of professionals. It’s either small businesses, or individuals.
The number one thing that we see attackers doing is emulating real people. This is my work in identity and the idea of real versus fake on the Internet. You know, in 1993, there was that old New Yorker cartoon with the dog logging onto a computer and it said, “On the Internet, no one knows you’re a dog.“ But ironically, 27 plus years later, on the Internet, no one knows if you’re Joe dot Felter at Gmail, or Raj Shah, at diux.co, or whatever.
Identity and Truth on the Internet. Online you can be almost anybody you want to be. And it is so easy to social engineer, to phish, to put malware on someone’s machine and to gain access to the things that represent their identity. If you know someone’s username and password, you’ve effectively got their identity. There’s no holographic mark in the upper left corner. There’s no signature in the background, there’s no watermark, there’s no special place that can validate those photos. I mean, it’s literally less secure than college kids cutting photos out to get into bars with identities that don’t belong to them on a driver’s license. It’s that insecure.
And so amazingly, the Internet still works despite this profound lack of true security. But the trend that I always follow is, how do you tell what’s real from what’s fake? Is the thing interacting with you a human or a nonhuman? So much of what criminals do is really about writing programs and bots that simulate human behavior to do human-like things. They then use those stolen identities to have what is truly a fully synthetic actor.
It’s a little bot that has some aspect of your identity, and it will run around on the Internet trying to log into something or trying to represent itself as you. And the impact of this is far worse than the economic harm of losing $1,000. Banks are probably losing hundreds of millions of dollars on a quarterly basis. No consumer knows about it, because those funds are silently put back. No bank wants you to know how porous the banking environment is. They simply want to absorb those losses so that you don’t lose confidence. And that’s actually okay from a societal point of view.
Coordinated Inauthentic Behavior A far worse aspect of the usage of synthetic identities is what we call Coordinated Inauthentic Behavior, CIB. For example, bad actors getting on Facebook, Twitter or TikTok and creating what appears to be a groundswell of activity and effort and belief around a particular ideology, a particular idea or a concept, none of which are true.
Even right now in our election there is coordinated inauthentic behavior that is pushing ideas and concepts that are driven by actors that are trying to interfere in our election. (In 2016, it was absolutely rampant. There’s less of that happening in 2020.) So what happens when there’s interference by Coordinated Inauthentic Behavior? When there are millions of actions, likes and posts and clicks and forwards that are inauthentic, you end up with a perversion of democracy. So this idea of real versus fake is incredibly pernicious. And it’s something that I think, is worthy of a lot of time and attention by anybody that that wants to pursue a career in cybersecurity.
Deep Fakes Deep fakes are a really, really challenging problem. So far, there are a few technological solutions that can do frame-by-frame and pixel-by-pixel comparison and figure out when various kinds of algorithms are being used to make a mouth move saying words other than what was said in the original video. Same for images.
I’m not aware of what the fundamental long-term defense is going to be against deep fakes. However, we can create more security around official communication. If I wanted to have an official White House video, or even an official video from me, I could create that. There are long-standing concepts that have nothing to do with cyber security that you could use.
I think what we’re going end up with is the following: Official communication, like a video of Biden or Trump is eventually going to have enough watermarking and fingerprinting technology, that the major social media platforms will be able to verify authenticity. You could even use blockchain-related concepts to say, here’s the original source of that video that’s been uploaded to the public blockchain. And we know how to verify against that.
The part I have a lot more difficulty with is user-generated content. What if the video we care about is not necessarily that of a famous person? How do you solve the problem that there is no real authentication mechanism when a video or a photo is being shared and propagated and virally explodes on social media? There is no one thing to say, is this authentic? Does it have the right watermarks and digital fingerprints? When it is content that’s being generated by individuals I think it’s going to be hard for us to decide whether that video is real or fake. So a very, very complicated space that’s still emerging.
What Are Some Developments in Cyber That Might Change Offense and Defense? I think there are two. The first one is homomorphic encryption (fully encrypted communication, without having to decrypt the underlying data.) We’re getting to the point where the compute burden on being able to take two numbers – just take the number one and the number two – and let’s encrypt them. We don’t want anyone to know what two numbers we’re adding together. And we want to add them to get the solution, which is three. In the traditional way you share keys, exchange secrets with whoever you want to be able to perform that computation. They decrypt the two numbers, add them up and get the solution – three. And they encrypt the answer and then they transmit that back to you. So that’s the old school way of doing things. And it has two fundamental problems. One, it’s vulnerable, because you have to decrypt the things that were meant to be secret. And anywhere in the process, if you have to decrypt them, that’s problematic. And the second is, you have to exchange secrets with anybody that you want to do business with.
That is fine at a limited scale, when you have a small number of partners. But when you want to have a heterogenous environment, maybe an international coalition, it doesn’t scale very well. So for a long time, DARPA has been chasing after this idea of being able to perform computation on encrypted data without decrypting it. And the problem was that as of 2010, when I was at DoD, there was a 10 to the sixth compute penalty. So a million x compute penalty on adding the number one and the number two together if you left them encrypted. And so over the last 10 years, we’ve been knocking down that exponent, and I think we’re right on the verge of being at the level of 10 to the first or ten the second. And that’s a very tolerable cost for fully encrypted compute, without having to decrypt the underlying data. That’s one exciting area.
And the other one is quantum computing. We’re getting very, very close to the point that quantum computing, certainly for defense may be available. And that is going to change everything about security online. Because at the core of security online today is about computational expense of factoring very large prime numbers. And quantum computing gives you so much more capacity, that you can in fact find many more such primes.
Do our Constitutional Protections in the U.S. Put Us at a Disadvantage Compared to Adversaries That Don’t Share Our Values? I think the answer is 100% yes, at a tactical level, some of those constitutional freedoms put us at a slight disadvantage. But the answer is less about cybersecurity and more about liberal democracies. I think that the question that is, do liberal democracies do better than more authoritarian regimes over a much longer period of time? Because when it comes to getting something done, you don’t need to develop political will in an authoritarian regime to the same degree as in a liberal democracy.
What Do You Think Needs to Happen for Liberal Democracies to Prevail and Feel Safe? I think that the future of warfare is going to be less and less overt, less and less hot. It’s going to be less and less about putting kinetics on a target. It’s going to be about influencing large numbers of people in very subtle ways. If you can influence people, it’s that old thing about winning hearts and minds. If you can just influence them in a certain direction, you may be able to win without fighting at all. And so you end up with a war of ideology and a war of culture in open countries.
I think that the big challenge for liberal democracies is, how do we ensure that the conversation we’re having is a real and authentic conversation with the people we think we’re having it with? I think the conversation happening on Facebook right now is incredibly polluted by people who have ill will and Ill intention. And I worry. I’m going to devote a large number of my career years to figuring out how to kind of stem that tide of inauthentic.
In terms of what the government can do, I think we’re going to have to take a more active role. We’re going to have to figure out a contract with American society that does that in a way that you’re comfortable letting us help create a lot more safety and security.
There’s a distinction between policing what happens on a social media platform – that seems very active and heavy handed – versus saying, we can ensure authenticity without compromising security and privacy. There are a lot of companies that are failing to take steps that are readily attainable that would help with this problem. And so I think that there’s also a regulatory component that says, you have to safeguard yourself using these technologies that we’ve identified. We need a much more robust framework that says, if you’re going to have an online system, this is what security means.
I’ll give you one of my favorite examples. The doors that separate your bedroom from the hallway, or the hallway from the garage are rated for a certain number of hours that they can burn in the event of a fire. So the idea of safety and security in the real world is baked into every component of the physical world with which we interact. That level of intensity has got to go into constructing a major website or a major web platform if you have any hope of it being safe or secure. Instead of the current regime, which is really everybody do their best and we’ll hope it doesn’t turn out too badly.
What Gives You the Greatest Optimism Looking Forward? Over the long haul a freer and more open, more liberal society can suffer a lot of bruises and bumps but can find its way back to a civil discourse. As much as the brand-new tools of communication and aggregation and finding community are creating craziness like QAnon and extremist behavior. I think that there’s still an opportunity for some better version, some good version of communication, collaboration and people coming together to exist. It’s hard to point to quantitative examples of that right now, but I do believe that we will get there. These are growing pains, and growing pains take a decade or two to work their way through the system. But the entire Internet, the way we know it, is barely 25 years old. So it’s barely a young adult. There’s a lot of stories still left to be told.
—
Read the entire transcript of Sumit Agarwal’s talk here and watch the video below.
youtube
If you can’t see the video click here
Lessons Learned
Cybersecurity for U.S. civilians and business is not protected by the government
The U.S. military protects only its systems and people
Coordinated Inauthentic Behavior
Ideas and concepts that are driven by bad actors around a particular ideology, a particular idea or a concept, none of which are true
Deep fakes are a really challenging problem
Solvable for official communications through watermarking and fingerprinting
Really hard to solve otherwise for user-generated content.
Worse when it goes viral
The future of warfare is going to be less and less overt
It’s going to be about influencing large numbers of people in very subtle ways
if you can just influence people in a certain direction, you may be able to win without fighting at all.
And so you end up with a war of ideology and a war of culture in liberal democracies
0 notes
Text
Technology, Innovation, and Modern War – Class 10 – The DOD and Modern War –– Michèle Flournoy
We just held our tenth session of our new national security class Technology, Innovation and Modern War. Joe Felter, Raj Shah and I designed a class to examine the new military systems, operational concepts and doctrines that will emerge from 21st century technologies – Space, Cyber, AI & Machine Learning and Autonomy.
Today’s topic was The DoD and Modern War.
Catch up with the class by reading our summaries of the previous nine classes here.
Some of the readings for this week’s introduction to AI and modern war included: War on Autopilot? It Will Be Harder Than the Pentagon Thinks, Considering Military Culture and Values When Adopting AI, Swarms of Mass Destruction, Joby Aviation raises $590 million led by Toyota to launch an electric air taxi service, Linking combat veterans and Valley engineers.
With Michèle Flournoy, former Under Secretary of Defense for Policy joining us, we also assigned her recent article in Foreign Affairs, “How to Prevent a War in Asia”and CNAS report “Sharpening the US Military’s Edge: Critical Steps for the Next Generation”
Michèle Flournoy is rumored to be Joe Biden’s candidate for Secretary of Defense.
She served as the Under Secretary of Defense for Policy from February 2009 to February 2012. She was the principal advisor to the Secretary of Defense in the formulation of national security and defense policy, oversight of military plans and operations, and in National Security Council deliberations; and led the development of the Department of Defense’s 2012 Strategic Guidance. She’s currently Co-Founder and Managing Partner of WestExec Advisors, and former Co-Founder and Chief Executive Officer of the Center for a New American Security (CNAS), a bipartisan national security think tank.
I’ve extracted a few of Michèle’s key insights and I urge you to read the entire transcript here and watch the video.
—
On China Throughout the 1990s, we were focused on how to integrate China into the global system so that it would become a responsible stakeholder.
And we did everything we could, WTO membership, all kinds of collaborative efforts. That worked for a while, but at a certain point, particularly under President Xi, China decided that the hide-and-bide strategy was over. It was time to take their claim, their rightful place in the international community. Be more assertive in pursuing their agenda in an international forum. And in particular in the Asia Pacific. And it became clear then that we have a number of areas where we really don’t see eye to eye – our interests and objectives are in conflict. Whether its economic, technological, military there are very important competitions that we’re going to have with China over the coming years that will determine the US ability to protect its own economic vitality, but also our security and that of our allies.
That said, there are also problems when you look around the world, whether it’s the next pandemic or climate change or Non-Proliferation where if the United States and China don’t figure out how to cooperate with one another we will both be in deep trouble. So there has to be a cooperative element of the relationship as well. And so that’s why I don’t like the Cold War frame. I think the name of the game is managing this competition, fostering cooperation where we can. Really focusing on deterring conflict between two nuclear powers, which by definition would be a disaster.
Is China becoming more confident in their capabilities and doubt of our own? They definitely are becoming more confident in their own capabilities. They’ve invested a lot in an anti-access/area denial strategy. And you see thousands and thousands of different kinds of precision munitions, rockets and missiles. They are doing a pretty good job of trying to create a situation where it will be very costly for us to go inside the first island chain or even a second island chain. But they’re not 10 feet tall; they have a lot of challenges as a military as well.
But the thing that worries me most is the narrative that’s taking hold in in Beijing about the United States, particularly in the wake of our mishandling of the pandemic, the onset of another recession, the sort of divisions and protests you see on the streets. It’s given rise to a narrative of US decline. US self-preoccupation. US turning inward. And to the extent that Chinese leaders start to believe that and really believe that we have not done what is necessary to counter their A2/AD system, they could gain a sense of false confidence that might get them to take more risk-taking behavior. To push the envelope a little too far. A little too fast. Maybe cross some red lines they don’t know they’re crossing.
So it’s on us to be very clear – the United States – about our resolve, our commitment to defending our interest and allies, and how we define those. And to make really clear investments in the capabilities that will ensure our ability to project power and protect those interests in the future.
How Should the DoD Spend Smarter? I think the real long pole in the tent is in developing new operational concepts, in light of a clear-eyed assessment of what we’re going to face from either China or for example Russia’s A2/AD network in Europe.
It forces us into an uncomfortable position. We like to be dominant in every domain. We like to be the one to beat. Here in every case, we’re going to have to be the asymmetric challenger. You’ve got a resident power with a huge set network of capabilities. They’re going to have more quantity than us. We’re going to have to figure out how to fight it asymmetrically for our advantage.
And so that means, first and foremost, that we really do have to think about new concepts. We have to have much more competitive processes for developing those concepts. Not sort of building consensus on lower common denominator, concepts where everybody gets an equal share of the pie. Not interested in that. We have to link that to a lot of prototyping of new capabilities, experimenting with those new capabilities. See how they can inform the new concepts and vice versa.
And so this very agile, iterative process of bringing new technologies and prototyping systems. Playing them in war games, playing them in simulations, playing them in different experiments taking that feedback, those learnings. Bringing it back to inform the next iteration of the design and so forth. This is the process that’s going to get us to the right place. And it’s something that’s just really, really hard for the Department of Defense to do. We’re not set up to do that quickly or well or at scale.
How Should the DoD Realign its Concepts, Culture, Programs and Budgets? Well first, the sense of urgency you do hear at the top among the Pentagon leadership is not necessarily fully shared throughout the bureaucracy – surprise, surprise. We’ve started to adjust our acquisition approach. And the departments have put out some very useful new guidance on how to approach software acquisition in a very different way than hardware acquisition. But we haven’t necessarily trained our acquisition people, incented them to have a greater risk tolerance that’s required for this agile development of emerging technologies. Nor have we created real rewards promotion paths career paths for that.
And so there’s a huge human capital effort to be done here to raise the overall tech literacy of all of the folks- from the program managers to the operators. But also, to bring more tech talent into government to really help speed the transformation process. And that requires again some culture change. You’re not going to keep tech talent if they walk into a typical Pentagon office today. You got to create a different operating culture. And I do think there’s some great examples – Kessel Run in the Air Force or the Joint AI center and parts of SOCOM. These are pockets where they’re trying a different approach, different culture, and having some success attracting the kind of tech talent the department needs. We just need to do all that at a much greater scale and with greater urgency.
Innovation Versus Innovation Adoption Thanks to organizations like DIU we’ve gotten much better at tech scouting; finding promising technologies that might have a military application, getting them on that initial contract – on a SBIR contract or an OTA prototyping contract.
But the real problem is that almost everybody hits the famous “valley of death.” So you’ve done a great prototype, you’ve won the demonstration, everybody loves you. And then they say, “Well, the next time we can actually insert you into the program and for a production contract is 2023, two and a half years from now.” And for a startup that’s like, “What do you mean? I’ve got to have access to recurring revenue to survive until then.” And so they get pressure from their investors to forget the national security side, just go commercial. It’s this terrible situation. So what do we need to fix that?
Number one, you need a more flexible set of funding authorities to bridge that gap. One idea is to allow the services to have some greater reprogramming authorities within mission areas or across portfolios, so that at the end of the year, when they’d have something that didn’t work, they can scrape up money there and put it into the next iteration of development for the thing that does work, and maybe get another year of bridge funding to get to that production contract.
That obviously requires some working with Congress to get them comfortable that they’ll have the transparency and oversight, but they need to give the department that kind of flexibility. I also think it involves bringing the ultimate end user into the earliest contact. So you have a program manager who’s watching this thing like a hawk from the beginning. And is already thinking about how it’s going to disrupt and be integrated into something he or she is responsible for. And you have to incent that. Rather just rewarding this rigorous, we only care about cost and schedule. You’ve got incent program managers if you can get better performance at lower costs, you got to be a disrupter yourself. You got to bring new ideas into what you’re managing to do that – which is a very different approach. It’s not easy to do. But we have to try to figure that out.
