The Ohio State University and senior fellow at Cato Institute. Finally, Jackie Schneider at stanford university. Thank you very much for the introduction. I am grateful for events hosted back in the before days. I was able to meet with colleagues and talk about ideas that make their way into this book eventually. Im grateful to be on our panel like this, i think i cited most, if not all of you in this book. It is my privilege to share this with you. This book comes out of my personal experiences in uniform in the u. S. Navy so i thought i would start with this. The first is back in 1999, my first job in the navy, i was a targeted officer working at the u. S. Headquarters. A short air campaign against the modern state ended with no fatalities to a lot of people, this looks like a big Success Story for technology, new american way of war. Revolutionary wars but we made a lot of mistakes including blowing up the chinese industry. This was a mistake that was coordination failures, lots of little insignificant mistakes adding up to a really big event repercussions for the u. S. China relations today. Second, about a decade later, i was working for intelligence and had a team in western iraq. It could have been a different work, this was a long war many thousands of casualties on the u. S. Side. Hundreds of thousands on the iraq he said. Network centric warfare in a Population Center and get in the midst of this, we see the lives of the most Network Centric organization the u. S. Created today mainly in special operations and yet again, i saw some interesting pathologies that crept into this way of war between the culture of operations in particular, special warfare and everyone would swear that. These were different wars in terms of their duration and outcomes and certainly in terms of their technology. They are struck by the similarities i experienced in these events. In many ways, its an effort to try and draw out the similarities not only help these two are more dramatic shifts in military power. The first is that springs eternal, Information Technology will improve military performance. I described as Technology Theory of victory back in the 70s, it was described as the automated battlefield. The russians described as strike complex. The americans translated russian writings to this idea of the revolutionary military affairs. So the next thing is not a revelation in the pace of that power what has changed of military organizations. So that military operation people fighting physically on the battlefield but what is characterized people working in information intensive environment to do more intellectual work than physical work. This is a big shift in the way people wage and experience war. And the convergence civilian workplace practice taking place in an office like census and a great deal of information and a reliance of us military and the products for command and control seems a little crazy with life in the military. And then just stop noticing how strange this is. And that has a lot to teach us what is going on. People tend to experience defense on the battlefield more and more with Information Technology. You see them going and rectangles on computers and devices and what matters is fundamentally immediate. And then on the battlefield and technology. So one objective of the book and growing experience to those rectangles then where does that come from how does it get shaped then how do we ensure there is a reliable connection between our data and the events on the about a battlefield. And that connection cannot be taken for granted. s and in the experience of war. This connection with modern military personnel to allow them to understand. With monica on minor breakdowns. And to lead to find the content of experience. Because related to Information Technology to reduce uncertainty and then that becomes a new source of uncertainty. It tends to shift into organization. But those command and control systems. A lot of that actually happened with regular military personnel. But with that debugging and hacking into think of topdown control bureaucracy and focusing with creativity to make the economy work. And with that improvisation and then to solve the problems that the greeks have to get control. They invented a whole new thing without contracting it out. Now i mention the defense contractor and on the other side of user information all this hacking and tinkering around with coronation interoperability issues and then to services that manage and create these big systems southerners those Counter Movement with the adaptation and to control for those issues. In the ongoing struggle between topdown and bottomup bureaucracies. There are two risks in one is that and that there is more friction and to need hackers more than ever the second at risk that is more insidious to control the certainty and the risk and then to Pay Attention to it and then to buffer with the environment and to Pay Attention to maintain culture and priorities. And then to get captured but what the book is trying to do with those larger themes with a tremendous change and i were fighters and with that continuity with military it. And then to screen against technology and it has been really really well and has been unsatisfying and to embrace this technology to explain why that is and to recognize that sometimes it does work out is not the quality of technology. There are conditions that are strategic and that is what allows Information Technology to improve effectiveness or to create problems. Information technology is a relationship between data and reality. If you have a reality that is predictable and an organization that is institutionalized then that it can help information and substitute with the efficiency and effectiveness. If you have a turbulent changing chaotic environment with free parts