The document discusses various elements of intelligence collection including open source intelligence, clandestine human intelligence, signals intelligence, imagery intelligence, and leadership qualities. It provides recommendations on improving each of these collection methods, such as better leveraging private/open sources, focusing on long-term agents, processing satellite data more than collection, and using covert tracking devices. The document emphasizes the importance of having the right people and managers, and combining collection methods for the most effective intelligence.
The document discusses the concept of information peacekeeping through collective intelligence. It outlines seven "information tribes" that currently operate independently but could collaborate, including the military, law enforcement, business, academia, NGOs/media, citizens/labor/religion, and national governments. The document proposes creating a global open source information network and data capture service that would connect these tribes by sharing unclassified information. This would allow for more comprehensive analysis and connecting of information across domains to support peacekeeping and humanitarian efforts.
This document summarizes Robert David Steele's background and perspectives on political and social issues. It introduces Steele as a former CIA officer and founder of open source intelligence initiatives. It then lists Steele's concerns about negative trends like political corruption, environmental degradation, and economic issues. The document proposes several reforms and policies around topics like electoral reform, balanced budgets, agriculture, energy, and establishing an "EarthGame" model for countries to address global challenges.
Concept for healing the Americas by creating an Open Source Agency and a Multinational Decision Support Centre to get international relations and commerce back on a sound footing, which is say, evidence based rather than driven by corruption and ideology.
The news is corrupt idiocy, and politics corrupt looting (except for the Pirate and Green Parties). This piece provides a framework for honest holistic analytics in support of honest holistic policy, acquisition, and operations.
This document discusses the importance of processing information to enable knowledge management, collaborative work, acquiring external information, and maintaining organizational intelligence. It emphasizes that digitization, data standards, and making information accessible across networks are crucial prerequisites for effective processing. Automated processing can help make sense of vast data quantities, while human understanding provides context. The Internet is presented as a solution for sharing information globally in an ad hoc, mixed environment. Open source software and pervasive wireless connectivity are also recommended to facilitate processing and intelligence sharing.
Nine books later most still do not get it -- secret intelligence is largely waste -- unprocessed technical collection that feeds Congressional pork, nothing more.
The document discusses the concept of information peacekeeping through collective intelligence. It outlines seven "information tribes" that currently operate independently but could collaborate, including the military, law enforcement, business, academia, NGOs/media, citizens/labor/religion, and national governments. The document proposes creating a global open source information network and data capture service that would connect these tribes by sharing unclassified information. This would allow for more comprehensive analysis and connecting of information across domains to support peacekeeping and humanitarian efforts.
This document summarizes Robert David Steele's background and perspectives on political and social issues. It introduces Steele as a former CIA officer and founder of open source intelligence initiatives. It then lists Steele's concerns about negative trends like political corruption, environmental degradation, and economic issues. The document proposes several reforms and policies around topics like electoral reform, balanced budgets, agriculture, energy, and establishing an "EarthGame" model for countries to address global challenges.
Concept for healing the Americas by creating an Open Source Agency and a Multinational Decision Support Centre to get international relations and commerce back on a sound footing, which is say, evidence based rather than driven by corruption and ideology.
The news is corrupt idiocy, and politics corrupt looting (except for the Pirate and Green Parties). This piece provides a framework for honest holistic analytics in support of honest holistic policy, acquisition, and operations.
This document discusses the importance of processing information to enable knowledge management, collaborative work, acquiring external information, and maintaining organizational intelligence. It emphasizes that digitization, data standards, and making information accessible across networks are crucial prerequisites for effective processing. Automated processing can help make sense of vast data quantities, while human understanding provides context. The Internet is presented as a solution for sharing information globally in an ad hoc, mixed environment. Open source software and pervasive wireless connectivity are also recommended to facilitate processing and intelligence sharing.
Nine books later most still do not get it -- secret intelligence is largely waste -- unprocessed technical collection that feeds Congressional pork, nothing more.