How Can We Work More Closely with Allies and Partners? For each of the key priority areas, whether it’s AI or robotics or Quantum or hypersonics, whatever it is, we could do some mapping of which of our allies really has cutting edge work going on, either in their research universities or in their innovation base. And look for opportunities of where we perhaps get farther faster by sharing some of that. There are all kinds of ways to do this. One is to cross invest. I know In-Q-Tel has started investing in UK companies, Australian companies, for example, with certain priorities in mind. I would love to see DIU get into the business of starting to bring some of those allied companies in.
I think this needs to be a topic of policy discussion of where we collectively go after some of these areas with joint ventures or joint technology development and more efforts like that at scale. It’s a very important area. Particularly given that both China and Russia are going to be leveraging these technologies in ways that are really counter to our Western values in terms of surveillance systems and without respect for personal privacy and all kinds of things. And I think the more we have a common values-based approach to technology with our allies, the stronger we can be in showing up at an international forum where standards are being set or norms are being set and so forth.
What Legacy Programs Should be Downsized to Fund Investment in Emerging Technologies? It’s a great and necessary question, because the DoD always has more programs than budget. But I think with COVID and with the recession whoever wins the White House in November, you’re going to see a flattening of the DoD budget. The sort of assumptions of 3% to 5% growth over and above inflation, that’s not going to hold no matter who is in the White House. So you’re going to have to make some tough tradeoffs. I can’t give you an answer off top my head, but I can tell you how I would think it through.
I think we need to look mission area by mission area and look across services at portfolios of capabilities to ask, “What is the mix that we need so that we have the platforms we need, but also the money to invest and incorporate the emerging technologies that will make those legacy platforms survivable, relevant, combat effective in the future?” And so it really has to happen on a mission area basis.
I think in some cases you may find redundant capabilities within or between services. Sometimes you’ll say, I don’t want that redundancy. I’m going to make a determination and one is going to be a winner and the other is going to be a loser. But sometimes, for the sake of resilience, for the sake of complicating adversary attack planning, you may want redundancy. You may want multiple different ways to accomplish a particular task. So this has to be done with very strong analytic grounding. Looking at both performance and capability, but also cost, and so forth.
My bias is that we have to be much more aggressive in going down the road of human/machine teaming and in gaining mass, gaining capacity and complicating the other side’s planning process by incorporating unmanned in all domains. More unmanned undersea, on the sea, in the air and beyond. If we can crack the code on that integration that is going to give us for the cost of the system a lot more capacity and capability.
What Should be Done to Enhance the Recruitment and Retention of a Technologically Superior Defense Workforce? We’re finding one of the most important things we’re doing – who knew – is creating a handbook for the DoD folks to say, “Here are all the authorities, you may not know you have for bringing tech talent is. Here are the best practices in terms of how to approach the hiring process. Here are the kinds of things you need to have in place to make those folks successful.” And give them the tools they need to really contribute. So trying to take all the learnings of where it’s been tried and failed, or where it succeeded and why. And put it in a handbook for the DoD hiring authorities to say, here’s your own learnings that you can build on to get that tech talent in at greater scale and with greater speed.
One of the key barriers is still the clearance process. That seems to hold people up for a bit. But I think the department is seriously working on trying to reduce some of those barriers. Then the second piece, I would say, is career path. The services are actually sitting on a lot of STEM talent, but they don’t manage them as STEM talent. You know they forced the young captain who is the Air Force AI specialist to leave and go out and be on a squadron staff in order to check the box, so he can get his next promotion. The services need to design career paths for technologists, so that they can get rewarded, promoted, and reach leadership positions as technologists. Otherwise, we will under leverage the people who are already in the force.
What are Some Potential DoD Problems or Operational Concepts That You Would Like Our Best and Brightest Here At Stanford’s Address in Class – Now and in the Future – and Why? I think the long pole in the tent is this notion of joint all domain command and control in an environment that will be constantly contested. So the analogy is how do you build the equivalent of a resilient electrical grid as your command and control network? So that if on part of it you have an electronic warfare attack and one end of it goes down, the system automatically reroutes and is connecting shooters and sensors in a different way that allows them to keep operating without missing a beat.
So it’s coming up with how the key elements of stitching together a network of networks that has that resilience and an ability to connect and operate at the edge, even during periods where there’s disruption and you can’t call back to headquarters. That to me is the long pole in the tent for future multi-domain operations this very distributed approach to warfare, that will be necessary.
The second piece is the technical aspects of human machine teaming, and how that really works – and again, in multiple domains, whether it’s undersea or on the sea or in the air or above. That is another key point. And then just lots of applications that can increase the accuracy and speed of our decision-making faster than that of the other side. Just humans still making the decisions, but getting the right information, the right analysis to them at the right moment in time, where we can make the decision and gain that advantage in the cycle of competition.
How Can the Defense Department, and Our Leadership Unify the US Against These Threats in a Highly Partisan and Divided Political Environment? It’s a great question, and it points to this question of leadership. We need a president and a commander in chief to step forward and provide a vision to make the case, to provide the sort of nature of the challenges, the threat assessment, why it’s important to the prosperity and security of Americans at home. And what we need to do to go after it. I would love to see a moonshot moment kind of speech, a Kennedy speech that sort of says, We’re in this competition, and this is really going to matter to our way of life. But we’re America, we know how to do this. We came out of the Great Depression. We came out of World War Two. We came out of Vietnam. And we have good done this before. We are we are in crisis. We’re going to come out of this, and we’re going to be stronger and all of us need to help. So how are you going to help drive investment in the drivers of American competitiveness?
And some of it will be by doing great work in STEM in our research universities. Some of it will be investing in 21st century infrastructure. Some of it will be developing these new technologies that can transform both our society and our economy and our military. But really inspiring Americans to say, we need your talents. We need everybody to step up and help. That’s what I’m looking for. And, and I haven’t seen it recently, but I’m looking for that kind of leadership.
What Advice Would You Give America’s Best and Brightest, at Universities Across the Country on How They Can Serve and Make a Difference – Short of Joining the Military or Other US government Organizations? I think we should all feel some desire, but also an obligation to serve. I mean, to be partaking of all the incredible freedoms and benefits of this country. What can we give back? For some of us, it’s going to be going into government service or serving in the military.
But there are ways to serve in other parts of the US government. There are ways to serve in nonprofits. There are all kinds of ways to get involved in enriching society and helping to serve the United States. And so find whatever that area of passion is for you, find the time to do that. Maybe it’s going to be through your work, but maybe it’s going to be through some of the activities you do when you’re not at work. If we all stepped up to that, sort of drive to serve, it doesn’t have to be in government, we’d enrich our society so greatly.
So the homework assignment is – find that passion and that path to service, whether it’s going into government for a stint, advising or helping or investing in some other way that’s going to make your community or the country or the world a better place.
Read the entire transcript of Michèle Flournoy’s talk here and watch the video below.
youtube
If you can’t see the video click here
Lessons Learned
Michèle Flournoy is an experienced former senior defense official who is thinking deeply and critically about how to best address emerging national security challenges
She would be a great SecDef
0 notes
Text
Technology, Innovation and Modern War – Class 9 – Autonomy – Maynard Holliday
We just held our ninth session of our new national security class Technology, Innovation and Modern War. Joe Felter, Raj Shah and I designed a class to examine the new military systems, operational concepts and doctrines that will emerge from 21st century technologies – Space, Cyber, AI & Machine Learning and Autonomy.
Today’s topic was Autonomy and Modern War.
Catch up with the class by reading our summaries of the previous eight classes here.
Some of the readings for this class session included Directive 3000.09: Autonomy in Weapons Systems, U.S. Policy on Lethal Autonomous Weapon Systems, International Discussions Concerning Lethal Autonomous Weapon Systems, Joint All Domain Command and Control (JADC2), A New Joint Doctrine for an Era of Multi-Domain Operations, Six Ways the U.S. Isn’t Ready for Wars of the Future.
Autonomy and The Department of Defense Our last two class sessions focused on AI and the Joint Artificial Intelligence Center (the JAIC,) the DoD’s organization chartered to insert AI across the entire Department of Defense. In this class session Maynard Holliday of RAND describes the potential of autonomy in the DoD.
Maynard was the Senior Technical Advisor to the Undersecretary of Defense for Acquisition, Technology and Logistic during the previous Administration. There he provided the Secretary technical and programmatic analysis and advice on R&D, acquisition, and sustainment. He led analyses of commercial Independent Research and Development (IRAD) programs and helped establish the Department’s Defense Innovation Unit. And relevant to today’s class, he was the senior government advisor to the Defense Science Board’s 2015 Summer Study on Autonomy.
Today’s class session was helpful in differentiating between AI, robotics, autonomy and remotely operated systems. (Today, while drones are unmanned systems, they are not autonomous. They are remotely piloted/operated.)
I’ve extracted and paraphrased a few of Maynard’s key insights from his work on the Defense Science Board Autonomy study, and I urge you to read the entire transcript here and watch the video.
Autonomy Defined There are a lot of definitions of autonomy. However, the best definition came from the Defense Science Board. They said, to be autonomous a system must have the capability to independently compose and select among different courses of action to accomplish goals based on its knowledge and understanding of the world, itself, and the situation. They offered that there were two types of Autonomy:
Autonomy at Rest – systems that operate virtually, in software, and include planning and expert advisory systems. For example, in Cyber, where you have to react at machine speed
Autonomy in Motion – systems that have a presence in the physical world. These include robotics and autonomous vehicles, missiles and other kinetic effects
A few definitions:
AI are computer systems that can perform tasks that normally require human intelligence – sense, plan, adapt, and act, including the ability to automate vision, speech, decision-making, swarming, etc. – Provides the intelligence for Autonomy.
Robotics provides kinetic movement with sensors, actuators, etc., for Autonomy in Motion.
Intelligent systems combine both Autonomy at Rest and Motion with the application of AI to a particular problem or domain.
Why Does DoD Need Autonomy? Autonomy on the Battlefield Over the last decade, the DoD has adopted robotics and unmanned vehicle systems, but almost all are “dumb” – pre-programmed or remotely operated – rather than autonomous. Autonomous weapons and weapons platforms—aircraft, missiles, unmanned aerial systems (UAS), unmanned ground systems (UGS) and unmanned underwater systems (UUS) are the obvious applications.
Below is an illustration of a concept of operations of a battle space. You can think of this as the Taiwan Straits, or near the Korean Peninsula.
On the left you have a joint force; a carrier battle group, AWACS aircraft, satellite communications. On the right, aggressor forces in the orange bubbles are employing cyber threats, dynamic threats, denied GPS and comms (things we already see in the battlespace today.)
Another example: Adversaries have developed sophisticated anti-access/area denial (A2/AD) capabilities. In some of these environments human reaction time may be insufficient for survival.
Autonomy can increase the speed and accuracy of decision-making. Using Autonomy at Rest (cyber, electronic warfare,) as well as Autonomy in Motion, (drones, kinetic effects,) you can move faster than your adversaries can respond.
Autonomy Creates New Tactics in the Physical and Cyber Domains The combatant commanders asked the Science Board to assess how autonomy could improve their operations. The diagram below illustrates where autonomy is most valuable. For example, in row one, on the left, you don’t need autonomy when required decision speed is low. But as the required decision speed, complexity, volume of data and danger increases, the value of autonomy goes up. In the right column you see examples of where autonomy provides value.
The Defense Science Board studied several example scenarios.
Some of these recommendations were invested in immediately. One was the DARPA OFFSET (Offensive Swarm Enabled Tactics) program run by Tim Chung. He holds the record for holding a hundred swarms. And he took his expertise to DARPA to run a swarm challenge. Another DARPA investment was the Cyber Grand Challenge, to seed-fund systems able to search big data for indicators of Weapons of Mass Destruction (WMD) proliferation.
Can You Trust an Autonomous System? A question that gets asked by commanders and non-combatants alike is, “Can you trust an autonomous system? The autonomy study specifically identified the issue of trust as core to the department’s success in broader adoption of autonomy. Trust is established through the design and testing of an autonomous system and is essential to its effective operation. If troops in the field can’t trust that a system will operate as intended, they will not employ it. Operators must know that if a variation in operations occurs or the system fails in any way, it will respond appropriately or can be placed under human control.
DOD order 3000.09 says that a human has to be at the end of the kill chain for any autonomous system now.
Postscript – Autonomy on the Move A lot has happened since the 2015 Defense Science Board autonomy study. In 2018 the DoD stood up a dedicated group – the JAIC – the Joint Artificial Intelligence Center, (which we talked about in the last two classes here and here) to insert AI across the DoD.
After the wave of inflated expectations, deploying completely autonomous systems to handle complex unbounded problems are much harder to build than originally thought. (A proxy for this enthusiasm versus reality can be seen in the hype versus delivery of fully autonomous cars.)
That said, all U.S. military services are working to incorporate AI into semiautonomous and autonomous vehicles into what the Defense Science Board called Autonomy in Motion. This means adding autonomy to fighters, drones, ground vehicles, and ships. The goal is to use AI to sense the environment, recognize obstacles, fuse sensor data, plan navigation, and communicate with other vehicles. All the services have built prototype systems in their R&D organizations though none have been deployed operationally.
A few examples; The Air Force Research Lab has its Loyal Wingman and Skyborg programs. DARPA built swarm drones and ground systems in its OFFensive Swarm-Enabled Tactics (OFFSET) program.
The Navy is building Large and Medium Unmanned Surface Vessels based on development work done by the Strategic Capabilities Office (SCO). It’s called Ghost Fleet, and its Large Unmanned Surface Vessels development effort is called Overlord.
DARPA completed testing of the Anti-Submarine Warfare Continuous Trail Unmanned Vessel prototype, or “Sea Hunter,” in early 2018. The Navy is testing Unmanned Ships in the NOMARS (No Manning Required Ship) Program.
Future conflicts will require decisions to be made within minutes, or seconds compared with the current multiday process to analyze the operating environment and issue commands – in some cases autonomously. An example of Autonomy at Rest is tying all the sensors from all the military services together into a single network, which will be the JACD2 (Joint All-Domain Command and Control). (The Air Force version is called ABMS (Advanced Battle Management System).
The history of warfare has shown that as new technologies become available as weapons, they are first used like their predecessors. But ultimately the winners on the battlefield are the ones who develop new doctrine and new concepts of operations. The question is, which nation will be first to develop the Autonomous winning concepts of operation? Our challenge will be to rapidly test these in war games, simulations, and in experiments. Then take that feedback and learnings to iterate and refine the systems and concepts.
Finally, in the back of everyone’s mind is that while DOD order 3000.09 prescribes what machines will be allowed to do on their own, what happens when we encounter adversaries who employ autonomous weapons that don’t have our rules of engagement?
Read the entire transcript of Maynard Holliday’s talk here and watch the video below.
youtube
If you can’t see the video click here
Lessons Learned
Autonomy at Rest – systems that operate virtually, in software, and include planning and expert advisory systems
For example, Cyber, battle networks, anywhere you must react at machine speed
Autonomy in Motion – systems that have a presence in the physical world
Includes robotics and autonomous vehicles, missiles, drones
AI provides the intelligence for autonomy
Sense, plan, adapt, and act
Robotics provides the kinetic movement for autonomy
Sensors, actuators, UAV, USVs, etc.
Deploying completely autonomous systems to handle complex unbounded problems are much harder than originally thought
All U.S. military services are working to incorporate AI into semiautonomous and autonomous vehicles and networks
Ultimately the winner on the battlefield will be those who develop new doctrines and new concepts of operations
We’re seeing this emerge on battlefields today
0 notes
Text
Technology, Innovation, and Modern War – Class 8 – AI – Chris Lynch and Nand Mulchandani
We just held our eighth session of our new national security class Technology, Innovation and Modern War. Joe Felter, Raj Shah and I designed a class to examine the new military systems, operational concepts and doctrines that will emerge from 21st century technologies – Space, Cyber, AI & Machine Learning and Autonomy.
Today’s topic was Artificial Intelligence and Modern War.
Catch up with the class by reading our summaries of the previous seven classes here.
Some of the readings for this class session included What The Machine Learning Value Chain Means For Geopolitics, How Artificial Intelligence Will Reshape The Global Order, An Understanding Of Ai’s Limitations Is Starting To Sink In, and The Panopticon Is Already Here.
AI and The Department of Defense In our last class session General Shanahan, described the mission of the Joint Artificial Intelligence Center (the JAIC) which is to insert AI across the entire Department of Defense. He also said, “The most important hire I made in my time at the JAIC was the chief technology officer, Nand Mulchandani.” Nand changed the culture of the JAIC, bringing in Silicon Valley tools for product development, product management and for the first time a culture that focused on UI/UX, MVPs and continuous integration and deployment.
In this class session Nand Mulchandani, JAIC CTO who just completed an extended stint as Acting Director, continued the discussion of AI and the role of the JAIC.
In addition to Nand, the class also heard from Chris Lynch, founder of the Defense Digital Service (DDS), now the CEO of Rebellion Defense, a new vendor of AI to the DOD. One of the main purposes of the class is to expose our best and brightest to DoD challenges and inspire them to serve. Chris’s story of why he started DDS and how he built the team is a model for how you create a movement.