of the organization we have an unquoted organization and this environment with friendly fire events and then to have an institutionalized organization , changing turbulent environment and then to go through the different possibility going from world war ii with the quality of technology as things get more and more complex we have people constantly changing with the solutions and trying to catch up and then around and around again. So i will stop here with the implications we could get into with new technology and cybertechnology competition between us and china and with us should do and to talk about implications here at the Cato Institute i really look forward to the panel thank you very much. I want to frame everything but the suit is critical why this Technology Keep inspiring and failure when they are so disappointed and if he tries to chart a middle path that is critical on this issue and given where we are to talk about how skepticism and restraint and having the considered approach is critical moving forward and these debates the dod in Us National Government was to have eugene from the university of notre dame. Hi everyone. Thank you for inviting me and kayla for putting on this forum they are super important as a way to connect to the real world making captions for policy and killer is exceptional and that. So im grateful for writing this book i tried to explain why and theres three quick points so the first thing i want to say is if we were doing this in person not during will likely be in a higher auditorium at cato. And that would be apt for this conversation that we are having today. Its a perfect environment. The book fundamentally fuels the issue how military organizations deal with the complex information environment. And that is something that hayek its only in one passage in the book but john is quite explicit about how hayek in this sampling influenced and the kind of thing that would grab people in the cato audience. John does note that the centralization isnt always best and thats true that negative externalities in one part will adapt in a way that makes their information useful to the rest of the military that can help military performance and also to highlight some of the risks in the field, hurry up innovation or adaptation to make things work. And max have certain elegance to them but this makes me think that was very happy to talk about war on the cato video somebody else influencing him to talk about when its right to do things with the firms hierarch hierarchy. That is an image around a theoretical construct that john works with through the book is very apt for the cato audience this is a great book for cato to read. Classical political economy ideas in the new environment in the modern military environment. The one thing that john does suggest that the end of the Second Chapter to say as people adapt and areas that cycle getting to decentralized and being brought back not being organic sometimes it is to organic and those things work better for the organization that process continues to change the complexity. And increasing complexity with the military environment due to technology. Because complexity as the world gets more and more complex and with those institutional created to and the second point i want to make about johns book is about this is a truly interdisciplinary book but john really is the economy and Computer Science background and sociology of organizations and with that kind of knowledge coming together to make it work. Thats the way of the interdisciplinary thinking and its also hard for the audience and then makes it a real challenge to connect. I have some personal experience trying to do this it makes it hard to get leadership for your big idea. But the great thing about johns book is he is very clear and has some great figures in the book that helps. It is comprehensive interdisciplinary book on the big idea. So john had to careers. This one with Information Technology in military power and also one of the researchers were cybersecurity it is an incredibly hot topic people are excited about it. And john is already getting this because of cybersecurity and that is great it is a Great Success but ultimately this is the book that will win awards the connection between multiple big ideas with people winning nobel prizes winning the award for the distinguished scholar and the connection between political economy and Nuclear Science this book will be huge and it is comprehensible for this interdisciplinary connection that everybody can read. So the last point that strategy so he closes the book with a very brief discussion of strategy with tactical use of information and the special operation. Thats right but has big implications for strategy so that brief discussion the Chinese Military is developing these capabilities of missile technologies that make it hard for the United States to intervene in the asiapacific and with americas allies its hard to give that capability and they would see us coming on the water and it makes a very smart point that they have the practice to use data and make decisions with a very complex activity and maybe the chinese are not 10 feet tall. And thats great for the United States however and then to take the next step in the book and to talk about the us attacks on china to encourage the environment with United States tries to intervene but the supposition we have to go into the offense against china. But the information and practice insights in the book make it very clear there are advantages to being on the defense and not the offense and there are advantages fighting from the land against people operating in the sea of those on the land. The strategic situation for the United States is on the defense. We are worried they will have our allies in japan or taiwan across the ocean or the sea