Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter Insurgency Operations


Published on

Track 1 c social networks the next emerging spectrum in asymmetric warfare and counter insurgency operations - anthony fi

Published in: Technology
  • Be the first to comment

Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter Insurgency Operations

  1. 1. Anthony Fiorot - WW Web Experience & Social Business Solutions Executive10 October 2012Social Networks: The Next Emerging Spectrum in AsymmetricWarfare & Counter Insurgency Operations (COIN) © 2009 IBM Corporation
  2. 2. Social Networks: The Next Emerging Spectrum in Asymmetric Warfare& Counter Insurgency Operations (COIN) Social Networks are the next emerging spectrum in Asymmetric Warfare Operations. We will explore how professional social network technologies are transforming the Command Post of the Future. We will discuss next generation collaboration and communications capabilities. How our enemies and terrorists are using social technologies to communicate and collaborate in Asymmetric environments. We will discuss social analytic techniques and emerging tradecraft. We will discuss emerging best social practices in support of Operations Other then War (OOTW), specifically Counter Insurgency Operations (COIN), Humanitarian and Disaster Response Operations. © 2009 IBM Corporation
  3. 3. A Social Transformation is taking place in how people communicate and how relationships form and develop Social Internet PCs Departmental The Fifth IT Era: The era of Mainframe3 © 2009 IBM Corporation
  4. 4. The Social Transformation has brought upon us Social Business Social Business embraces networks of people with social collaboration technologies and tools to create business value and opportunities A Social Business... Connects people across all types of boundaries Allows networks of people to form and dissipate as needed Delivers the right content and expertise to the right people Improves and accelerates how works get done 4 © 2009 IBM Corporation
  5. 5. Government leaders plan dramatic improvements in organizationalopenness through greater external and internal collaboration To what extent will you sustain or make changes to the following aspects of your organization over the next 3 to 5 years? Government Global Partnering/collaborating with other organizations 59% 53% 59% 53% Internal collaboration 47% 52% 47% 52% Management and/or organization structure 41% 40% 41% 40% Governance models 40% 31% 40% 31% C-suite composition, skills and responsibilities 39% 41% 39% 41% Decision-making processes 37% 43% 37% 43% Supervisory board composition 23% 15% 23% 15% Values of your organization 18% 18% 18% 18%Source: The IBM CEO 2012 Study. The response sample = 176 Government organizations out of 1700 CEOs 5 © 2009 IBM Corporation
  6. 6. “What’s Your Social Business Strategy for Your Defense Agency ?”Would you be interested in learning how other defense andgovernment agencies are using “Professional Social NetworkSolutions” to:•Become more proactive and not reactive•Be a more efficient government workforce•Improve inter-agency services•Improve your analysts web experience•Share & Retain Knowledge – Retiring Workforce•Attract New Hires - Social•Be more mobile & agile•Modernize & Transform•Be innovative?•Save money & reduce budgets © 2009 IBM Corporation
  7. 7. Social Intelligence Environment (SIE) Defined © 2009 IBM Corporation
  8. 8. The INTELLIGENCE Cycle Monitoring & Analyzing the Social Intelligence Environment (SIE) - provides critical intelligence for law enforcement investigations & operations8 © 2009 IBM Corporation
  9. 9. Social Threat Assessment and Intelligence Process Monitor - Analyze - Disseminate - © 2009 IBM Corporation
  10. 10. Monitoring the Social Intelligence Environment (SIE) Website - Whitepaper - © 2009 IBM Corporation
  11. 11. Monitoring the SIE – LE Intelligence © 2009 IBM Corporation
  12. 12. Monitoring - Two Recent Defense Use Cases Case Study – “Para Jumper (PJ)” In October 2011, a women tweeted “Please say a prayer for my BFF’s husband who is a PJ in the Air Force, he got shot three times in Afghanistan last night.” The command found out that a member in it’s command was wounded in action on Twitter before the official military messaging notification system. Case Study – “IED In Afghanistan” US and allied personnel send out Twitter messages on observed Improved Explosive Device (IED) explosions or detections to share immediate intelligence with other members across their command. Most fastest and quickest way to warn each other of IEDs in the AOR. © 2009 IBM Corporation
  13. 13. Monitoring – Bin Laden Raid - PakistanOne Tweet Could Have Compromised the Mission ! © 2009 IBM Corporation
  14. 14. Monitoring - Two Recent Counter Terrorism Use Cases Case Study – “I Have A Bomb On This Plane” (Miami Airport) In January 2012, an airline passenger tweeted she had a bomb on a Jet Blue commercial aircraft at the Miami International Airport. Within 3 minutes of detecting the Tweeted threat, a suspect was identified. TSA and FBI were immediately notified and the passenger was detained before the plane departed the gate. No bomb was found… but the suspect did get her hashtag wish: #tostayinmiamialittlewhilelonger. Case Study – 2012 SUPERBOWL Threat – Just days before the 2012 Superbowl, "RulingElite" Tweeted he would carry out a biological attack designed to kill thousands of fans in the stadium. Out of one billion Tweets, our technology and tradecraft detected and reported this threat to authorities in real-time. © 2009 IBM Corporation
  15. 15. Actual Photos found on one person’s open and public Twitter Account © 2009 IBM Corporation
  16. 16. But Wait There’s More !!! © 2009 IBM Corporation