I’ve extracted and paraphrased a few of their key insights below, but there are many others throughout this substantive discussion, and I urge you to read the entire transcript (here and here) and watch the video.
—-
Nand Mulchandani
How the JAIC is Organized The JAIC is a tiny team, yet we have a product directorate with 32 products that we’re building across six verticals – all the way from warfighter health to Joint warfighting to Business Process automation, humanitarian assistance, disaster relief, cybersecurity and predictive maintenance. And we own the AI autonomous weapon systems ethics and policy for the DOD.
We have an acquisition arm and Congress is probably going to give us acquisition authority this year. And we have a missions team headed up by a one-star Flag Officer with six O-6 level officers (Colonels and Navy Captains) heading up the different missions.
Selling JAIC Like Enterprise Sales When General Shanahan brought me in a year and a half ago, we were focused on building one-off products that in some sense were what I called “using a peashooter against a tank.” One product at a time wasn’t going to change the trajectory of the DOD. This is where I brought in the thinking of how we build businesses here in Silicon Valley. We needed to be building leveraged business models in scale. Leverage is a key part of how you change a 3-million-person organization through technology.
Everything that we do at the JAIC has to be built and done with leverage in mind. I organized my missions teams like an enterprise sales team. We took all the colonels and the captains and said, “You are now going out there and finding the repeatable customer patterns. You’re not finding the one-off custom projects to come build. Instead you need to find the patterns, where I can build a single piece of IP or technology and then “sell it” to all the combatant commands and services equally.” Because doing one-offs is never ever going to change the DOD.
JAIC Is Applied AI – Focused on Impact AI is not a single technology. It’s picked up every piece of technology in statistics and regression and we’re dealing anywhere from string data to numeric data to audio, language, still image things, full motion video object recognition.
But we take this technology and apply it to a particular set of customer problems and focus on the impact. I take a very practical approach to this. I’m an entrepreneur and an implementation guy. So, my focus is on practical ways of moving this big rock, in a in a tactical, tangible way, slowly and surely, while big thinkers will the work on the broader theoretical pieces.
For instance, inside the DOD we have aging equipment and we have a number of business processes that are really less than optimum. How do we tackle those with AI which can become quick wins so that success begets success?
However, using AI for new warfighting capability that’s much, much more complicated. That’s the stuff that Rebellion and Anduril and a number of other companies are helping us with.
Connecting Systems End to End We’re applying AI across the board. Take a look at the diagram below. On the left is the Pentagon with highly connected data centers with high bandwidth. And on the right, you’ve got the tactical edge, where we’ve got UAVs, tanks, spacecraft, etc.
At the JAIC we’re focusing on what we call the autonomy space – close combat, AI for small unit maneuvers, around things for SOCOM, and what the Marines and others are going to have to do with the new National Defense Strategy and new operational concepts.
And then we’re also focused on autonomy. The magic words – Joint All Domain Command and Control (JADC2) and the Advanced Battle Management System (ABMS) – are the automation pieces. How do you connect all of our systems end to end? That requires targeting logistics, fires, everything else. Today, it’s a process that’s half manual, half PowerPoint, half Excel, half whiteboard, and half a bunch of lieutenants, majors and colonels all drawing stuff and cobbling it together. If we agree that the next generation of warfare is going to be fought at the speed of software, you need these end-to-end systems all connected together in a backplane, a platform.
Now the problem is, in the diagram below on the left, this is what our DOD architecture looks like today. It’s a bunch of vertically integrated snowflake applications with a mouse and a keyboard and a screen. Applications are developed in silos, making it impossible to enable centralized functionality.
And for students of economics, you see the cost curve. The graph on the left just doesn’t work. Your marginal costs and your average costs of building software do not go down over time. What’s ironic is that software is one of the few businesses where the more you build, the cheaper it gets, it should.
The curve you want is on the right – lower marginal cost per application, rapid development, increased developer productivity, etc. And the only way you’re going to get there is through building common platform services and the application architecture that internet-scale companies do today. And in the DOD that discussion and ideas are completely missing. And so we continue to build stuff as it is on the left. The discussion we’re having in the Pentagon is how do we move things from left to the right.
Moving from Vertical Silos to Horizontal Platforms Enables “Software defined warfare” Our observation is that the architecture of DOD systems is vertically scaled. What that means is that for that last few decades the goal for every weapon system is about how does each generation get a bigger and bigger version of the same weapon system?
Today that means we just made our targets bigger for our adversaries. Think of a giant aircraft carrier sitting out in the ocean with a hypersonic missile targeted against it. It’s like a giant, vertically scaled data center that we used to have 15, 20 years ago. The architecture changes we need to make in our design for the next generation Combat Systems are precisely the same things that we had to do to change the way we operated data centers. Which is moving from stateful, long running, individual systems, to horizontally scaled, stateless systems. We need them attritable, able to work in denied and degraded environments.
This is what we’re thinking when we call it “software defined warfare.”
However, AI as a services-oriented architecture has to get built out on top of an infrastructure platform. The biggest problem is that no one in the DOD owns running that. So while others can run the JEDI cloud for the DOD, nobody owns running application services for the DOD. And the JAIC can’t run them because we’re not an operational software organization.
Joint Common Foundation One of the biggest mandates we’re focused on now is the Joint Common Foundation, the JCF. It’s an AI development and data environment for the DOD that democratizes access to compute and data.
The vision is a tactical team sitting out in one of our remote bases. Imagine if they can power up a secure laptop, crank out 30 lines of Python code; and grab a set of services – logistic services, mapping services, targeting services, etc,– that are DOD wide available directly through the JCF; and crank out a piece of code that they get into production, use it for a month and then throw it away.
That is the reconfigurability and speed that we need to have at the DOD. So if we are ever in combat, the reconfigurability of our infrastructure, whether it be hardware infrastructure at the tactical edge or a back end systems to react, that is the level of game that we have to have, or we’re toast. That’s it. It’s that simple.
—–
Chris Lynch Culture and the culture of change – Getting the Job to Run the Defense Digital Service In 2015, the Chief Technology Officer at the White House, Todd Park, mentioned I ought to meet with the Department of Defense who were thinking of creating the Defense Digital Service, a DOD version of United States Digital Service. The goal was to bring modern, private-sector tools, technology, and talent into the DOD to solve high-impact challenges.
And Todd Park said, there’s going be a lot of people who want to do this, who want to lead innovation and a lot of people are going to come through, they’re going to pitch their version. I thought about the job like a startup. I came in with a pitch around a “SWAT team of nerds,” one that would work on problems of impact and things that matter. I remember the first time I walked into the waiting room for the Office of the Secretary of Defense. It felt like “Shark Tank.” There were a bunch of other people all going in to do their pitch and talk about their idea for what they wanted to build. Some of them had presentations, and all of them had things printed out of course, because it’s the Department of Defense. Here, we’re talking about technology and innovative ideas, and doing things different with technology and software, and of course, nobody was able to do an actual presentation with a computer.
I chose to show up that day representing what I thought was the culture of what it had to be from the very beginning. That if we tried to build the bridge by being what they were, it wasn’t going to be right. It wasn’t going to be authentic. And we would never attract the best people into the most important mission in the entire world – the mission of defense and national security.
So I showed up in a hoodie and I showed up as me. I didn’t print off a presentation. I pitched the idea, let’s do the SWAT team of nerds. And, and I can remember it felt really, really, weird standing in that office with people in suits and people in uniform in the military. It was just such a different world, completely and totally unlike anything that I had ever seen.
And you know, that’s what they wanted. And that’s what I wanted to be in that part of the story. Because I felt it was important that we actually get people to show up to do the mission. I think that that’s probably one of the most critical things that became the basis of how I thought about what we were building.
Recruiting for the Defense Digital Service I told people, I want you to leave your job where you’re paid more than what I’m going to pay you. I want you to leave your job, where you’re getting free meals, where you’re living and working around a bunch of other software engineers. And I want you to come into a place that is going to be so unbelievably difficult, frustrating, sometimes demoralizing, and very, very difficult. I want you to come into that.
And I want you to give me six months to one year. But I also just want you to be you.
And when you leave, if you do your job here, if you do the thing that we showed up to do, and if we are successful in what we’re trying to accomplish, it will change your life until the day you die. You’ll never be able to get it out of your blood. And that’s the place that we built. I think that that’s the culture, I think that’s the right place to be.
Because it allowed us to show up in what we were comfortable wearing, we became known as, the people in hoodies. And you would have the Vice Chairman of the Joint Chiefs of Staff doing a presentation for newly minted generals. And they would show a slide with a picture of me with orange tennis shoes on. And it just became our uniform. And it also made it really easy to be like, “Oh, that’s Chris Lynch. He’s a nerd, right? That’s the person that I want to talk to.”
And that was the culture that we decided to build. Just keep focused on results and not getting caught up in sizzle. But getting caught up in real things, in building real tangible stuff. And I think we were successful.
Starting Rebellion Defense When I left the Defense Digital Service, I felt like I was standing at the shore of this vast sea of all the things that I might do next.
Rebellion Defense was built around the idea of let’s do something spectacular. Let’s continue that mission, but at a scale that would be impossible inside the DOD. And we would be able to bring in incredible new people who wanted to work on something meaningful and impactful.
Surprises from Being Outside the Government Selling In It’s funny, one of the things I never had to worry about on the inside of the Pentagon was budget. As it turns out, finding who has a budget and can allocate funds is a lot more complicated than you’d think. Just because you find someone who has a budget, they have to find a contracting office to do the buy.
My second point is, if you simply believe that you’re going to show up with an awesome product and awesome technology, guess what? That doesn’t mean anything. if you’re selling this customer technology you already lost. The DOD is a mission-driven organization. Which means you have to understand what they are doing. If there’s a person saying, “Oh I need more AI and ML,” they’re likely not the person who has the budget at the end of the day.
Next, this space has a lot of companies in it that have been here for much longer than you. And you probably don’t know anybody in this space. They do. They know them all. They previously have occupied the jobs that the current people in those roles are doing. And so they have all those relationships. That’s a moat.
And incumbents and competitors say they do pretty much anything that you will say that you do. They’ll say, AI and Machine Learning? We do AI/ML on quantum clusters with Cheddar cheese. And literally, I have had people who send me the most random word-salad construction of words and phrases, I don’t even understand what you’re saying. I get that all the time. I can’t tell you the weird stuff that I get sent my way.
So you have to find that partner that has a belief in solving a problem. They have to know what is real and what is not.
How Will AI Be Used? Why Should Silicon Valley Engineers and Our Students Get Involved?
We either show up or we cede our ability to influence and decide on that policy.
If the world’s greatest technologists do not show up and build the systems for the Department of Defense, to lead in this area and decide the ethical and moral boundaries that we believe in, and that we as a nation are comfortable with, somebody else is going to show up and lead in the way that those technologies are built. And they will decide how they’re used and that will be the definition of ethics and morality.
So you have one very, very simple choice: Show up. If you don’t show up, then you don’t get to play a part in the discussion. Because if other countries who do not share your beliefs become the leaders in how these capabilities are used in a military context and they deploy them, it doesn’t matter what you think. That becomes the norm.
I believe that technologists – people like you, and people like me – we can’t give that up to somebody else. I don’t want somebody less capable than the best in this country to show up and build those systems.
Postscript
The Department of Defense awarded a $106 million contract to build the JAIC’s Joint Common Foundation to… Deloitte Consulting.
Read the entire transcript of Chris Lynch and Nand Mulchandani talks here and here and watch the video below.
youtube
If you can’t see the video click here
Lessons Learned
Nand Mulchandani
The JAIC acts like DOD’s AI service bureau, building leveraged business models in scale.
It’s working on a portfolio of 32 products in 6 verticals across the DOD
It’s looking for repeatable customer patterns
It’s applying AI to both autonomy and automation applications
For example, the Joint All Domain Command and Control (JADC2) and the Advanced Battle Management System (ABMS)
The DOD needs to move from vertical silos to horizontal platforms
AI needs to become a services-oriented architecture built out on top of an infrastructure platform
Hopefully the Joint Common Foundation will do just that
Chris Lynch
Built the Defense Digital Service as a SWAT team of nerds
How he motivated his team is inspiring:
“If you do your job here, if you do the thing that we showed up to do, and if we are successful in what we’re trying to accomplish, it will change your life until the day you die. You’ll never be able to get it out of your blood. And that’s the place that we built.”
Surprises at Rebellion Defense included:
How to find customers with a budget
Competing with incumbents who came from the revolving door
Competing with other companies who claim “we can do that, too”
Why work with the DOD on AI?
“If the world’s greatest technologists do not show up to lead and decide the ethical and moral boundaries that we believe in, and that we as a nation are comfortable with, somebody else is going to show up and lead. And they will decide how they’re used and that will be the definition of ethics and morality.”
Show Up
0 notes
Text
Technology, Innovation, and Modern War – Class 7 – Jack Shanahan
We just held our seventh session of our new national security class Technology, Innovation and Modern War. Joe Felter, Raj Shah and I designed the class to examine the new military systems, operational concepts and doctrines that will emerge from 21st century technologies – Space, Cyber, AI & Machine Learning and Autonomy.
Today’s topic was Military Applications of Artificial Intelligence.
Catch up with the class by reading our summaries of the previous 6 classes here.
If you can’t see the slides above, click here.
Our guest speaker was General Jack Shanahan LTG (ret), former Director of the Joint Artificial Intelligence Center (JAIC).
Some of the readings for this class session included: Can The Pentagon Win The AI Arms Race?, The Ethical Upside To Artificial Intelligence, The Coming Revolution In Intelligence Affairs, Artificial Intelligence For Medical Evacuation In Great-Power Conflict, Congressional Research Service, Artificial Intelligence And National Security.
AI and The Department of Defense As a lead up to this class session we’ve been talking about the impact of new technologies on the DOD. AI is constantly mentioned as a potential gamechanger for defense.
General Shanahan founded the Joint Artificial Intelligence Center (the JAIC) to insert AI across the entire Department of Defense. The goal is to use AI to solve large and complex problem sets that span multiple services; then, ensure that all of the DOD has real-time access to libraries of data sets and tools. A key part of the strategy was to work with commercial companies to help build these solutions.
Prior to the JAIC General Shanahan ran Project Maven, an unintentional dry-run for how the DOD and commercial companies could partner (or not) to build AI-enabled apps. Maven partnered with Google to build a computer vision tool for imagery analysts to automatically detect objects/targets. The relationship ended when Google employees forced the company’s withdraw from the project.
There were lots of lessons on both sides — about transparency, about why companies in the 20th century had “federal systems divisions” that worked exclusively on government projects, while the rest of their company pursued commercial business — as well as a lot of relearning lessons the Valley had forgotten (see The Secret History of Silicon Valley).
This entire class session was a talk by General Shanahan and Q&A with the students. It’s interesting to note how many of his observations echo ones Chris Brose and Will Roper made in the previous sessions.
I’ve extracted and paraphrased a few of his key insights below, but there are many others throughout this substantive discussion. I urge you to read the entire transcript and watch the video.
—
Tactical Urgency and Strategic Patience We have a relatively small window to transform our respective Defense Department from Industrial Age hardware-centric organizations, to Information Age software-centric, more risk tolerant ones. That demands the right combination of tactical urgency and strategic patience, but there’s no question we have to move with alacrity on this right now.
War is a very uncertain endeavor run by humans. If we find ourselves on the verge of a conflict with China in 20 years, the idea that we might have a fully AI-enabled force by then will not by itself guarantee victory. If on the other hand, in that same 20-year period, China has a fully AI-enabled force and we do not, I believe we will incur an unacceptably high risk of defeat.
Project Maven – Start With the Problem – Automate Imagery Analysis We didn’t start Project Maven with an AI solution. We started with a problem: far too much information coming in from the intelligence enterprise; intelligence, surveillance, reconnaissance. It was done manually — intensive, mind-numbing work with analysts staring at video screens for 12 hours at a shift. They couldn’t ever get through that much. It was really hard for analysts to absorb that amount of data and the data was increasing – in volume, speed and in tempo — and it was coming from all sources simultaneously, from unclassified to the highest classification levels.
We weren’t looking to do a 1x solution, a 5x solution or even a 10X solution. We wanted a 100X solution. We needed something that would really change the way we did processing exploitation and dissemination of all this intelligence coming in from all these platforms and centers in the world.
We went out and solicited everything we could find in the Department of Defense. There was tremendous AI work going on in the research labs, but nothing available for doing processing exploitation and dissemination in the near term. The problem was, while the military research labs were doing some of the best research in the world, it wasn’t getting across the classic technology valley of death. (I like to talk about Maven and the JAIC as “AI Now,” and then places like DARPA and the military research labs as “AI Next.”)
