overview

23

Upload: madge

Post on 23-Feb-2016

31 views

Category:

Documents


0 download

DESCRIPTION

Overview. What is INSER? Colloquium Topics Panel Discussion Exercise. Institute for National Security Education & Research (INSER). Established at UW during ‘05-’06 academic year Housed in the Information School Provides a “forum for independent research - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Overview
Page 2: Overview

Overview What is INSER? Colloquium

Topics Panel Discussion Exercise

Page 3: Overview

Institute for National Security Education &

Research (INSER) Established at UW during ‘05-’06 academic year Housed in the Information School Provides a “forum for independent research and cutting-edge scholarship” Focuses on “areas of broad relevance to public safety and national security issues”

Page 4: Overview

Founded by Office of the Director of National Intelligence Designed to increase the pool of eligible applicants in core IC skill sets Provides colleges and universities with the opportunity to implement curricula focusing on “critical” IC skill sets

• Information technology specialists• Language specialists• Political/economic specialists• Threat environment specialists• Science specialists

Intelligence Community Centers of Academic Excellence (IC CAE)

Page 5: Overview

The United States Intelligence Community’s 5 Year Strategic Human

Capital Plan From the Office of the Director of National

Intelligence (2006) An annex to the National Intelligence

Strategy (NIS) Goal: to “Win the war for talent” by

attracting and retaining the best and brightest candidates

Goal: to strengthen the IC by creating a culture of leadership and fostering an ethos that values selfless service, integrity, and accountability

Called for the IC CAE

Page 6: Overview

Opening Remarks:Matthew Saxton

Over-arching theme:

“It’s all about human behavior and human motivation, and not about the perfect system. “

“…fundamental human behavior issues are evolving in this social media/social computing environment.”

Page 7: Overview

Cybersecurity Virtual Worlds Cybersecurity and Virtual

Worlds Ethical Issues in

Information Panel Discussion

Topics

Page 8: Overview

Cybersecurity: Social aspects

Information Security is a behavior Culture Clash

Not just about your computer It’s what information you emit It’s not ephemeral (Twitter)

Individual vs organizational expectations Persuasion rather than enforcement Coping w/ uncertainty Assume breach People make mistakes

Need more behavioral research relevant to this emerging technology

Page 9: Overview

Virtual Worlds: Web 3.0 emerging

Photo-realistic representation vs. text-based

Every physical object is programmable

No borders – co-creation SecondLife:

15 million registered accounts Individual and business Education, training, business 24,000 “islands”

Page 10: Overview

Virtual Worlds:Avatars as Citizens

Social dynamics emergeEmotional/physical responses Instantaneous identity changesDevelopment of reputationsDisabled become enabled

Social structures builtOrganizing, governing,

adjudicatingOwnership

Page 11: Overview

Virtual Worlds Concerns:

BandwidthTelecomm companies rules/$ ?InteroperabilityGovernance (IP management)Security and Privacy

Potential for misuseMisinformationTerrorist training

Page 12: Overview

Cybersecurity and Virtual Worlds Threats:

Deceit capability is far reaching

No legal worldNo face-to-face

interaction Identity theft Terrorist training grounds Organized crime

Page 13: Overview

Panel Discussion

Dan Chirot, Ph.D., UW School of International Studies We are not a confident society

Current age of paranoiaRecalls other periods in history, Cold War and

McCarthyismTechnology creates abilities to intrude (i.e., for

commercial and political uses) Alarming trends since 9/11

Why are intelligence agencies bypassing the FISA court? (given that FISA has almost never rejected a request)

Conclusion: There is good reason to suggest that security agencies around us are not concerned with ethics

Page 14: Overview

Panel DiscussionAdam Moore, Ph.D., UW Department of

Philosophy, iSchool Privacy is necessary for health and well-being People are almost always willing to trade privacy for

security Contend that this is not a binary choice Promoting security also promotes privacy

Role of government Hobbes’ view that human condition is 'nasty, brutish, and

short', therefore we need a powerful leviathan (government) Locke's argument that giving government too much power

undermines the mission of providing security Conclusion

Only at margins of law should privacy be traded for security, and then only with due process and strong sunlight provisions

Page 15: Overview

Panel Discussion

Mark Haselkorn, Ph.D. UW Human Centered Design and Engineering, Dir. Pacific Rim Visualization and Analytics Center Tension between truth and harm

Role of the university is to tell society the truth

Challenge is how to adhere to the truth when it can do great harm

This tension in universities is a critical one

Page 16: Overview

Panel Discussion

Gregory Witkop, M.D., FBIDifference between intelligence and

information Intelligence is meaningful and actionableGain an edge over an adversary

Just War/Just Intelligence theoryContend that you can apply principles of ‘just war’ to ‘just intelligence’

Matrix of threat and applicable intelligence methods/means

Conclusion: Intelligence community must exemplify values and rule of law

Page 17: Overview

Civil Liberties and Privacy Office

“Protecting privacy and civil liberties is part of the fabric of the IC and it helps define who we are. In order to effectively use the tools and information we need to keep our country safe, we must have the trust of the American people and demonstrate that we are worthy of that trust. “

The term “intelligence” conspicuously absent

Page 18: Overview

Categories OSINT HUMINT SIGINT

COMINT ELINT FISINT

GEOINT IMINT

MASINT

http://www.nytimes.com/pages/todayspaper/index.html

Page 19: Overview

Other Departments The National Media Exploitation Center (NMEC)

all acquired and seized media across the intelligence, counterintelligence, military, and law enforcement communities.

The National Virtual Translation Center (NVTC) established 2003 Partnering with elements of the U.S. Government,

academia, and private industry to identify translator resources and engage their services

connected virtually to the program office in Washington, D.C

Page 20: Overview

IC CAE:What’s Ahead

Interview with Jeff Kim, Director

Page 21: Overview

Exercise

Page 22: Overview

Scenario

Players: Claire: Librarian, new to Midvale Mike: Mayor, up for re-election Bob: Chief of police Bob’s son: searching for info. on gay-

friendly colleges (with Claire’s help, without Bob’s knowledge)

FBI Citizens of Midvale

Page 23: Overview

Participating Organizations

UW/Govt. agencies: APL: http://www.apl.washington.edu/ CIASC: http://ciac.ischool.washington.edu/ INSER: http://cluster.ischool.washington.edu/

caenser/ PARVAC:

http://www.hitl.washington.edu/projects/parvac

PNNL: http://www.pnl.gov/ FBI: http://www.fbi.gov/hq/ci/domain.htm /

Private Companies (Virtual Worlds): 2b3d: http://2b3d.net/ Fourth Wall Studios:

http://www.fourthwallstudios.com/