This document discusses the role of the intelligence analyst and best practices for intelligence analysis. It emphasizes that analysis should integrate information from open sources as well as classified sources. The analyst acts as a manager, coordinating internal and external experts, customer relationships, and collection requests. Effective analysis considers alternative viewpoints, clearly distinguishes facts from opinions, and acknowledges assumptions and potential deception. The goal is to provide timely, credible intelligence that evaluates options and trade-offs to support decision-making.
Corporate Intelligence: Bridging the security and intelligence communityantitree
This document discusses corporate intelligence and how it relates to security concepts like social engineering, network security, and open source intelligence (OSINT). It outlines the intelligence lifecycle of defining a target, developing access to the target through various means, processing intelligence collected, and exiting an operation. Key takeaways are that corporate intelligence utilizes similar techniques to penetration testing and malware attacks while operating in legal and ethical grey areas.
Data Protection – How Not to Panic and Make it a PositiveTargetX
- Josh Dean discussed how Lancaster University approached data protection regulations in a positive way rather than panicking.
- They focused on educating staff, designating GDPR representatives, and building internal tools to help control data access while giving people what they need.
- Externally, they developed new privacy policies prioritizing students, only collecting necessary data, and providing contact options.
- Now, Lancaster has addressed the fundamentals of being GDPR compliant while still being able to function and communicate through preference centers and dynamic content based on consent.
- The future of data protection will involve increasingly complex laws internationally as systems strive to keep up and all organizations continue adapting to new regulations and technologies.
APT or not - does it make a difference if you are compromised?Thomas Malmberg
This is my presentation from the Cyber Security Summit held in Prague 2015 at the Boscolo Prague Spa Hotel. For the missing slides and further information, contact me directly.
NCET Biz Bite | Aaron Boigon, Practical IT management | Sept 2017Archersan
On September 27, join NCET and Aaron Boigon, SVP Director of IT at Plumas Bank, as he delves into the ins and outs of managing Information Technology (IT) in your business.
This presentation aims to provide some practical information you can use immediately to start managing IT better. And while this discussion won't solve all your IT problems, it will give you a couple takeaways that will be immensely helpful.
Attendees will learn about:
1. Cybersecurity
2. Making significant IT purchases
3. The Cloud
4. Outsourcing
5. Efficient Operations
Getting to know you: the psychology of information managementHeather Jack
This document summarizes a presentation about creating a positive and sustainable information governance culture. It discusses assessing organizational and individual needs, establishing an information governance framework, taking a risk-based approach, quantifying the value of information, gaining and maintaining buy-in through metrics and stories, providing training and support, building trust, engaging users, and using humor to motivate change. The overall message is that information governance requires understanding people and change management to be successful.
The document outlines 26 rules for a new craft of intelligence in 3 paragraphs or less:
Rule 1 discusses moving from data to information to intelligence, with the goal of answering questions and determining next steps. Rule 2 notes analysis adds value by considering all sources rather than just secret ones. Rule 3 emphasizes the importance of broad global coverage over focus on just a few "hard targets."
Several rules address the need for more open-source information, cultural and linguistic expertise, decentralized networks, and burden sharing between allies. Rules 24 discusses the need for analysts to manage projects and priorities while collectors take a more analytical role.
The final rules propose creating shared resources and standards between intelligence agencies internationally. Rule 26 emphasizes that while some
The document discusses the role of CIOs in combating terrorism through cybersecurity. It outlines how terrorists now use the internet and social media to recruit, fundraise, and plan attacks. CIOs must secure corporate networks and share threat information to prevent their networks from being used by terrorists. The document proposes establishing a regional cybersecurity cooperation center to facilitate collaboration between companies, governments, and law enforcement in addressing cyber threats.