Where else did this AI technology exist? DIUx, In-Q-tel and others pointed out to us, “You lament about how much information you’re having to take in and process. Look at how much information YouTube takes in every single day. Your problems are not an overwhelming problem. There are solutions available in commercial industry.”
So how do you take technology from commercial industry, adapt it for the Department Defense purposes, and do it fast enough and do it at scale across the entire Department of Defense? The only way we could do that was to start bringing in those commercial technologies faster and faster.
So, Project Maven started us on the path of bringing an AI-enabled solution for the purpose of intelligence. Largely computer vision in going after the intake from drones. At first tactical drones, then mid-altitude drones, eventually to high altitude manned airplanes and even commercial imagery, working with the National Geospatial Intelligence Agency.
The JAIC – Go at Scale and Speed After a couple of years of doing Project Maven, Bob Work (then-deputy Secretary of Defense) was itching to move just beyond intelligence. He said Maven was never designed to be only about the intelligence enterprise, we needed to bring in every single mission in the Department of Defense, and we needed to go much faster. There was a revolution happening in commercial industry and the DOD was not was not getting it.
I was chartered to stand up the JAIC in a form that Joe and Raj, and I’m sure Steve would appreciate. Somebody signed a memo saying, “Go stand up a joint AI Center. You don’t have any people, you don’t have any money, you don’t have anywhere to live, but you’ll figure it out.”
Lean, MVPs and the DOD Project Maven became the basis for what we did in the JAIC. We started with a cross-functional team. In commercial tech you call that an integrated product team, It’s acquisition with software engineering with UI/UX. This idea of U/UX user interface/user experience, a ruthless focus on user experience, the DOD has never been very good at that.
It’s also learning how to put things on contract fast and get things done and field them quickly. It was whatever you can do to get away from the classic DOD stovepipe way of doing business to a much more agile software approach.
Josh Marcuse and the Defense Innovation Board were instrumental in helping us see what those agile principles were and how we could get moving and go fast. And we took the classic commercial tech approach of building minimal viable products: Get something that will work good enough. Let the user know what they’re going to get as opposed to just forcing something down their throat claiming that it was much better than it really was.
Minimal Viable Products The idea of minimal viable product is not what the department of defense has lived with, it’s out there in pockets. But we need to be much better at that.
What’s “good enough” when we field these capabilities? It was never for us to say. It was for the users of the capabilities to tell us. We would give some parameters like, “This is a 95% test and evaluation solution. Do you accept it?” “I don’t know. Let me try it out.”
The other reason that we wanted to push AI-enabled capabilities out to the field as quickly as possible is because until users get to play around with it, it’s just science fiction. You hear all these grandiose stories about what AI is. But few people are saying what AI is not. And in the Department Defense it’s more about what it’s not than what it is. There’s so much more we must do to get people to use those capabilities. As soon as they touch it, they say, “Well, if it can do that, what about this?” Every time they’ve said that, we said yes, it can be it can be done. So we’ll make this product better and better in a rapid sort of agile approach of continuous integration, continuous delivery.
That is the future for the Department of Defense. If we don’t get that right, we’re doomed because AI capabilities left to themselves six months down the road will become useless. Just like any commercial software, it’s got to be a continuous development cycle. So that idea of MVP, putting capabilities in the user’s hand, letting them tear it apart, tell us what worked, what didn’t work, what they’d like to see better. That was really the core concept about Maven, and then the JAIC.
The idea of Ops and Intel working closer together, those two worlds merging, is the holy grail idea of ops/Intel fusion. These AI-enabled capabilities are getting us closer and closer to that environment. And this idea of user-defined operating picture is with us today. The performance of that will increase exponentially over the next couple of years.
Continuous Integration, Continuous Development, Continuous Delivery The other thing about AI is that you train it against one set of data that will reflect, to some extent, the real world. But once you put it in the real world you learn it never works as advertised. The first time you use it in Afghanistan you realize you never trained it against data that had women wearing full-length black burkas, it didn’t know what those were. Interesting little problem. So you get real-world data, feed it back into the algorithm and it performs better and better. A second, third time, so on, and so on. It was all about the user defining what success look like.
You need a cycle of continuous integration, continuous development and continuous delivery.
We were proud at Project Maven that the first updates of our initial algorithms were out the door in four to five months and then got better and better and better — in some cases about every two weeks. In our personal lives, we get updates pushed to us hourly in some of our apps. So that’s the goal. To be able to do that, you need this backend infrastructure and architecture, so that a soldier, sailor, airman, Marine, Space Force wherever they are, can design an app on the spot, relying on this backend infrastructure, that Joint Common Foundation.
We’re not close to doing that yet with some very limited exceptions like Kessel Run, which is not AI, although they’re starting to go down that path, too. But they’re getting into that model of, “How quickly can I get this in an agile sort of software pathway of doing things and push it out to the field as quickly as possible?”
Warfighters Need to Be Demanding Customers The biggest role that the warfighters have in this is to be very demanding customers and to say what needs to be fixed and not just accept what we’ve done to operators too many times, which is, “Look, here’s the product, take it or leave it. We’re going to get you another version five years from now, and probably $200 million over budget.”
That world is gone. We have got to get to that point where, “Here it is. What’s wrong with it? We’ll fix it as quickly as we can and we’ll update it with real-world data, it will make it better and better.” Demanding customers provide ruthlessly candid feedback, which was never a problem with the Special Operations community.
This concept of leverage and UI/UX, and all of that is so essential to everything we’re doing. And the backend requires things in addition to a common foundation, a data management platform, open API, is all the T&E tools, everything should be available to everybody in the Department of Defense.
You Need a Disrupter And then of course you need a classic disrupter. Somebody who does not take no for an answer, who breaks a little glass and makes some people a little bit upset in terms of overturning their apple carts. Because there are so many obstacles in the Department of Defense it would be easy to become disillusioned and just give up on the whole enterprise. The role I needed to play was top cover for the disrupter. It’s the combination of this top-down advocacy and pressure, and this bottom up innovation. And then you bring in a disrupter that gets this thing going.
This is what Raj Shah did at DIUX. It’s what AFWERX has to deal with. It’s what Hondo Geurts had to deal with when he was running SOFWERX. It’s what Enrique Oti has done up at Kessel Run, Chris Lynch at the Defense Digital Service. These were classic disruptors — strong personalities running innovation organizations in innovative ways.
Scaling The Organizations Across the DOD But now you had to take all those models and begin to learn, how do you scale them across the Department of Defense? That is incredibly hard. And that’s what the JAIC was designed to do, you spark the movement for the next decade, 15, 20 years of movement.
But unless you take those organizational models and begin to scale them across the Department of Defense, they’re sitting there as one-off organizations. They’re critical but they’re insufficient. You need to inculcate a startup culture in the institutional bureaucracy of the Department of Defense.
One of the most important things we were working on in the JAIC is this thing called the Joint Common Foundation.
Joint Common Foundation It is an architecture and infrastructure — for lack of a cleaner term, call it a platform as a service, a DevSecOps or AI/Ops environment. On top of an Enterprise Cloud environment that’s supposed to be called JEDI. To build this dev SEC ops, AI ops environment, which is to give everybody in the Department of Defense equal access to everything from data, to AI tools, to all the security environment, to Jupyter notebooks, you name it, everything you would need to develop AI. The JAIC is building that as a common foundation.
There are 200 people in the JAIC, and that includes contractors, it’s probably not going change the entire Department of Defense and their AI way of doing business. But what it has to do is leverage more. The idea of everything that JAIC does is a product available to everybody else in the Department of Defense, they come, pull it off the shelf, so to speak, and use that to leverage the entire Department of Defense. Otherwise JAIC will be an interesting organization and last for a few years and go away.
The Joint Common Foundation is designed to make that available to everybody across the Department of Defense. And I think over the next few years that Joint Common Foundation will be what the JAIC becomes known for as much or more than anything else it’s doing. The services will figure out the technology piece, it’s just they need a little bit of a push, that flywheel has to get turning a little bit faster.
New Operating Concepts Versus Doctrine Even more important than this, is the idea of developing new operating concepts. New operating concepts do not come out of the Pentagon. Pentagon writes great doctrine. Doctrine is all sorts of instructions and directives and great PowerPoint slides; the operating concepts will come from those on the tactical edge or the operational environment.
And what does the world of AI, Enterprise Cloud, 5G, and someday quantum look like? I don’t know, but it’s not for us to say, it’s for the users to be able to figure it out, by letting them try it out in operational settings. I believe there is no mission in the Department of Defense that will not benefit – from the introduction of AI-enabled capabilities from the back office, to the battlefield, from undersea to outer space, in cyberspace and all points in between.
Read the entire transcript of General Shanahan’s talk here and watch the video below.
youtube
If you can’t see the video of General Shanahan’s talk click here
Lessons Learned
The DOD recognized that AI was one of the potential game changers
They set up the JAIC (Joint Artificial Intelligence Center) to see if they could Leverage AI across the DOD
They built products using modern processes – continuous integration, continuous development and continuous delivery
The group required a “Disrupter,” someone willing to break glass to push these ideas
Over time, JAIC has realized that scaling AI across the DOD will not come from delivering individual solutions
but by having a Joint Common AI Foundation that’s accessible by all DOD app developers
0 notes
Text
Technology, Innovation and Modern War – Class 6 – Will Roper
We just held our sixth session of our new national security class Technology, Innovation and Modern War. Joe Felter, Raj Shah and I designed a class to examine the new military systems, operational concepts and doctrines that will emerge from 21st century technologies – Space, Cyber, AI & Machine Learning and Autonomy.
Today’s topic was Innovations in Acquiring Technologies for Modern War.
Catch up with the class by reading our summaries of the previous five classes here.
Our guest speaker was Hon. Will Roper, Assistant Secretary of the Air Force.
Some of the readings for this class session included: Defense Innovation is Falling Short, Dr. Will Roper’s recent AMA about AFWERX and AFVentures and The Future of Defense task-force-report
Acquisition, technology, and logistics In some of our class sessions you’ve heard about how acquisition in the Department of Defense hasn’t kept up with new threats, adversaries, and new technologies. But Will Roper who runs Air Force acquisition, technology and logistics, gives lie to that assertion. He gets it. And he’s running as fast as he can to move the Air Force into the 21st century. It was an eye-opening conversation.
Will Roper is responsible for spending $60 billion acquiring 550 programs as well as technology and logistics. His resume reads like he trained for the job: bachelor’s and master’s in physics and Ph.D from Oxford in Math. He started his career at MIT Lincoln Labs, then was Chief Architect at the Missile Defense Agency, the founding Director of the Pentagon’s Strategic Capabilities Office. (The SCO imagines new, often unexpected and game-changing uses of existing government and commercial systems.)
This entire class session was a talk by Will and Q&A with the students. It would be easy to just put up the video and the transcription in this blog and be done with it. But that would do a real disservice to the insights Will offered. It’s interesting to note how many of his observations echo the ones Chris Brose made in the previous session. I’ve extracted and paraphrased a few below, but I urge you to read the transcript and watch the video.
Here’s what Will had to say:
Competition with China I view the competition with China as one of the seminal challenges that we’re going to face in this century. It’s not a fait accompli how it’s going to end. But it’s a very different challenge, because it’s not a Cold War part two. We’re very economically intertwined with this competitor. But we do have to treat it just as if it was an existential race. Because we have a very different world view than that competitor does.
Commercial technology has changed the DOD model Commercial technologies are being driven faster than any government can keep up with, though many governments are trying to steer it to their own advantage. And many of the technological breakthroughs that could be important to the military are going to be available to everyone. So, the model that worked so well in the Cold War, where you made a technology breakthrough, you did it exclusively inside your own country. And because you were annexed from your competitor, you could develop that technology, instantiate it in your military and field it for advantage, really doesn’t make a lot of sense in this decade and in this century. Technology is what it is. Governments play a strong role in it, we can incubate it, we can accelerate it, we can create it, but we’re increasingly a smaller fraction of what happens commercially.
I view the Pentagon being in a time of crisis, where it’s really trying to figure out its role. Where it’s not the major funder of innovation anymore. It has a sizable budget. It’s a sizable market. But it’s not the major driver of invention. And I find most of the people working in it have a hard time with that. They have been in the building since before the Cold War and have really not been outside to see that the times have changed. But I love the times that we’re in. Technology is cheap, it’s ubiquitous, it’s fast, it’s moving.
The Pentagon’s challenge is to reboot itself, to get rid of those Cold War processes that we’re very good at inventing technology that would change the world.
Now we have to be good at bringing technology in from the outside Now, we have to be good at adapting technology, bringing it in from the outside and instantiating it. We need to be better at building partnerships. But it’s not actually the way we organize the business. And there are so many great areas for partnership between the military and commercial innovators, that we’re missing out on opportunities. And AFWERX and other organizations that I’ve tried to stand up in the Air Force to create partnerships are a central paradigm for how we move innovation forward.
The military is going to have to treat technology wherever it is as a battlefield in and of itself. And that is not how the Pentagon is set up to run.
If we don’t engage proactively, I think what we have seen happen with hobbyist drones a few years ago is a harbinger of what could become the status quo in future years. Where technologies may emerge in one innovative sector, but if we’re not proactive and engaging with them, then the supply chain and market will move overseas to another country’s advantage. And this is not the Pentagon’s playbook.
The presupposition that the future can be predicted is no longer true We are very good at having an adversary that we can forecast well. Having good intelligence on them, formulating our view of their future, creating a model of what we think they will bring to bear on the battlefield both technologically as well as operationally. We create our own counter solution to what we predict.
We build it, hopefully get to it first. And once we field it, we hope that countering what we have done leads to a strategy that leads to us victory.
That worked well in the Cold War. There’s no indication that will work well in the situation we find ourselves in today. So, as I’ve as I’ve engaged in Air Force and Space Force acquisition it starts with the presupposition that the future can be predicted. You won’t find that written down in any acquisition document. But it’s actually foundational to how the Pentagon works. The future is predictable. And it’s not.
No telling which technology is going to lead I have no idea what the future is going to be. I have no idea what 2030 is going to be. Who knows what technology is going to be the next big thing. You’ll find people in radically different camps. You’ll find one group centering around AI. But you’ll find different people who will say no, quantum systems are going to allow radically different phenomenology to be brought to bear. Not just computing and encryption but sensing. And they’ll be next to a group that will say “Nope, biological systems are going to allow fundamentally different approaches to building sensors and computing and sensing.” And you’re not going to have to wait on those exquisite quantum systems because you can hack biology and do it sooner. And the camps go on.
So that just tells me this is a wonderful time for technology. It’s everywhere, it’s not expensive to engage in. And there’s no telling which technology is going to lead to that next Industrial Revolution. I think that really is the competition amongst nations, that many of these technologies could birth a new industrial revolution. And whichever country does it, it’s going to be to such a decided advantage, that the military part of the equation is probably moot.
The Pentagon needs to be fast and agile But the military, because it is a very stabilizing and unique part of any country’s market system, has to play a catalyzing role in setting that country up to find that Industrial Revolution faster. The Pentagon is not suited for this. So the $60 billion per year procurement system that I run for the Air Force and Space force, the strategy is pretty simple. You need to be exceptionally fast and agile. The Cold War system wasn’t. And the system in this century must be. Because we don’t know what the next big thing is going to be. So let’s be ready to adapt to it. Speeding the system up is not as hard as you think. It’s just not what was valued in the past. So you just simply have to change the value system, change the culture, and the system will speed up.
The harder part is teaching the Air Force and Space Force to work in the broader ecosystem. It’s very easy to fall back into the historical process that predicts the future, derives a solution for that future, and then kicks it out to a handful of companies, defense companies, that that we have historically gone to in recent times to help us build that future. And with so many fields of technology now available, we simply can’t work with a handful of companies and expect to win.
Acquisition and procurement need new rules Defense Research and Development is only one fifth of the total R&D that our nation does. In the height of the Cold War we were four fifths. That doesn’t mean that we’ve gotten any worse at research and development at the Pentagon, it just means that the landscape has changed. And we haven’t. So teaching our acquisition system, our procurement system, that it needs a different set of rules to work in the four fifths of our nation’s R&D that’s commercial has been exceptionally challenging. Because everything about the way we do business is hard for commercial innovators. So standing up organizations like AFWERX that have a completely different model and culture and ethos, their job is to treat emerging commercial markets as a battlefield. And to try to bring the military’s mission as a way to accelerate commercial companies, not just to help military missions, but to accelerate them as an end state in and of itself. Because that is in our national interest.
Accelerating Technology I found that within the Air Force, we can rally around this as a core mission. That accelerating technology is something that can be understood by anyone that we’ve trained in the military because it’s easy to understand it. If that company, if that technology, if that market, doesn’t happen in the US first, it’s likely to happen somewhere else. And if it happens somewhere else, there’s no guarantee we’ll have access to it. So that’s a second imperative that we have to be able to work in our entire tech ecosystem.