to attack our allies. The challenges that instead of planning for the United States to attack china and say thank god this might enable us to attack them if instead of the United States said wait, our job is to defend taiwan in japan to defend themselves even better to take advantage of the information practice advantage that if they thought seriously about johns recommendation and how to design the system to access denial to keep the chinese out of taiwan and the chinese out of japan using the advantages that the system has been our experience and historical legacy have for information practice. We could do a much better job to defend the allies instead of trying to overcome chinese defenses using our information practice on the offense. That clear Strategic Implication practice to me and with that information practice it shows given the complexity of the information environment increasing advantages with the us allies to keep the chinese from expanding across the see if thats what the chinese want to do which itself is not even clear but another great advantage in chicago and we johns book it can tell us a better way to implement us strategy in this era where people are worried about a new cold war with china. Thank you. Thank you. I enjoyed the book and so now with the revolution of military affairs and with that discussion you have already heard and nuanced and a couple of areas outside the military and with the revolution of military affairs the revolution of terrorist affairs in both of those really too thinking and then what has been happening over the century essentially. And then the standard thing that of course actually nothing has changed. 9 11 still stands out more than ten times greater and more destructive in the war zone or out. Bed in 2002 people see a big revolution happening in terms of technology and in summer of 2002 in the Washington Post and then to say that terrorist on the threshold of using the internet as a direct instrument the red. And basically that hasnt happened at all. And then terrorist have not only to top 9 11 certainly nor has anybody else but a large number of other areas have failed. The internet is that to revolutionize Human Affairs into a very limited impact in this area. It allows them to organize better than others but in looking at a lot of cases in the United States and elsewhere is facetoface. And that you could email a guy that will change. And then some people say we can learn how to build the bomb. That much of that is real garbage. And a number of terrorist and very oldfashioned things like homemade bombs. Also another area of concern they could radicalize on the left. And that is congenial to them but they were the radicalize. And then the news that comes out of middle east for example with the storm strength or the latest attack. And there has been a lot of alarm with this over isys is is terrorism in the United States and around the world and western europe as well. Pretty carefully that made a huge splash with the idea came out in the New York Times at the big frontpage article about five years ago. But one cyberguy would be terrorist in North Carolina to be cybercoaches in the isys coach said he needed some help and virginia which is not far away. And was the fbi informant. So what has actually happened and to work this out in the next book and the defenders and that is because the knuckleheads, the terrorist have been using the internet and facebook and twitter to broadcast their grievances so the fbi has to stroll the web in their offices in washington with a way for the tip say hes making big noise. Check them out. Most of those cases are uncovered has been uncovered that way were started that way by following up leads. But with a harebrained efforts to kidnap the governor of michigan a few weeks ago. There is a guy named fox that was at the center that he broadcast the goals on the situation. And was immediately infiltrated by five fbi informants and then they arrested him a few weeks ago. But in the case of Congress Also the issue is that criminals can use the internet that the evidence generally suggest that the defense in other words they find a whole and they plug it. And with the statistics there are some numbers how much money was stolen by cybercrime and how many people with successful crimes. The average case for cybercrime is 176. Is much as you could make working at mcdonalds a couple of days. And then said to do a cybercrime at 176 do you want to make that lower . But that should also be theres more than one person in your group to share the information. And so consequently and what the terrace has to work about with that number of false positives but then had to commit ones that were unsuccessful. So basically things are under control. So wes anderson at the university of cambridge argues over the last four or five years the amount of money stolen by cybercriminals has not gone up its been the same which is impressive because of the use of the internet has skyrocketed so they are holding steady. And in general if you steal credit cards you can steal it for like one dollar the Credit Card Companies are getting so good that you cannot use the store a number except on rare occasions which means they are not rolling in cash and then to work this out. So companies are not trying all that hard to stop cybercrime and to spend time helping people that have been defrauded and then refunding their money and just one final point about adapting management and so forth of Global Warming and Climate Change and the one thing the more i read it it has not been covered that much is adaptation theres a huge amount of effort to reduce global emissions but bad things will happen there are always things like droughts and Global Warming makes it worse so consequently you have a long time to deal with the problems like