  17. 17. Best Practices & Things to Consider When It Comes to Social Monitoring for Law Enforcement Intelligence & Operations 1. Partner with LE Social Intelligence Partners not marketing & social media analytics companies 2. LE Intel Methodology that complies to privacy laws 3. Cloud / Anonymous / No Bread Crumbs 4. Evidence / Forensics / Prosecution 5. Fuse Geo Spatial / IMINT / Social Monitoring / Reporting 6. Create a virtual Intel COP mashing all your data 7. Collaborate / Share Intel Using Your Social Tools (Instant Messaging / Professional Social Networks) 8. Real time language translation17 © 2009 IBM Corporation
  18. 18. Combining Social Monitoring with Social Analytics -Predicting Events & Activities Before They Happen Ingesting unrelated big data and finding the relationships ! © 2009 IBM Corporation
  19. 19. Analyzing Use Case - Syria Case Study Benefit: – Within a Major Command, on average it takes 75 Analysts to only view 9% of the Social Intelligence Our Social Monitoring Environment (SIE) & Analytics Platform – SIE Analytics: We believe we can predicted 12 out of 15 events in Syria before accomplish 100% with just 25 they occurred last analysts month19 © 2009 IBM Corporation
  20. 20. UNCLASSIFIEDMost Influential vs Most Followed MASS INFLUENCER Wael Ghonim @Weddady – Mass Influencer Twitter Followers: 86,000+ Twitter Followers: 6,900+ Reactions Generated: 3,291 Reactions Generated: 1,281 Reactions per 1K followers: 38 Reactions per 1K followers: 186 Justin Bieber Twitter Followers: 7.4 Million Reactions Generated: 294 Reactions per 1K followers: 0.04 UNCLASSIFIED © 2009 IBM Corporation
  21. 21. UNCLASSIFIEDCase Study - Trevon Martin / Miami High School / Walk Out UNCLASSIFIED © 2009 IBM Corporation
  22. 22. Analyzing Use Case –2011 Asia Pacific Economic Cooperation (APEC) Protecting the President & Asia Pacific Prime Ministers at the Asia Pacific Economic Committee (APEC) Hawaii, November 2011 © 2009 IBM Corporation
  23. 23. Combining Social Monitoring and Analytics with Real-TimeDissemination / CollaborationProfessional Social Network Technologies for Defense, Intelligence &Counter Terrorism) Share New Insights and Knowledge Using “Professional Social Network Technologies” © 2009 IBM Corporation
  24. 24. Defense Case Study – United States Special Operations Command (USSOCOM)International SOF Information Sharing System (ISISS) ISISS - Enables International Special Operations Forces (ISOF) from over 120+ countries the ability to communicate and collaborate through professional social network technologies to share knowledge and create new insights. © 2009 IBM Corporation
  25. 25. © 2009 IBM Corporation
  26. 26. Dissemination / Collaboration –United States Special Operations Command (USSOCOM)ISISS Program © 2009 IBM Corporation
  27. 27. Defense Case Study – United States Special Operations Command (USSOCOM)International SOF Information Sharing System (ISISS) ISISS – Screenshot of the SOF Asia Pacific Region –Includes SAF SOF members. ISISS Features – Profiles Communities Language Translation Files Training Videos Activities Blogs Wikis Instant Messaging eMail © 2009 IBM Corporation
  28. 28. Extending the Social Experience to the Tactical (Mobile) Edge28 © 2009 IBM Corporation
  29. 29. Social Business Framework can address the challenges faced by agencies through 3 business outcomes Citizen Interaction How People Work Deepen relationships Generate new ideas Enable a more effective Business outcomes with citizens faster Federal workforce (external) (external + internal) (internal) Target Citizen Customer Service Departments Government and Operation Leaders, audiences and Organizations Local Government and Innovation Leaders Human Resources Business challenges Citizen Expectations Seeding innovation Breaking down silosIBM CEO 2012 Engaging citizens as Amplifying innovation with Empowering employees Study partnerships through values individuals alignment Professional Social Collaboration Capabilities Communities and Forums Expertise and Content Tagging Knowledge Management Enabling Dynamic personal profiles and status Social Portals Social Analytics capabilities Mobile Applications Crowd-sourcing & Collective Intelligence updates Blogs and Wikis Cross Agency and Cross Department Content management based on the Open Data Collaboration person, not the document “Open” principles Transparency Accessibility Participation Collaboration 29 © 2009 IBM Corporation
  30. 30. Examples of how federal governments are using professionalsocial networks to drive each business outcome Deepen relationships Generate new Enable a more with citizen ideas faster (External + Internal) effective workforce (External) (Internal) Promote citizen community Formulate Crowd sourcing for Promote a collaborative virtual blogs and social forums new services environment Use of Jams, blogs and wikis to Develop knowledge sharing and Conduct citizen care analytics address challenges and solve promote asset re-use Connect right experts to answer Develop talent sourcing problems citizen questions Promote virtual gaming for Infuse community building Improve community driven innovation and education Promote blogs, wikis citizen support and engagement Improve ways of designing and Create social internal platforms for Inform and educate citizens producing services rewards and recognition continuously Integrate citizen feedback and Promote Borderless Public Bring in Transparency and insight with program and service Service Organization accountability for an improved development Generate real-time information perception of Government Create social platforms for accessibility Open data and share service citizen award/recognition Develop skills by virtual information Innovate to exceed citizen training/gaming within expectations departments Open data and share service Open data and share service information information30 © 2009 IBM Corporation