The DOD – Great in hardware, lagging in software The summary of what I’ve seen is the Pentagon is very good at maintaining technological disciplines that were born in the Cold War. We’re still very good at things based on Maxwell’s equation. That radars and stealth and antennas and radios and materials. But we have not learned to work in the commercial ecosystem.
And we have not learned to work in digital and software-driven technology. If we learn those just very small handful of lessons, we’ll be closer to being the agile, disruptive system we need to be. Now we’re competing against an adversary in China that will likely have double our GDP and quadruple our population, and perhaps have 15 times the STEM graduates that we’ll have by the year 2030. So we’re not going to beat them at scale. Speed and agility are the only way that we can ensure that we have a leg up.
I’m very pleased with the progress the Air Force has made. This is just lap one of what is going to be a very long race. And this race doesn’t end. There’s no way to forecast what the end state relationship will be between the US and China.
So we need to hope for the best but prepare for the worst. For the time being that means treating every new technology or possible new technology as an opportunity to hope for but also a detriment to fear. And I hope that if we inculcate that urgency within our organization, that we will become the kind of Air Force that is ready for whatever we call this competition with China.
Some people call it a hot peace. I don’t really care about slang and slogans. I just know it’s real. We have to treat it seriously and remain urgent. So far, I’ve been very pleased with how ready for the challenge that we’ve been. And I hope that we won’t be the only service to move out as aggressively as we’ve done. It’s going to take an entire team to keep this up over time.
Read the entire transcript of Will Roper’s talk here and watch the video below.
youtube
If you can’t see the video of Will Roper’s talk click here
It was interesting to note what Will didn’t say in a public forum as what he did say. My guess is that in this transition from legacy systems to new platforms, each of the service acquisition executives has to deal with the parochial concerns of existing contractors and congress, all scrambling to keep their part of a finite defense budget. Acquisition execs like Will likely spend more time trying to get rid of existing “legacy” programs as they do getting new ones funded. For the Air Force it’s manned versus unmanned aircraft. For the Navy it’s more carriers versus other platforms. For all services it’s exquisite systems versus mass expendable ones, etc..
And as an extra bonus read Will Roper’s talk “There is No Spoon” here.
Lessons Learned
Competition with China is one of the seminal challenges we’re going to face in this century
The Pentagon is very good at maintaining technological disciplines that were born in the Cold War
The Cold War model of exclusively inventing it and then using it only for your military is no longer true
Today’s technological breakthroughs are going to be available to everyone.
We’ve not learned to work in digital and software-driven technology
The Pentagon’s challenge is to reboot itself, to get rid of those Cold War processes
Now we have to be good at bringing technology in from the outside
The presupposition that the future can be predicted is no longer true
No telling which technology (AI, autonomy, biotech, space, etc.) is going to lead
You need to be exceptionally fast and agile. The Cold War system wasn’t
Speeding the system up is not what was valued in the past
So you have to change the value system, the culture, and the system will speed up
We need to work in the broader ecosystem. We simply can’t work with a handful of companies and expect to win
0 notes
Text
Technology, Innovation, and Modern War – Class 5 – Chris Brose
We just held our fifth session of our new national security class Technology, Innovation and Modern War. Joe Felter, Raj Shah and I designed a class to examine the new military systems, operational concepts and doctrines that will emerge from 21st century technologies – Space, Cyber, AI & Machine Learning and Autonomy.
Today’s topic was The Challenges of Defending America in the Future of High-Tech Warfare.
Catch up with the class by reading our summaries of Class 1 here, Class 2 here, Class 3 here and Class 4 here.
Our guest speaker was Christian Brose, author of The Kill Chain and now the head of strategy for Anduril Industries.
Some of the readings for this class session included:Brookings webinar moderated by Michael O’Hanlon with Christian Brose, Mara Karlin and Frank Rose, The New Revolution in Military Affairs: War’s Sci-Fi Future.
War Made New The required reading for this class was Chris Brose’s book The Kill Chain. We thought the students would find having the author discuss the thinking behind the book enlightening. It was.
There are few people as qualified as Chris Brose to opine on the state of national defense. Before Brose moved into the civilian world at Anduril, he was the staff director of the Senate Armed Services Committee overseeing all the programs, policies, and resources of the Department of Defense, as well as confirming the Department’s senior civilian and military leaders. He was also responsible for leading the production, negotiation, and passage of the 2016-19 National Defense Authorization Acts. He previously was the senior policy advisor to Senator John McCain supporting his work on the Senate Armed Services Committee, the Senate Select Committee on Intelligence, and the Senate Foreign Relations Committee. And before the Senate he was senior editor of Foreign Policy magazine and served as policy advisor and chief speechwriter to then-Secretary of State Condoleezza Rice.
This entire class session was a talk by Chris and Q&A with the students. It would be easy to just put up the video and the transcription in this blog and be done with it. But that would do a real disservice to the insights that Chris offered. I’m going to extract and paraphrase a few below, but I urge you to read the transcript and watch the video.
Why Did Chris Write The Kill Chain? Chris was increasingly concerned that the United States was falling behind our adversaries and nobody was paying attention to the extent of the problem.
Chris observed that the reality is that we are being disrupted in a way that most Americans and most members of Congress don’t fully understand and appreciate. China has specifically and explicitly focused on undermining the core assumptions on which the United States has been planning to project military power for 25 to 30 years. The assumption was that we would:
be able to fight on timelines of our choosing
control the timing and tempo of military competition and operations
be able to build up forces and operate from sanctuaries that an adversary couldn’t contest
be able to move combat power into places that we needed it
have military technological superiority over any competitor
be able to move and shoot and communicate with near impunity and qualitatively
dominate even quantitatively superior adversaries
These assumptions are no longer true.
The Defense Industry Since the end of the Cold War our defense industry has become increasingly concentrated, consolidated, uncompetitive and essentially hollowed out. We have gotten extremely good about building a force around very small numbers of very expensive exquisite, heavily manned and hard to replace military systems. We built up a system to produce a certain type of military power at a time when that whole business model is being disrupted and undermined — much as Blockbuster Video’s business model was undermined by Netflix and Apple.
Disruptive Technology The new technologies and capabilities that will be central to military advantage in the future – artificial intelligence, machine learning, autonomous systems, distributed networking, advanced manufacturing, and commercial space, etc. are technologies largely driven by commercial innovation and commercial companies. The future will be dominated by large quantities of small or cheaper, more autonomous, more intelligent military systems. This is also true of things that are not military platforms: networking, the movement of information, and the weaponization of data.
The Threat Landscape We don’t know what the world is going to look like. We don’t know what our competitors are going to do. We don’t know what new technologies are going to be developed next month or next year or next decade. And we ultimately don’t know how we’re going to want to organize ourselves and build operational concepts to employ these new technologies.
We need to have more humility around the best way to experiment and feel our way through the future. And take account for what will inevitably happen: We’re going to get things wrong. We’re going to fail to predict the future and we’re going to need to end up in places we didn’t foresee.
We’ve got to get out of the trap of trying to define the requirements for our inputs. We need to value new, innovative, completely unpredictable and surprising capabilities, concepts and organizational Innovation that allow us to solve these problems differently.
Our system is not designed to do that. Our system is designed to try to predict the future in ten, 20 or 30 years. Then write requirements to what we think it’s going to look like and then throw a lot of money at industry to deliver that future on very long timelines. “Shockingly” many of those things are irrelevant when they show up, if they ever show up at all.
Changing Acquisition As a buyer of technology and capability, the Department of Defense now can decide to buy different capabilities to match this new world. They can create different incentives for different types of industries to work with them and for them. They can create incentives for private capital that’s sitting on the sidelines to flow back into the Defense sector in a way that hasn’t happened for a very long time.
The only way we’re really going to change is by trying to create more and more pockets in the defense portfolio and programs that are open to real competition. We have a system that’s geared around valuing and buying inputs rather than defining what we want our outcomes to be. We need pockets of marketplace-type behavior where actual systems are competed out based on outcome-oriented metrics. And we buy new things more regularly.
The DOD and Congress can create incentives to take advantage of the willingness and ability of leading technology developers to solve these problems. However, they won’t create a new commercial ecosystem if they continue to dole out small SBIR account grants and million-dollar OTA’s (door prizes for showing up) while the same five national defense contractors they’ve been paying for the past three decades still get the billion-dollar programs. The DOD has to write checks to new vendors for programs at scale.
Making Change Happen The DOD admits they have a problem. They admit they need to do things differently. Now we get down to the difficult questions of execution and implementation, which is where they have foundered in the past. They haven’t ended up in this position due to a lack of people saying the right things. We’re here because they have failed to do so many of the things they have said (in many cases for decades).
From an organizational standpoint, change won’t come internally. Major kinds of organizational reforms tend to originate outside of bureaucratic institutions. It’s going to take an external act, such as the Secretary of Defense coming in to work with the Congress, to essentially say we do need to do things differently. It is going to involve more risk and the only people in our system capable of doing it are our senior leaders, whether they’re confirmed by the Senate or elected by the American people.
Read the entire transcript of Chris Brose’s talk here and watch the video below.
youtube
If you can’t see the Chris Brose’s talk click here
Student Takeaways From Chris’ Talk
Lessons Learned
The military advantages we had as a nation in the 20th century are gone
China has systematically negated each of our strengths
Our nation is no longer guaranteed to win a war
Our Defense industry has built expensive and exquisite systems that are few in number and now extremely vulnerable
That’s no longer the correct model
AI, machine learning, autonomous systems, distributed networking, advanced manufacturing, commercial space, etc. are largely driven by commercial innovation and companies
The Department of Defense has given lip service to change but institutional inertia – measured by actual spending – is holding us back
We need to rapidly pivot to using new contractors at scale
The DOD needs to rapidly integrate commercial tech into new capabilities that
Replace attrited assets
Enhance existing capabilities
Create new capabilities and concepts that leapfrog our adversaries
0 notes
Text
Technology, Innovation, and Modern War – Class 4
We just held our fourth sessions of our new national security class Technology, Innovation and Modern War. Joe Felter, Raj Shah and I designed a class to examine the new military systems, operational concepts and doctrines that will emerge from 21st century technologies – Space, Cyber, AI & Machine Learning and Autonomy. Today’s topic was Defense Strategies and Military Plans in an Era of Great Power Competition.
Catch up with the class by reading our summary of Class 1 here, Class 2 here and Class 3 here.
Our guest speaker was Bridge Colby, former Deputy Assistant Secretary of Defense for Strategy and then Secretary of Defense Jim Mattis’ point person for articulating his vision for the National Defense Strategy.
Some of the readings for this fourth class session included: National Security Strategy, 2018 National Defense Strategy, National Military Strategy Summary, The Age of Great-Power Competition, The China Reckoning: How Beijing Defied America’s Expectations, The Administration’s Policy Toward China, The End of American Illusion. Trump and the World as It is, Indo Pacific Strategy Report 2019
In this session we provided the students with an appreciation of how the United States National Security Strategy arrived at the conclusion that we are in an era of great power competition with Russia and China. Next, we introduced the National Defense Strategy (NDS) which describes how the military supports the overall National strategy. The NDS observed that we not only faced non-nation states (terror organizations,) but going forward we have to plan for 2+3 adversaries (China, Russia, Iran, North Korea and the non-nations states.) The NDS provided an outline of what we need to do (called Lines of Effort) to transform our military.
If you can’t see the slides click here.
Joe Felter (who was the Deputy Assistant Secretary of Defense for South and Southeast Asia) began the lesson providing background and context for understanding – What happened? Why did we shift our strategies and military plans? And what do these plans look like today.
Great hopes for international security In 1989, when the Berlin Wall came down, it marked the symbolic end of the Cold War. The United States emerged as the dominant power in the international system and its Cold War rivals appeared to be moving down a path of reform. We had great hopes for an international security environment that would advance common interests among large and small nations through international cooperation and engagement.
Russia at the time showed promising signs of moving closer to democracy. The break-up of former Soviet states put the country on the path of increasing liberalization and reform. Former Warsaw Pact nations expressed interest in working with and aligning more closely with its former rivals. Several joined NATO.
Meanwhile, China’s economy was growing at an extraordinary rate and becoming more integrated with countries across the region and beyond. All prevailing theories of modernization predicted that this growth and would lead to increasing liberalization and reform in China. It was considered to be on a trajectory towards becoming a “responsible stakeholder��� willing to play by the rules of the established order.
Beyond these encouraging developments with our former Cold War rivals the US assumed a position of unparalleled military dominance. Shortly after the fall of the wall this overmatch and dominance of US military power was put on display during Desert Storm where the US achieved quick and decisive victory destroying the world’s 4th largest Army in 100 hours of ground combat.
Optimism turns into reality Fast forward to 2017. Conditions were far from where we hoped in the heady optimism following the Cold War. Putin’s Russia is intent on undermining the US and West in any way it can – aggression in the Crimea and Ukraine and destabilizing activities in Syria; Venezuela and beyond. Adding to this are it’s state sponsored poisonings and assassinations, cyber-attacks against nations and election meddling in the U.S. and other countries.
In China Xi Jinping and the CCP pursuing a deliberate whole of government approach to projecting influence if not dominance of the Indo-Pacific region and beyond. Disappointingly, the liberalization and reforms so many assumed would accompany its rapid economic growth did not occur. The CCP explicitly states its intention for China to be a dominant power with benchmarks and years identified. For example, President Xie leads the Central Military Commission that in 2012 committed to building a military that can dominate the region and “fight and win global wars by 2049.”
To do this, China is pursuing a military build-up of an historic scale with a seven-fold increase in its defense budget in the last two decades. It is investing in high tech weaponry to close the gap and in many cases extend their advantage in a range of military capabilities and technologies.
Beijing engages in predatory economics – driving states into significant debt burdens forcing them to make “debt- for equity” swaps in places that undermine their sovereignty Its Belt and Road Initiative makes infrastructure and other investments with a clear nationalist agenda. It is increasing its de facto project power projection capabilities by developing and establishing access to a network of dual use ports, airfields, and other facilities across region. Some argue that China is even in the early stages of establishing a strategically located naval base in Cambodia which course co-instructor Joe Felter raised the official alarm following a visit to the southern port while serving as a senior official in the Department of Defense.
China’s militarization of features in the South China Sea is perhaps the most egregious example of its illegal efforts to build military capabilities and extend the PLA’s ability to project power. Despite Xie’s promise to President Obama in Jing Peng Rose garden 2015 and the international tribunal ruling by the Hauge in 2016 that its claims have no basis in international law, China continued to fortify its illegal claims building runways, radars, missile sites, storage facilities and other improvements.
See time-lapse videos of the reefs turning into a military base here and here.
The U.S. National Security Strategy and National Defense Strategy These were the conditions we confronted in 2017 when the current National Security Strategy (NSS) and National Defense Strategy was developed. These strategies reflected the realization we are in long term competition with Russia and China and must make a clear-eyed assessment and treat these competitors for who they are and not as we want them to be. As the NSS states Just as American weakness invites challenge, American strength and confidence deters war and promotes peace.
The 2018 National Defense Strategy (NDS) pulled no punches. It was a real wakeup call for the military and the country. As Bridge Colby said in his talk to the class, “others described it as the first realist document we’ve had as a country in a long time.” Bridge points out that after the Berlin Wall fell we were the sole superpower and the country really didn’t need a defense strategy. We had so many resources relative to the plausible threats that we could essentially overwhelm any adversary.
Besides explicitly acknowledging we are in long term strategic competition with Russia and China. It said that our regional priorities would shift from the Middle East to Indo-Pacific and China. And China is recognized as the more powerful and potentially dangerous threat. The National Defense Strategy outlined three major lines of effort that the Department of Defense needed to execute to face these new 2+3 challenges:
Line of Effort I: Build a more lethal force
Line of Effort II: Strengthen Alliances and Build partnerships
Line of Effort III: Reform the Defense Department
And the US has made important progress across all three of these lines of effort.
(Our students heard this quarter about some of the efforts aimed at reforming the Department of Defense – requirements and acquisition reform from Will Roper, new innovation organizations like the JAIC (Joint Artificial Intelligence Center,) from General Shanahan, AFWERX, Kessel Run, NavalX,…and they’ll hear more later this quarter from General Raymond about standing up a new service branch – the Space Force.)
So how are we doing so far? First the bad news. China is making gains and many are at the expense of state sovereignty across the region which in some cases will be difficult to reverse (ie Hong Kong.) Under Xi and the CCP, China is structurally set up in many ways to compete more effectively e.g. with its coherence and continuity of leadership, civil/academic/military fusion. Other examples include how China’s State-Owned Enterprises can be employed by the CCP for coordinating and projecting influence more efficiently.
But there is good news that bodes well for the outcome of this long term competition. The US has a vision that is largely shared and embraced by those that wish to see the region remain free and open and for the rules-based order to endure.
Significantly we are not asking states to choose between the US and China- but rather to choose their own sovereignty and a vision for future. Our challenge, however, is to ensure our actions match our strategy- demonstrating that the US is a reliable partner and will deliver on its stated goals and objectives.
