Skip to main content

Currently Skimming:

5 Workshop Three, Part One
Pages 63-80

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 63...
... He explained that China conceptualizes things differently than the United States -- for example, the information domain in China includes electronic warfare; cyber; spectrum operations; and intelligence, surveillance, and reconnaissance systems. Because China operates in a different framework, it can be difficult to make comparisons between the two countries for analysis.
From page 64...
... He said that Xi Jinping, the Chairman of the Central Military Commission for the Communist Party in China, expects that the next war will be won in the information domain. Therefore, China is investing in space and counterspace operations, including cyberspace operations.
From page 65...
... LeMay Center for Doctrine Development and Education, defined doctrine as agreed-upon best practices that are supported by history, debate, analysis, wargame exercises, and contingencies. Doctrine serves as official advice or guidance, and it is authoritative, not directive; thus, "should" is used instead of "shall" or "will." Doctrine provides guidance and stability for the Air Force, and the Air Force drives how doctrine proceeds over time.
From page 66...
... Gen. Charles Brown has requested that the LeMay Center also provide the service doctrine on agile combat employment, which is expected to be published as an Air Force doctrine note in mid-October 2021.
From page 67...
... Lisa Costa, the incoming chief technology and innovation officer: Innovation and Digital Transformation; Science, Technology, and Research; IT, Data, and Data Analytics; and Analysis.
From page 68...
... The CTIO has also created force multiplier courses through Digital University to educate everyone in the Space Force about digital tools and practices, and offers virtual sessions on various digital activities.
From page 69...
... LeMay Center for Doctrine Development and Education, discussed his previous experience working on a digital transformation effort with several universities -- Vanderbilt University, Harvard University, the Massachusetts Institute of Technology (MIT) , Northwestern University, and the University of Texas at Austin.
From page 70...
... 70 FIGURE 5.1 Digital transformation cycle. SOURCE: Andrew Stricker, presentation to the workshop, September 23, 2021, adapted from International Telecommunication Union, 2019, Digital Transformation and the Role of Enterprise Architecture, ITU Publications, DIGITAL STRATEGY FOR THE DEPARTMENT OF THE AIR FORCE http://handle.itu.int/11.1002/pub/81404388-en.
From page 71...
... Stricker to identify a few areas on which the Air Force could focus to make the digital strategy successful. He said that the Air Force is a few years behind in developing the infrastructural components needed for digital transformation.
From page 72...
... Holmes (USAF, ret.) , senior advisor, The Roosevelt Group, expressed his concern that even with the application of digital tools, there will still be a shortage of subject matter experts to work through the material.
From page 73...
... Ms. Westphal asked about gaps in Air Force effort that need to be refocused to operate in a more digitally rich environment.
From page 74...
... Ms. Westphal wondered if innovative people will stay with the Air Force or will seek more interesting careers elsewhere.
From page 75...
... It is also essential to explicitly address the energy minimization, power consumption monitoring, and energy generation for the tactical edge information environment, including all small devices and Internet of Things capabilities.  The manpower skillset needed to maintain, install, and upkeep energy at the tactical edge is rare.
From page 76...
... Ms. Westphal asked which aspects of energy the Air Force could consider, given that it may have different energy sources in the future than it had in the past.
From page 77...
... Ms. Westphal asked whether ABMS is issuing warfighting capabilities in a way that embraces the desired operational speed and behavior of the digital transformation.
From page 78...
... Col. Zall expressed his concern about balancing the optimization of the day-to-day office environment with the optimization of a dynamic combat environment, and wondered if others consider that tension when prioritizing efforts for the digital transformation.
From page 79...
... She said that many DoD organizations use NIST SP 800-171 to protect the confidentiality of controlled unclassified information, but she acknowledged the need to balance openness to allow critical collaborations with the protection of federal information. Although specific federal agencies determine their own security protocols for their partnerships, a university that is processing, sorting, or transmitting federally controlled unclassified information would have to follow the minimum safeguarding requirements in NIST SP 800171, which are required by law.
From page 80...
... Mr. Munson stressed that if it is not possible to create defenses to protect this rich data repository with facilitated access and tools, the Air Force should not develop a highly integrated, highly facilitated data architecture to underpin its digitization; it should instead use physical separations where necessary so that it is impossible for someone to breach and access the entire combination of data sets critical to the Air Force's functioning.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.