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Alexandre Sieira
The human mind evolved to draw quick conclusions for survival. Behavioral economists, like Daniel Kahneman and Dan Ariely, are publishing research on when, why and how decision making can be consistently and predictably irrational. You could say these researchers are reverse engineering the wetware, finding bugs and race conditions and disclosing them.People are key to an organization’s information security, even if you believe in the “people, processes and technology” tripod. People define and execute processes. People decide funding for, implement, operate and/or monitor the technology. Your adversaries are people. At least until we reach the AI singularity, that is.Until then, the aim of this talk is to present some of the counter-intuitive findings of behavioral economics research and their implications for how information security is handled at the organizational and market levels. Our hope is that the audience will find they could benefit from changing established, seemingly sensible and logical actions we all do to better match how the wetware actually works.
Presented at BSides SF on Feb. 28th, 2016.
This document provides an overview of privacy and related concepts from an ethics perspective. It defines privacy as allowing individuals some level of control over access to their personal information and physical selves. The document discusses perspectives on privacy, ways technology can compromise privacy, and benefits and harms of privacy. It also covers topics like trusting relationships, disclosing information, data mining, identity theft, and encryption. The learning outcomes are to explain privacy perspectives, describe how technology impacts privacy, and apply ethics to privacy issues.
ESF15 Information Management -PIO AwarenessTrost, Micki
This document provides an overview of the role and responsibilities of a Public Information Officer (PIO) during an emergency incident. It discusses the PIO's role in the Incident Command System and the Joint Information System, including coordinating public information through a Joint Information Center. The document also describes the PIO's key functions during an incident, such as determining public information needs, managing media interactions, using social media, and monitoring information flow. The goal is to provide an orientation to the public information role in emergency management.
This document provides an introduction to information fluency. It defines information fluency as the ability to find, critically evaluate, analyze, communicate, and use information and computer literacy skills to solve problems. The document outlines the information fluency cycle of defining an information need, locating relevant information, evaluating source quality, and using information ethically. It explains that information fluency is an essential 21st century skill and those without it may fall behind, widening the digital divide.
The future of work is changing. Forces of change are affecting the three major dimensions of work: the work itself, who does the work, and where work is done. Delivering projects, requires project managers working globally, across time zones, cultures and with technology. This is causing considerable anxiety—and with good reason. The future of project management, therefore, stands at an important juncture and requires the knowledge of Artificial Intelligence (AI), Emotional Intelligence (EQ) and Cultural Intelligence (CQ). Emotional intelligence skills such as influencing, persuading, social understanding and empathy will become differentiators as artificial intelligence and machine learning take over work. Emotional intelligence (EQ) , with its ability to understand how skilfully one manages personal emotions and harnesses the emotional drivers in others, will continue to be fundamentally important. But in the connected world where all global markets are accessible with the click of a mouse, another dimension will be critical - Cultural Intelligence (CQ). A balance of these three field and/or skills is a must have for all project managers and organisations that deliver value through project management. We need to learn how to work in this new environment and how we can excel. The aim of this presentation is to explain how, AI, EQ and CQ is set to transform project management, and show how project managers can develop these capabilities and be ready for the future.
Great Learning & Information Security - English editionChuan Lin
How ancient Chinese Classics, Great Learning, remains relevant in modern information security profession. This presentation will show side by side of what was true back in 400 BC, can also apply to modern day 21st Century. It is also the first book on MaaS (Management as a Service).
The document discusses developing a digital marketing plan, including collecting customer data online, monitoring social media for brand mentions, and legal and ethical issues around privacy and data collection. It also covers creating a Google account and using Google Alerts, Google Plus, and Google Hangouts for collaboration as part of modern digital education. Students are instructed to split into groups to define their company and target customer as the starting point for creating their own digital marketing plan.
Information security management requires having a plan to manage security, understanding the business needs, and promoting a security-positive culture. Effective communication and understanding business drivers are important. Information security professionals need to adopt risk-based approaches, classify sensitive information, and ensure compliance with relevant regulations while supporting business objectives. Maintaining security also involves incident response, business continuity planning, and keeping up with emerging threats and technologies.