Bridge Colby gave us some compelling insights on the 2018 National Defense Strategy and participated in an informative Q&A session with our students. He provided an insiders account of the development of the National Defense Strategy and an informed assessment of its execution.
Read the transcript of Bridge Colby’s talk here and watch the video below.
If you can’t see the Bridge Colby talk click here
youtube
Lessons Learned
The National Security Strategy arrived at the conclusion that we are in an era of great power competition with Russia and China
The National Defense Strategy (NDS) describes how the military supports our nations overall strategy
It observed that we still face non-nation states (terror organizations,) but have to plan for 2+3 adversaries – China, Russia, Iran, North Korea and the non-nations states
Our regional priorities shifted from the Middle East to Indo-Pacific
China is recognized as the more powerful and potentially dangerous threat
We want our adversaries to choose diplomacy not war. To do so, we..
are developing a lethal force (the NDS Line of Effort I) to decisively defeat adversaries in future conflict
this ensures no state calculates it can successfully use force against the US to achieve its objectives
and therefore it must rely on diplomacy and other means short of war
The US has a significant advantage in its network of alliances and partners
Strengthening these alliances and building new partnerships (the NDS Line of Effort II) will be critical to our ability to compete effectively
0 notes
Text
Technology, Innovation, and Modern War – Class 3
We just held our third session of our new national security class Technology, Innovation and Modern War. Joe Felter, Raj Shah and I designed a class to examine the new military systems, operational concepts and doctrines that will emerge from 21st century technologies – Space, Cyber, AI & Machine Learning and Autonomy. Today’s topic was Sourcing, Acquiring and Deploying Technology for Modern War.
Catch up with the class by reading our summaries of Class 1 here and Class 2 here.
Class 3: Our guest speaker for session 3 was Anja Manuel, former State Department official, founding partner of Rice, Hadley, Gates and Manuel and author of This Brave New World: India, China and the United States. Some of the readings for the session included: Esper’s Convenient Lie, How to Win the Tech Race with China, The Age of Great-Power Competition.
If you can’t see the slides click here.
Winning the Wars We Knew Joe Felter, former Deputy Assistant Secretary of Defense for South and Southeast Asia, started the class showing excerpts from General MacArthur’s famous Duty, Honor, Country speech given to the Corps of Cadets at West Point in May 1962. In what would be his final address to his alma mater, MacArthur admonished these future leaders of the United States military that, “Through all this welter of change, your mission remains fixed, determined, inviolable: it is to win our wars. Everything else in your professional career is but corollary to this vital dedication. You stand as the Nation’s war-guardian, as its lifeguard from the raging tides of international conflict.”
Back in MacArthur’s day, fighting a conventional conflict akin to the wars America experienced in the 20th century was certainly not expected to be easy. Confronting the massive armored formations of the Soviet Union in the Fulda Gap or engaging in a proxy war fought in another theater would be costly and difficult to prevail (not to mention the specter of escalation to a nuclear exchange). But with known adversaries and technologies the weapon systems and operational concepts we expected to rely on to win our future wars were, however, easier to anticipate and simpler to define.
For example, in the aftermath of Pearl Harbor the U.S. knew how – and largely where – to respond. The country mobilized its resources and industrial base, raised powerful military forces and projected power – directing it at a defined enemy and the enemy’s industrial base. In conventional state-on-state warfare, the operational and tactical level activities that support a strategy to win are often clear. You mass fire power on objectives. You destroy the enemy’s military and industrial capabilities and seize terrain. All those things are missions that the military can get their head around.
In MacArthur’s time we defeated our enemies and drove them to unconditional surrender. We did so by using the superior power (both quantity and quality) of our weapons and how we employed them.
After WWII the weapons and defense systems we acquired and deployed reflected this experience. In the 1950’s we leveraged our industrial capacity and innovated by producing five new fighter designs and three new classes of aircraft carriers, and nuclear-powered attack and ballistic submarines.
As we pointed out in previous class sessions, in the 20th century, requirements were known years ahead of time and the DoD built incrementally better versions of the same platforms. (Although our experience in Vietnam would foreshadow the issues of unconventional warfare the U.S. faced in Iraq and Afghanistan.)
Winning our wars remains-as MacArthur characterized- the military’s fixed and inviolable mission. However, the conditions we will fight in the future are much different, than in the wars we prevailed in during MacArthur’s time. How we prepare for and fight future wars must reflect these new realities of modern war. Adaptability has always been an essential attribute of successful militaries.
We will discuss these ideas further in later class sessions.
Two Acquisition Paradigm Shifts Raj Shah, former head of the Defense Innovation Unit, pointed out that men and women in uniform have signed up to support national security with the equipment that they are given and must make do with what you give them. These men and women are quite resourceful to achieve the mission as best they can with the gear they have.
However, if we give them equipment that fails to keep up with the threat or state of the art, our warfighters bear a cost (ultimately with their lives) that they and the nation will pay. So, it’s incumbent on us to think about the ramifications of these acquisition decisions. It’s better to take risk in the hallways of the Pentagon than on the battlefield – risk aversion in the former will force risk acceptance in the latter, with potentially grave consequences.
There are two paradigm shifts going on in the DOD. The first, the transition from buying a small number of exquisite systems versus large number of low-cost systems. And the second, the shift from the DOD contracting everything from defense primes to building software themselves or serving as the integrator for off-the-shelf commercial systems.
To illustrate the escalating cost of military hardware, Norm Augustine, former CEO of Lockheed famously graphed out how much each airplane costs. On the bottom left, a Wright brothers plane in 1910 cost ~$5,000 in today’s dollars. If you follow the cost line up and to the right, the F 22 Raptor – is a $300 million a plane (if you include all the R&D costs).
Augustine’s tongue-in-cheek conclusion was that if we followed this trend line, by 2050 the entire defense budget will purchase just one aircraft. And that aircraft will have to be shared by the Air Force and the Navy for three and a half days a week, except on a leap year when it will be available to the Marines for that extra day.
While Augustine was being facetious, the consequence of escalating costs of these exquisite systems plays out in the way he described. The Air Force said we needed 750 F-22s to meet all the threats. They ended up buying 187. They said they needed 132 B-2 bombers. They ended up buying 21. We design these world-beating systems, but because they’re so expensive, and it takes so long to build them, and the threats change before they get deployed, we’re going to be left behind.
The same story is being played out in our satellites in space. The National reconnaissance office builds satellites the size of school buses and they can do more than any other countries. But we just have a handful of them — all of them big, fat targets. But Planet Labs and SpaceX are launching thousands of satellites that individually aren’t as good, but collectively illustrate the trend of mass commodity versus exquisite.
At the same time, the Department of Defense has finally realized how important software is. In fact, many of our most advanced airplanes and ships are really software delivery vehicles, meaning the software, not hardware, is the primary driver of capability. Over the last few decades, the ability of the DoD to design and even understand modern software design had atrophied. The good news is that DoD has recognized this and has announced a new policy for acquiring software, and have start building ‘software factories’ with names like Kessel Run (USAF) and Kobiyashi Maru (Space Force). Raj had a front row seat in this revolution:
youtube
If you can’t see the video click here.
Many of the innovations that will shape future conflicts will increasingly occur in the commercial technology base. Advancements in these technologies will be driven by consumer demand and the potential for profit- not government directives. Requirements are not known years ahead of time. So, the DoD needs a new way of engaging and acquiring these fast evolving technologies. Fortunately, real progress is happening across the DOD. There had been a wellspring of new initiatives and reform. Hopefully the most successful of these initiatives will be broadly scaled across the department and federal government. These positive trends include: Software color of money reform, Middle-tier acquisitions, Other Transaction Authorities (OTAs), Commercial outreach organizations, SIBR reform, software factories, talent pipelines, rapid prototyping, digital engineering, and more (it’s a very exciting time to be a reformer in the DoD). But these initiatives will need to overcome institutional barriers to scale; our hope is that Congress, uniformed leaders, political appointees, and traditional contractors will continue to work together to improve the ability of democracies to deter and prevail against potential adversaries.
Guest Speaker – Anja Manuel Anja Manuel is the author of This Brave New World, an overview of the political and economic relationships between India, China and the US.
youtube
If you can’t see Anja Manuel‘s talk click here
Lessons Learned
20th Century U.S.-centric rules for war were built around known adversaries and technologies
The conditions we will fight in the future are much different
The Vietnam War would foreshadow the issues of unconventional warfare the U.S. faced in Iraq and Afghanistan
The Department of Defense is coming to grips with two major transitions
from buying a small number of exquisite systems to a large number of low-cost systems
from the DOD contracting everything from defense primes to building software themselves or serving as the integrator for off-the-shelf commercial systems
0 notes
Text
Technology, Innovation, and Modern War – Class 2
We just held our second session of our new national security class Technology, Innovation and Modern War. Given the tech-centricity of Stanford and Silicon Valley, Joe Felter, Raj Shah and I designed a class to examine the new military systems, operational concepts and doctrines that will emerge from 21st century technologies – Space, Cyber, AI & Machine Learning and Autonomy.
Catch up with the class by reading our summary of Class 1 – here.
Our guest speaker this session was Max Boot, author of War Made New.
Class 2:
Some of the pre-class reading included watching the Secret History of Silicon Valley and reading selected chapters of Max Boot’s book, War Made New.
If you can’t see the slides click here. The text below refers to the slides.
The Technology-to-Weapons-Cycle Our second lecture was a discussion of how new technology turns into new weapons and new doctrine. Simply stated, this cycle is a repeatable pattern that has been occurring for hundreds if not thousands of years. Our proposition to the class is that once the pattern is understood we can manage it and hopefully accelerate it.
As an example of the technology to weapons cycle, we used the evolution of farm tractors with treads to tanks. Late in the 19th century, manufacturers of farm equipment put treads on tractors to navigate muddy fields. Once this technology innovation occurred, the British, French, and Germans envisioned a military use for it in World War 1. Tanks would be used to defeat the machine-gun and to penetrate layered trench defenses so infantry and cavalry could advance. The British were the first to use tanks on the battlefield in mass attacks. However, the early versions of tanks performed poorly at the battle of Flers-Courcelette in 1916 and Cambrai in 1917. In hindsight, they failed because: 1) the technology was at the beginning of its S-Curve (immature technology and features, buggy, prone to breakdown etc.) and 2) there was no prior learning of how to coordinate the use tanks on the battlefield (they lacked a doctrine.)
In the years that followed, incumbents in the U.S. Army, both internal (existing leadership) and external (existing contractors,) used these early WWW1 failures as rationale to keep the status quo – in this case horses/cavalry. Over the next 20 years, tank technology matured, and it was the Germans who fielded the Panzer III (each with radios,) as part of a combined arms doctrine that integrated tanks with infantry, artillery and air support. Slides 3-9
The result was that in May 1940 five panzer divisions crossed through the Ardennes and France fell to the Germans. After another half a century of refinement in tank warfare and doctrine U.S tanks would overwhelm the Soviet equipped Iraqi Army at the battle of 73 Easting.
As the history of the tank shows, often the ones who best exploits new technologies isn’t the inventor, or the first user of a new class of weapon (which in this case was Britain in World War 1.) Rather, it was the German Army that honed the operational concepts (Blitzkrieg, combined arms) and added complementary tools (radios in tanks, tactical air support.) We could have illustrated the same disruptive technology-to-weapon cycle by describing the introduction of the long bow, gunpowder, the airplane, or even the use of rocks versus clubs. In all cases, the story is the same. This technology-to-weapons-to doctrine innovation cycle is illustrated in the diagram below. Slide 10.
Institutional Inertia is a Social Problem Looking at this diagram, one might think that after going through this cycle once, it would be easy to continuously adopt new technologies and weapons. But the painful lessons from nations that lost wars teach us that technology/weapons leadership is ephemeral. It’s inevitable that the cutting-edge systems that leading nations build ultimately become legacy systems. They’re superseded by other nations that move more quickly through this adoption cycle.
Services, agencies and careers are built around acquiring, operating, supporting and fighting with legacy systems, and this hinders adoption of the next innovation cycle when it’s time to adopt the next wave of disruption.
This institutional inertia is as much a social problem as it is a technical one. General/Flag Officers achieved their rank because of their ability to lead people and manage known processes. Unconsciously most are most comfortable with technology and doctrine they learned in their 20s. When visionaries start promoting what at first looks like a technological toy, leadership perceives them as bringing disorder to a well-ordered system.
As a result, institutional inertia (social, budget, capacities, careers, contractors, et al) hinders the adoption of the next-generation disruptive technology and weapons allows adversaries to leapfrog the leaders.
This is an age-old story. Unfortunately, it’s now a story about us.
Multiple Disruptive Technologies At Once Versus Multiple Adversaries – With a Limited Budget Today, the U.S. Department of Defense faces a proverbial Gordian knot – there’s not just one or two disruptive technologies potentially changing warfare but at least ten; Cyber, AI, Machine Learning, Autonomy, Space, Hypersonics, Biotech, Semiconductors, Directed Energy and Quantum. And unlike the last century, most of these innovations are no longer driven by military weapons labs that have a lock on the technology but are coming from commercial companies.
Compounding this problem of multiple new technologies is today’s reality that the DOD is facing multiple adversaries. The Department of Defense has to decide which of these technologies and new weapons will be most important across these five: China, Russia, North Korea, Iran and non-nation states. For example, weapons and doctrine needed to continue to project power in the South China Sea will be different than those needed to protect the Baltic States or counter a regional threat in the Mideast. And we need to do all of this with a finite defense budget, most of which is being spent on legacy systems in 88 major defense acquisition programs. Trying to kill one of these to free up money for new weapons development is a major political problem. (Slides 10-13)
We closed the lecture by observing that the DOD may be best served if it developed an Innovation Doctrine to guide its leadership through these decisions. The question we left for the students was: What else might we do?
Guest Speaker – Max Boot Max Boot is the author of War Made New, a book that describes many of these technology to weapons cycles.
If you can’t see the Max Boot video, click here.
Our student take-aways from Max Boot’s talk are below: Lessons Learned
The cycle of disruptive technology into weapons is a repeatable and predictable pattern
Technology Innovation >Visionaries > Early prototypes > Inertia from Status Quo > Early Adoption > New Operational Concepts/Doctrine > Offset strategy/win war
Institutional inertia is a social problem
Most people are comfortable with certainty
Our current requirements and acquisition system (Planning-Programming-Budgeting System) is built on assuming certainty
At its core is a 1960’s belief that quantitative analysis and cost accounting can reduce uncertainty and make choices of weapons systems predictable 10, 20 years in the future
This focus on outputs and optimization “worked” when technologies, threats and adversaries were known
It fails when facing unknowns. Todays threats need an agile system that can build incrementally and iteratively, and deliver with speed and urgency
Today ten major disruptive technologies have emerged
Each will create new weapons and doctrine
Most are coming from private companies and are widely available
Each of our 2+3 adversaries will require a different mix of weapons/doctrine
Prioritizing these new technologies and weapons is challenging
Our defense budget is limited
Yet it has 88 major defense acquisition programs, most of them legacy systems
Killing any of them will likely require a coordinated Justice Department and DOD effort
The DOD needs an Innovation Doctrine to guide the integration of disruptive tech into weapons systems, operational concepts, doctrine, new organizational designs and an agile acquisition system
0 notes
Text
Technology, Innovation, and Modern War – Class 1
We just had our first week of our new national security class Technology, Innovation and Modern War. Given the tech-centricity of Stanford and Silicon Valley, Joe Felter, Raj Shah and I thought it was natural to design a class to examine the new military systems, operational concepts and doctrines that will emerge from 21st century technologies – Space, Cyber, AI & Machine Learning and Autonomy.
Our students, a mix between international policy and engineering, will be the ones in this fight. If the past is a prologue, they’ll go off to senior roles in defense, policy and to the companies building new disruptive technologies. Our goals are to help them understand the complexity and urgency of the issues, offer them a model to understand the obstacles and path forward, and to inspire them to help lead the transformation of the Department of Defense to meet 21st century challenges.
Our guest speaker this class was Ash Carter the 25th Secretary of Defense.
The pre-class reading included: Christian Brose, The Kill Chain, Michele Flournoy and Gabriele Chefitz: Sharpening the US Military’s Edge and the 2018 summary of the National Defense Strategy.
Lecture 1: This post describes our lecture slides below.
If you can’t see the slides click here. The text below refers to the slides.
The Big Picture Context is important. We started the class illustrating the sweep of the rise and fall of empires and nations over the last 500 years. (Slide 17) The takeaways were that:
National power is ephemeral
China is the only nation that declined in national power and eventually recovered it – though it took half a millennium
The rise of the United States as a national power was incredibly steep, however its trend over the last two decades is not heading in the right direction and is about to intersect with the rise of China
While the class is focused on how new technologies will shape new weapons and doctrine, the national power of a country (its influence and footprint on the world stage) is more than just its military strength. It’s the combination of a country’s diplomacy (soft power and alliances,) information/ intelligence and its military and economic strength. (This concept is known by its acronym, DIME.) (Slide 18)
It’s worth considering the reasons why nations decline — they lose allies, a decline in economic power (the UK in the 20th Century); they lose interest in global affairs (China in the 15th Century); internal/civil conflicts (Russia in the 20th Century.) We zeroed-in on one of the other reasons, and the purpose of this class – a nations military can miss disruptive technology transitions and new operational concepts (Slides 21-22).
And that has happened to us. For 25 years as the sole Superpower, the U.S. neglected strategic threats from China and a rearmed Russia. The country, our elected officials, and our military emotionally committed to a decades long battle to revenge 9/11. Meanwhile, our country’s legacy weapons systems had too many entrenched and interlocking interests (Congress, lobbyists, DOD/contractor revolving door, service promotion of executors versus innovators) that inhibited radical change. The 2018 National Defense Strategy changed that, becoming a wakeup call for our nation (Slide 25.)
All this was a prelude to introducing the class’s three parts (Slide 27):
The first part provides a broad overview of how new technology turns into weapons and doctrine.
Part two does a deep dive on AI, machine learning, autonomy, cyber and space (and will touch on biotech, microelectronics, quantum and hypersonics) and how each can be applied in the service of national security.
The third part of the class gives students hypothetical problems and asks them use 21st century technology to create operational concepts and doctrines that can solve them.
Technology to Weapons to Doctrine As we described how the U.S. specifies and buys weapons systems to students accustomed to Amazon and the “make it happen now” culture of Silicon Valley, we could hear the “you got to be kidding me,” even over zoom. We described the theory versus current practice of defense requirements, acquisition and budgeting in Slides 28-32. And we repeated the obvious (that the system is broken) and the not so obvious – the U.S. is still using a McNamara-era requirements and acquisition system designed by financial managers from Ford and imposed on the DOD in the early 1960s. One observation that often goes unnoticed is that the government audit agencies – GAO, DoDIG – are also part of the problem, as they work hard in assuring compliance with bad strategy. (Best comment from a student, “It strikes me that our acquisition system isn’t broken – it’s obsolete. Built for a world that no longer exists.” An even more sobering comment was, “Was this system designed by the Chinese to ensure we can’t innovate?”)
Having a new technology and weapon doesn’t describe how it’s used to fight or win a war. Each new generation of technology (spears, bows and arrows, guns, planes, etc.) inevitably created new types of military systems. Shooting a gun instead of a longbow didn’t win a conflict; it required the development of a new operational concept and doctrine to learn; who mans it, what other activities are needed to work with it, how to sustain it, and how to use it to win. (Operational Concepts are the Minimum Viable Products of the practical application of a doctrine against a specific enemy in a specific environment.) Slide 33
New adversaries like ISIS in Iraq created the need for a new doctrine i.e. the 2006 Counterinsurgency Field Manual 3-24.
New types of disruptive technologies/weapons (China/Russia A2/AD, China’s DF-21D and DF-26B) can create the need for new doctrine.
(Ironically, China building military bases on top of reefs in the South China Sea had nothing to do with new technology. It was simply a disruptive operational concept that used 20th-century dredging ships and a gamble that the U.S. wouldn’t interfere. That move alone negated 75 years of U.S. weapons and doctrine in the Pacific, and we’ll spend 10s of billions of dollars to solve the problem. The Marine Corps Force Design 2030 has revamped its operational concept to meet the new reality.)
Today, the Department of Defense can’t create doctrine, new operational concepts and new organizational structures against new technology and new types of warfare fast enough. Therefore, the purpose of this class – how to think about it systematically.
Incremental technology improvements in commercial companies and the Department of Defense tend to follow an S-curve – an initial systems capability is low as it undergoes shakedown and debugging, but climbs rapidly, then plateaus until it is replaced with another incremental improvement. However, unlike commercial systems, weapon systems are matched with a doctrine of how they are used. And incremental improvements in weapons typically result in incremental improvements in doctrine. And because of the complexity of the DOD requirements and acquisition system, the incumbent contractors are typically the same. New startups/companies rarely break into the system. (There’s something wrong when the cost of entry of Palantir, SpaceX and Anduril as new DOD contractors required billionaire founders.) Slides 35-37
Unlike incremental technology improvements. disruptive technology is on a completely different S-curve than existing technology and forces the creation of new doctrine and operational concepts. In theory, incumbent contractors of old technology/weapons should be at a disadvantage over the suppliers for new technology systems as disruption offers opportunities for a new generation of contractors and suppliers. However, as we’ll describe in later classes, the role of Congress, incumbent contractors, lobbyists, still favor the existing prime contractors. Slides 38-41
It’s sobering to consider what our existing legacy systems are versus where they need to be in the next two decades. It’s worth looking at the chart below for a while. Whether we want to or not this is where the new technologies are going to take us. Even if the chart is just directionally correct, each one of those transitions requires billions of dollars, new weapons and new doctrine. Slide 41
In both commerce and Defense, they are visionaries who can look at technology (that to others appears like a toy,) and they can imagine it fully formed a decade into the future with the new operating concepts against new threats/opportunities. Examples include the Blitzkrieg (Von Manstein), or the Nuclear Navy (Admiral Rickover,) or AirLand Battle (Creighton Abrams,) or Andrew Marshall at ONA, or Elon Musk at SpaceX. Executors (those focus on running existing organizations) often dismiss visionaries because, truth be told, most are hallucinating. But the few that are right, change the world or win wars. The biography of John Boyd (the author of the OODA loop) and his observations on “Be versus Do” in a military career is still a great read. Slide 42
The Impact of New Technology and How the DOD Will Acquire It As an introduction to this class session, one of the assignments was to watch the Slaughterbot video, a dystopian (but technically possible) future of autonomy and AI.
As a nation the U.S. invests large % of its GDP in research and development; however, the source of those dollars has shifted from government to private industry. (The large rise in federal R&D in the 1960s was the investment in NASA and the space program.) While federal R&D is focused on the national interest, a lack of a national industrial policy or incentives for commercial R&D has those R&D dollars optimizing the greatest financial return. Slide 45
“No bucks, no Buck Rogers” describes the role that Congress plays in providing funding for all military expenditures. In the last two decades a federal budget was passed on time just four times. This plays havoc with having a predictable way to pay for new things. Slides 49-51
A glimmer of hope is occurring across the DOD. An insurgency has arisen in the services and combatant commands that has essentially said, “We can’t wait until our acquisition system is fixed, so we’re going to bypass it.” All the services have incubators, Accelerator’s, and SBIR programs. And they’re even making an end-around to a broken acquisition system. First driven by the Army, and now rapidly being used by the other services, a new way to write contracts, called Other Transaction Authorities (OTAs,) has emerged to bypass the years of paperwork. (Time will tell whether the existing acquisition bureaucracy beats this down or if it truly can sustain a breakout from traditional contracting and gets embraced by visionary leadership.) Slides 47 and 52
Guest Speaker – Ash Carter – SecDef
youtube
If you can’t see the Ash Carter video, click here
In the beginning of every class we ask our students for their feedback and thoughts about our guest speakers. Our student take-aways from Secretary Carter’s talk is below:
Lessons Learned
Technology by itself doesn’t win wars. It has to be built into a weapons system.
Today, many of the advanced technologies that will be used in 21st weapons are being built by private companies not the department of defense
Weapons by themselves don’t win wars. To be effective they have to be integrated into an operational concept/doctrine
Operational concepts/Doctrine describes how a weapon is used, who uses it, what else/who else needs to be used with it, how it’s maintained, etc. And the expected results when used
They way we describe what weapons we need (the requirements) and the way we buy them (the acquisition process) is built on a mid-20th process designed by accountants
Today, there are 88 Major Defense Acquisition Programs (billion+$’s.) Almost all are legacy systems – designed to fight 20th century wars
For example, the F-35/B-21/KC-46 aircraft, Ford-Class Carriers, Columbia-class SSBN, Virginia-class SSN, M-1 tank upgrades, etc.
In its attempt to minimize financial risk it has metastasized into a process that cannot field a major weapon system in less than a decade
The process does not differentiate between programs that are incremental improvements, versus those that are disruptive
The pushback to do something different i.e. the Marine Corps Force Design 2030 illustrates the institutional inertia to change -even when clearly needed
Existing technologies – can be described with an S-Curve
These systems start out with teething problems, mature, and then are replaced by better systems solving the same problem
Unlike commercial products, military technology/weapon systems have an associated doctrine – how it is used
Doctrine gets incremental improvements
Most often incremental weapons systems are built by existing contractors
Disruptive technology also goes through their own S-Curves, but they solve different problems/create new capabilities
Disruptive technology create new doctrine and in a perfect world, new suppliers
0 notes
Text
Technology, Innovation, and Modern War
I’m teaching my first non-lean start up class in a decade at Stanford next week; Technology, Innovation and Modern War: Keeping America’s Edge in an Era of Great Power Competition. The class is joint listed in Stanford’s International Policy department as well as in the Engineering School, in the department of Management Science and Engineering.
—
Why This Course?
Five years ago, Joe Felter, Pete Newell and I realized that few of our students considered careers in the Department of Defense or Intelligence Community. In response we developed the Hacking for Defense class where students could learn about the nation’s emerging threats and security challenges while working with innovators inside the Department of Defense (DoD) and Intelligence Community to solve real national security problems. Today there is a national network of 40 colleges and universities teaching Hacking for Defense. We’ve created a network of entrepreneurial students who understand the security threats facing the country and engaged them in partnership with islands of innovation in the DOD/IC. The output of these classes is providing hundreds of solutions to critical national security problems every year. This was our first step in fostering a more agile, responsive and resilient, approach to national security in the 21st century.
Fast forward to today. For the first time since the start of the Cold War, Americans face the prospect of being unable to win in a future conflict. In 2017, the Chairman of the Joint Chiefs of Staff gave a prescient warning that “In just a few years, if we do not change the trajectory, we will lose our qualitative and quantitative competitive advantage.” Those few years are now, and this warning is coming to fruition.
New emerging technologies will radically change how countries will be able to fight and deter threats across air, land, sea, space, and cyber. But winning future conflicts requires more than just adopting new technology; it requires a revolution in thinking about how this technology can be integrated into weapons systems to drive new operational and organizational concepts that change the way we fight.
Early in 2020, Joe Felter (previously Assistant Secretary of Defense for South Asia, Southeast Asia, and Oceania and Hacking for Defense co-creator) and I began to talk about the need for a new class that gave students an overview of the new technologies and explored how new technologies turn into weapons, and how new concepts to use them will emerge. We recruited Raj Shah (previously the managing director of the Defense Innovation Unit that was responsible for contracting with commercial companies to solve national security problems) and we started designing the class. One couldn’t hope for a better set of co-instructors.
The Class War, in one form or another, appeared with the first man. Ever since someone picked up a rock and realized you could throw it, humans have embraced new technology for war. Each new generation of technology (spears, bows and arrows, guns, planes, etc.) inevitably created new types of military systems. But just picking up the rock didn’t win a conflict, it required the development of a new operational concept learning how to use it to win, i.e. what was the best way to throw a rock, how many people needed to throw rocks, the timing of when you threw it, etc. As each new technology created new military systems, new operational concepts were developed (bows and arrows were used differently than rocks, etc.). Our course will examine the new operational concepts and strategies that will emerge from 21st century technologies – Space, Cyber, AI & Machine Learning and Autonomy. We’ll describe how new military systems are acquired, funded, and fielded, and also consider the roles of Congress, incumbent contractors, lobbyists, and start-ups.
This course begins with an overview of the history of military innovation then describes the U.S. strategies developed since World War II to gain and maintain our technological competitive edge during the bipolar standoff of the Cold War. Next, we’ll discuss the challenge of our National Defense Strategy – we no longer face a single Cold War adversary but potentially five – in what are called the “2+3 threats” (China and Russia plus Iran, North Korea, and non-nation state actors.)
The course offers students the insight that for hundreds of years, innovation in military systems has followed a repeatable pattern: technology innovation > new weapons > experimentation with new weapons/operational concepts > pushback from incumbents > first use of new operational concepts.
In the second part of course, we’ll use this framework to examine the military applications of emerging technologies in Space, Cyber, AI & Machine Learning, and Autonomy. Students will develop their own proposals for new operational concepts, defense organizations, and strategies to address these emergent technologies while heeding the funding and political hurdles to get them implemented.
The course draws on the experience and expertise of guest lecturers from industry and from across the Department of Defense and other government agencies to provide context and perspective. Bookending the class will be two past secretaries of Defense – Ash Carter and Jim Mattis.
Much like we’ve done with our past classes; – the Lean LaunchPad which became the National Science Foundation I-Corps (taught in 98 universities) and Hacking For Defense (taught in 40 schools,) – our goal is to open source this class to other universities.
As Christian Brose assesses in his prescient book “The Kill Chain”, our challenge is not the lack of money, technology, or capable and committed people in the US government, military and private industry – but of a lack of imagination. This course, like its cousin Hacking for Defense, aims to harness America’s comparative advantage in innovative thinking and the quality of its institutions of higher education, to bring imaginative and creative approaches to developing the new operational concepts we need to compete and prevail in this era of great power rivalry.
The syllabus for the class is below:
Technology, Innovation and Modern War
Part I: History, Strategy and Challenges
Sep 15: Course Introduction Guest Speaker: Ash Carter
Sep 17: History of Defense Innovation: From Long Bows to Nuclear Weapons and Off-Set Strategies. Guest Speaker: Max Boot
Sep 22: DoD 101: An Introduction to the US Department of Defense: How Military Technology is Sourced, Acquired and Deployed.
Sep 24: US Defense Strategies and Military Plans in an Era of Great Power Competition
Sep 29: Technology, Ethics and War Guest Panel
Oct 1: Congress and the power of the purse
Part II: Military Applications, Operational Concepts, Organization and Strategy
Artificial Intelligence and Machine Learning Oct 6: Introduction
Oct 8: Military Applications Guest Speaker: LTG (ret) Jack Shanahan, fmr Director Joint Artificial Intelligence Center (JAIC)
Autonomy Oct 13: Introduction Oct 15: Military Applications
Cyber Oct 20: Introduction Military Applications
Space Oct 27: Introduction Military Applications
Part III: Building an integrated plan for the future (Student group project)
How to build a plan for future war Nov 3: Conops planning Guest Speaker(s): COCOM and Joint Staff Planners
Nov 5: Budget and Innovation Guest Speaker: OMB Defense lead
Nov 10: Team working sessions with DoD Mentors
Group Presentations and Critiques Nov 12: Groups 1-2 Guest Critique: US Indo-Pacom TBA
Nov 17: Groups 2-4
Course Reflections Nov 19: Defending a Shared Vision for the Future Guest Speaker James Mattis
0 notes
Text
Hacking 4 Recovery – Time to Take A Shot
Rise Up
“Let’s do something to help with the pandemic.” In April, with the economy crashing, and the East Coast in lockdown, I heard this from Stanford instructors Tom Bedecarre and Todd Basche, both on the same day. And my response to them was the same, “I can’t sew masks and I don’t know how to make ventilators.” But after thinking about it, it dawned on to me that we could contribute – by creating a class to help existing businesses recover and new ones to start.
And so, Hacking for Recovery began, starting first at Stanford and next offered by University of Hawaii for the State of Hawaii.
After teaching 70 teams – 50 at Stanford and 20 in Hawaii – 275+ entrepreneurs – we’ve proven three things: 1) people can take control of what happens to their lives/careers during and after the pandemic, 2) in five days teams can make extraordinary progress in validating a business model and, 3) this process can be replicated in other areas of the country that need to recover and rebuild businesses.
Here’s how it happened.
I realized we had the ability to rapidly launch a large number of companies on the path of validating their business models. We could offer a 5-day version of the Lean LaunchPad / Hacking For Defense / National Science Foundation I-Corps class that’s trained tens of thousands of entrepreneurs. The class already existed. I had been teaching it at Columbia University for the last seven years. Brainstorming with my Stanford co-instructor Steve Weinstein, we streamlined the material for a virtual class, and told Tom and Todd we could do it.
In two months, they recruited 200 students (50 teams) on 6 continents and in more than a dozen countries. What united the students was their belief that while the pandemic had disrupted their lives, here was an opportunity to shape their own future.
To support them we found 31 mentors, and 4 great Teaching Assistants. The entire course – from team recruitment to the actual class sessions – was hosted online through Zoom.
We ran the Stanford class three times, each in 5-day sessions. (The syllabus is here.)
The teams were able to do customer discovery via video conferencing (getting out of the building without physically getting out of the building) averaging 44 interviews in 5 days. In aggregate they interviewed 2,259 customers. But it just wasn’t the aggregate numbers that were impressive it was how much they learned in five days.
The results?
200 students will never be the same. Rather than bemoaning their circumstances, they decided to rise up and take their best shot. Immersed in a rapid-fire hands-on experience, and surrounded by mentors and subject matter experts, every team not only changed the trajectory of their company but left having learned a methodology for high-speed business model validation to help jump-start a business idea in these chaotic times and beyond.
The topics the teams worked on mirrored the opportunities created caused by the pandemic and sequestering. Over 40% were working on telemedicine, 28% in remote education or remote work. Other teams tackled problems in travel, small business, sustainability, etc. The 50 team concepts at Stanford fell into these categories:
21 Health/Telemedicine
9 Education
5 Remote Work
3 Travel
3 Sustainability
3 Small Business
6 others
More than 15 of the teams have already committed to continue to pursue their startup ideas and are applying to accelerators and seeking funding.
When the sessions at Stanford were completed, we helped the University of Hawaii and Maui Economic Development Board STEMworks launch the Hawaii version of Hacking 4 Recovery – to rebuild the State’s economy, which has been uniquely devastated by the coronavirus lockdown. 20 teams just finished their program. With more to come. Other regions can do the same.
Take a look at a selection of the presentations below from Stanford’s cohorts. Considering some of the teams consisted of incoming freshmen, their progress is kind of mind blowing.
While we enabled 70 teams to start companies, what we really generated was hope – and a path to new opportunities.
AntiCovidAI – a novel mobile app to detect COVID-19 symptoms. Team included Stanford undergrad, Stanford alum, DCI Fellow, Stanford staff member and a graduate student taking courses at Stanford. We had 21/50 teams focused on health/telemedicine concepts
Nightingale – a telemedicine platform connecting nurses to caregivers to close the home healthcare gap.
Diffusion – led by a Stanford Ph.D, this team is developing a sensor to prevent head and neck injuries from falls, especially for seniors in nursing homes.
Edusquared– this team of 4 women who just graduated high school and are entering Stanford in September created an educational subscription box for young Special Ed students. 9 of the teams worked on Education concepts.
Work From Anywhere – the team designed a service to help people move to new locations as remote working allows employees to work from anywhere. 5 teams developed concepts related to Remote Work.
Eye-Dentify – was led by a Knight Hennessy Scholar who wants to help bring eyecare to remote underserved areas. Many of the teams focused on social impact.
Escape Homework – team developed an “Escape Room” platform to make remote learning for k-12 students fun and engaging. (Post class, the team wrote a blog post describing their experience in the class. Worth a read here. And they shared their page on virtual educational resources here.)
Voyage – was a global travel advisory platform for pandemic information.
Parrot – fun language app – crossing Duolingo with TikTok. Four rising Stanford sophomore women.
All 50 Stanford presentations are here: Session 1, Session 2 and Session 3.
Total Stanford participants: 200 (Men 51%, Women 49%) Representing a broad cross-section of the Stanford Community:
undergrads 25%
graduate 14%
Summer Session Students 10%
Alumni 30%
Faculty/Staff 2%
DCI Fellows 3%
Other/misc. 16%
Thanks to the instructors who taught the class: Tom Bedecarre, Steve Weinstein and Pete Newell and to the guest lecturers: Mar Hershenson, Tina Seelig, and Heidi Roizen.
In addition to the instructors, each team had mentors who volunteered their time: Jim Anderson, Adi Bittan, Teresa Briggs, Rachel Costello, Phil Dillard, Freddy Dopfel, Mimi Dunne, Dave Epstein, Eleanor Haglund, Joy Fairbanks, Susan Golden, Rafi Holtzman, Pradeep Jotwani, Phillipe Jorge, Vera Kenehan, Robert Locke, Kris McCleary, Radhika Malpani, Stephanie Marrus, Allan May, Rekha Pai,Don Peppers, Alejandro Petschankar, Kevin Ray, Heather Richman, Eric Schrader, Craig Seidel, Kevin Thompson, Wendy Tsu, Lisa Wallace. Plus another 27 subject matter experts as support.
And when a class with a million moving parts appears seamless to the students it’s directly proportional to the amount of work behind the scenes. Without our teaching assistants who volunteered their time none of it would have happened: Head TA’s: Valeria Rincon / Jin Woo Yu and TA’s Nicole Orsak and Diva Sharma.
Lessons learned
While we enabled 70 teams to start companies, what we really generated was hope and a path to new opportunities
With the open source curriculum available here, it’s possible for any school or region to get a version of this class ready in 8-10 weeks
The 5-day format of the class works well
It can stand alone or complement the 10-week or 14-week courses
Having teaching assistants are critical to managing the admin side of marketing, recruiting, team formation, communications and overall support for the teaching team
Team formation requires heavy lifting of emails/team mixers/team – as well as match-making by TA’s and instructors
Having a large pool of mentors and subject matter experts is important in 5-day crash course, to support teams looking for interview subjects and contacts for customer discovery
0 notes
Text
Teaching Lean Innovation in the Pandemic
Remote education in the pandemic has been hard for everyone. Hard for students having to deal with a variety of remote instructional methods. Hard for parents with K through 12 students at home trying to keep up with remote learning, and hard for instructors trying to master new barely functional tools and technology while trying to keep students engaged gazing at them through Hollywood Squares-style boxes.
A subsegment of those instructors – those trying to teach Lean LaunchPad, whether in I-Corps, or Hacking for Defense – have an additional burden of figuring out how to teach a class that depends on students getting out of the building and talking to 10 to 15 customers a week.
400 Lean Educators instructors gathered online for a three-hour session to share what we’ve learned about teaching classes remotely. We got insights from each other about tools, tips, techniques and best practices.
Here’s what we learned.
—
When I designed the Lean LaunchPad/I-Corps/Hacking for Defense class, my goal was to replace the traditional method of teaching case studies and instead immerse the students in a hands-on experiential process that modeled what entrepreneurs really did. It would be guided week-to-week by using the Business Model Canvas and testing hypotheses by getting out of the building and building Minimum Viable Products (MVPs). After trial and error, we found that having eight teams presenting in a three-hour block was the maximum without exhausting the instructors and the students. That format, unwieldy as it is, remained the standard for a decade. Over time we started experimenting with breaking up the three-hour block with breakout rooms and other activities so not all students needed to sit through all the presentations.
When the pandemic forced us to shift to online teaching, that experimentation turned into a necessity. Three hours staring at a Zoom screen while listening to team after team present is just untenable and unwatchable. Customer discovery is doable remotely but different. Teams are scattered across the world. And the instructor overhead of managing all this is probably 3X what it is in person.
While we were making changes to our classes at Stanford, Jerry Engel was smart enough to point out that hundreds of instructors in every university were having the same problems in adapting the class to the pandemic. He suggested that as follow-up to our Lean Innovation Educators Summit here in Silicon Valley last December, we should create a mid-year on-line Summit so we could all get together and share what we learned and how we’re adapting. And so it began.
In July, 400 Educators from over 200 universities in 22 countries gathered online for a Lean Innovation Educators Summit to share best practices.
We began the summit with five of us sharing our experience of how we dealt with the online challenges of:
teaching an existing Lean program i.e. Hacking For Defense
creating and teaching new Lean classes i.e. Hacking For Oceans and Hacking For Recovery
creating programs for Diversity, Equity, & Inclusion e. GEM I4 / Black Learners Matter
effectively teaching Business Model Design during COVID-19
If you can’t see the presentation slides click here
But the core of the summit was gathering the collective wisdom and experience of the 400 attendees as we split into 22 breakout rooms. The one-hour discussion in each of the rooms covered:
What are your biggest challenges under COVID-19?
How is this challenge different now than during “in-person” learning?
What solutions have you tried?
What was most effective?
The output of the breakout sessions provided a firehose of data, a ton of useful suggestions, teaching tips and tools.I’ve summarized the collective notes from the breakout session.
Customer Discovery and Minimal Viable Products The consensus was, yes you can “get out of the building” when you physically can’t. And it’s almost good enough.
Discovery can be done via Zoom or similar remote platforms and in some ways is more effective – see here
During Covid most people no longer have gatekeepers around them
Sending lots of cold emails works (at least in COVID times)
You could find the best mentors and the best sponsor for a given project
Building and demonstrating hardware MVPs is a challenge
One solution is to send a design file to a fab lab to be printed
If you would normally have your potential customer hold, feel or use the product, make sure you video a demo someone doing that
For software MVPs create video demo snippets of less <1 minute to illustrate each of your features
It’s critical to offer a “How to do customer discovery remotely” and “how to build remote MVPs” workshop
Class Structure 3-hour long classes are challenging in person and require a redesign to be taught online.
Keep students engaged by having no more than four teams in a presentation room at one time
Have other teams in breakout rooms and/or with other instructors
Breakout rooms must be well thought out and organized
They should have a task and a deliverable
Break up lectures so that they are no longer then 15 minutes
Intersperse them with interactive exercises (Alex Osterwalder is a genius here, providing great suggestions for keeping students engaged)
Work on an exercise in class and then talk more to it in office hours
Avoid canned video lectures
Be more prescriptive on “what is required” in the team presentations
What’s the goal for the class?
Do you want them to test the entire Canvas or …
Do you want them to work on product market fit?
Teams will naturally gravitate to work on product/market fit
Vary the voices at the “front” of the room
Guest speakers – previously extraneous but needed now to break up the monotony
But if you use guests have the student’s whiteboard summaries of what they learned
And have the guests be relevant to the business model topic of the week
Understand that while students attend your class they actually pay attention to their mentors
Recruit mentors whose first passion are helping students, not recruiting or investing in them
Ensure that you train and onboard mentors to the syllabus
Have the mentors sit in on the office hours and classroom
Invite lurkers, advisors, and others “invited” to show up and chime in
Be prepared for the intensity of the preparation required as compared to pre-COVID times
Recruiting students and forming teams is especially hard remotely
Double or triple down on the email and other outreach
Hold on-line info sessions and mixers
Teaching Assistant Having a Teaching Assistant is critical
If your school won’t pay for one, get some unofficial “co-instructors”
They don’t have to be a teacher–use an admin or a student intern
They are critical to managing the admin side of marketing, recruiting, team formation, communications and overall support for the teaching team.
Team formation requires TA heavy lifting of emails/team mixers/team
as well as match-making by TA’s and instructors
During class TA’S need to be focused on chat, breakout room and presentation logistics
Don’t assume (or let your TA assume) that prior practices will work in a virtual environment.
Be prepared to try different approaches to keep class moving and engaged
Pre-class write up a “How to TA in a Remote Class” handbook
Go through it with your TA’s before class
Use security in advance; avoid open entry (Zoom Bombing)
Student Engagement Zoom fatigue came up in almost every breakout session. Some of the solutions included:
Play music as students arrive and leave
Recognize that some may be in different time zones – take a poll in the first class session
Start each class session with an activity
Summarize key insights/lessons learned from their office hours and customer discovery
For those using Zoom – use the Whiteboard feature for these summaries
Other platforms for remote collaboration include Miro, Mural, Zoom, Discord, and Innovation Within etc.
A list of remote teaching tools suggested in the breakout sessions are here
Have students turn on their camera on to ensure the class they’re engaged
And have their microphone off, their full name visible, and a virtual background with their team ID
Create deeper connection with the students
ask them to anonymously submit a statement or two about what they wish you knew about them
ask the students to bring something to class that tells us something about them
have them bring it to the breakout rooms to share with their teammates and others
Randomly cold call
Don’t be afraid to call out students by name, as Zoom format makes raising hand or asking a question more awkward
Ask their advice on what someone else just presented or what they learned from the other team
After doing this a couple of times, everyone will become active (so not to get called on)
Require additional student feedback on chat – critical to keeping engagement high
Focus on quality of feedback over just quantity.
Have the students and mentors use chat during team presentations to share contacts, insights
Dial back the radical candor– take the edge off as the students are already stressed
Offer longer office hours for teams
(All the breakout session slides are here.)
Summary When the National Science Foundation stopped holding their annual conference of I-Corps instructors, it offered us the opportunity to embrace a larger community beyond the NSF – now to include the Hacking for Defense, NSIN, and Lean LaunchPad educators.
When we decided to hold the online summit, we had three hypotheses:
Educators would not only want to attend, but to volunteer and help and learn from each other – validated
Instructors would care most about effective communication with students (not tools, or frameworks but quality of the engagement with students) – validated
Our educator community valued ongoing, recurring opportunities to collaborate and open source ideas and tools – validated
The Common Mission Project is coordinating the group’s efforts to create an open forum where these instructors can share best practices and to curate the best content and solutions.
A big thanks to Jerry Engel of U.C. Berkeley, the dean of this program. And thanks to the Common Mission Project which provided all the seamless logistical support, and every one of the breakout room leaders: Tom Bedecarré – Stanford University, John Blaho – City College of New York, Philip Bouchard – TrustedPeer, Dave Chapman – University College London, James Chung – George Washington University, Bob Dorf – Columbia University, Jeff Epstein – Stanford University, Paul Fox – LaSalle University Barcelona, Ali Hawks – Common Mission Project UK, Jim Hornthal – U.C. Berkeley, Victoria Larke – University of Toronto, Radhika Malpani – Google, Michael Marasco – Northwestern University, Stephanie Marrus – University of California, San Francisco, Pete Newell – BMNT/ Common Mission Project US, Thomas O’Neal – University of Central Florida, Alexander Osterwalder – Strategyzer, Kim Polese – U.C. Berkeley, Jeff Reid – Georgetown University, Sid Saleh – Colorado School of Mines, Chris Taylor – Georgetown University, Grant Warner – Howard University, Todd Warren – Northwestern University, Phil Weilerstein – VentureWell, Steve Weinstein – Stanford University, Naeem Zafar – U.C. Berkeley, and the 400 of you who attended.
Looking forward to our next Educator Summit, December 16th online.
The video of the entire summit can be seen here
0 notes
Text
What Can A Startup Do in 5 days? Watch this
With a terrific crew of instructors, TA’s, and mentors, we successfully concluded Session 1 of our Hacking 4 Recovery summer series – with 20 teams sharing their final presentations last night. Slides for these presentations are in this folder, and we will be editing and sharing videos of each presentation shortly.
Alivia – Telemedicine service bringing healthcare to middle income people in Peru
AllAboard – Remote onboarding services to help organizations establish a sense of belonging
AntiCovidAI – Mobile app for testing COVID-19
BBOM Preschool – Teaching social and emotional learning (SEL) to preschoolers
Collegiate Cost Busters – Delivering innovation to make college education more affordable to all
COVered – Crowdsourcing app to monitor risk for visiting public spaces
CoworkingSpace – Redefining coworking spaces in the post-pandemic world
Cratiso – Sourcing diverse patients for clinical trials
Florence Health – Telemedicine app to prevent hospitalization of congestive heart failure patients
HomeDoc – Central hub for connecting telemedicine platforms for nursing homes
Mango Lango – Mobile app that allows small businesses to reopen safely
MatchBook – Hiring platform structured similarly to dating apps
MemLove – Helping people grieve for lost loved ones
MUSTA – Telemedicine platform for patients in the Philippines
Remote Daily – Simplified employee feedback for small businesses
Resilience Gym – Online education and virtual reality to enhance mental health
Safe.ly – Mobile app for making reservations to visit your local stores safely
Sani-Team – Consulting service to help local restaurants reopen safely
Screen360.tv – Cross-cultural education platform using international films
Voyage – Global travel advisory platform for pandemic information
0 notes
Text
Educators Summit: Lessons from Teaching in the Pandemic
SAVE THE DATE for the Lean Innovation Educators Summit: Lessons from Teaching in the Pandemic July 24, 10-noon Pacific, 1-3pm Eastern, 6-8pm London
As educators the COVID-19 pandemic has challenged us all.
We’ve faced the challenges of teaching remotely, while virtually managing students scattered across the world, keeping students enthusiastic and engaged via video, helping them conduct customer discovery when they can’t get out of the building, and rolling with uncertain teaching schedules now and in the future. We’ve all been making it up as we go and have begun to see a glimmer of patterns of what’s worked and what hasn’t.
Since the Pandemic we’ve taught three classes remotely – Hacking for Defense, Hacking for Oceans and our first of three Hacking for Recovery classes. I know I’ve learned a ton – some surprisingly good and some just surprisingly.
But more importantly there are hundreds of educators who have also learned valuable lessons. If you’ve learned something you’d like to share, or would like to hear how others are modifying their pedagogical approaches for the pandemic, you’re invited to join us virtually and collectively in this two-hour on-line session (with an additional one hour of breakout sessions for follow-up discussions on topics of interest.)
Some of the topics we’ll cover include:
Converting and scaling existing programs and classes
Standing up new programs from scratch
Improving diversity and inclusion in tech innovation education
Addressing K-12 opportunities
We invite you to submit your own instructional innovations for a virtual poster session. We will also be having subgroup discussions to engage in active give and take.
So save the date for the Lean Innovation Educators Summit on July 24th, 2020.
This session is free to all, but limited to Innovation educators. You can register for the event here and/or learn more on our website. We look forward to gathering as a community of educators to shape the future of Lean Innovation Education in the COVID-19 era.
0 notes