The document describes the Cognitive Process Profile (CPP), an assessment that measures an individual's ability to think strategically and deal with complexity. The CPP evaluates a person's fluid intelligence through simulation exercises and provides insights into their thinking styles, processes, learning potential, and ability to work in different levels of complexity. It is used for leadership development, succession planning, recruitment, and matching the right people to roles. Over 180,000 professionals have completed the CPP worldwide.
This document discusses the state of intelligence and proposes a new "third era" model. It identifies gaps in holistic analysis and fragmented knowledge. The document advocates for open-source intelligence, integrity, and bringing together different fields of knowledge to create a more complete understanding and help address major threats facing humanity like poverty, disease, and environmental issues.
This document discusses various types of modern conflicts and threats facing societies post-9/11. It addresses threats from non-state actors, infectious diseases, poverty, environmental degradation, and more. It argues that current defense strategies focus too narrowly on state-based military threats while largely ignoring other challenges. A holistic approach is needed to understand the full spectrum of threats and their interrelated nature in order to effectively address risks to security and stability.
This document discusses the role of the intelligence analyst and best practices for intelligence analysis. It emphasizes that analysis should integrate information from open sources as well as classified sources. The analyst acts as a manager, coordinating internal and external experts, customer relationships, and collection requests. Effective analysis considers alternative viewpoints, clearly distinguishes facts from opinions, and acknowledges assumptions and potential deception. The goal is to provide timely, credible intelligence that evaluates options and trade-offs to support decision-making.
Corporate Intelligence: Bridging the security and intelligence communityantitree
This document discusses corporate intelligence and how it relates to security concepts like social engineering, network security, and open source intelligence (OSINT). It outlines the intelligence lifecycle of defining a target, developing access to the target through various means, processing intelligence collected, and exiting an operation. Key takeaways are that corporate intelligence utilizes similar techniques to penetration testing and malware attacks while operating in legal and ethical grey areas.
Data Protection – How Not to Panic and Make it a PositiveTargetX
- Josh Dean discussed how Lancaster University approached data protection regulations in a positive way rather than panicking.
- They focused on educating staff, designating GDPR representatives, and building internal tools to help control data access while giving people what they need.
- Externally, they developed new privacy policies prioritizing students, only collecting necessary data, and providing contact options.
- Now, Lancaster has addressed the fundamentals of being GDPR compliant while still being able to function and communicate through preference centers and dynamic content based on consent.
- The future of data protection will involve increasingly complex laws internationally as systems strive to keep up and all organizations continue adapting to new regulations and technologies.
APT or not - does it make a difference if you are compromised?Thomas Malmberg
This is my presentation from the Cyber Security Summit held in Prague 2015 at the Boscolo Prague Spa Hotel. For the missing slides and further information, contact me directly.
NCET Biz Bite | Aaron Boigon, Practical IT management | Sept 2017Archersan
On September 27, join NCET and Aaron Boigon, SVP Director of IT at Plumas Bank, as he delves into the ins and outs of managing Information Technology (IT) in your business.
This presentation aims to provide some practical information you can use immediately to start managing IT better. And while this discussion won't solve all your IT problems, it will give you a couple takeaways that will be immensely helpful.
Attendees will learn about:
1. Cybersecurity
2. Making significant IT purchases
3. The Cloud
4. Outsourcing
5. Efficient Operations
Getting to know you: the psychology of information managementHeather Jack
This document summarizes a presentation about creating a positive and sustainable information governance culture. It discusses assessing organizational and individual needs, establishing an information governance framework, taking a risk-based approach, quantifying the value of information, gaining and maintaining buy-in through metrics and stories, providing training and support, building trust, engaging users, and using humor to motivate change. The overall message is that information governance requires understanding people and change management to be successful.
The document outlines 26 rules for a new craft of intelligence in 3 paragraphs or less:
Rule 1 discusses moving from data to information to intelligence, with the goal of answering questions and determining next steps. Rule 2 notes analysis adds value by considering all sources rather than just secret ones. Rule 3 emphasizes the importance of broad global coverage over focus on just a few "hard targets."
Several rules address the need for more open-source information, cultural and linguistic expertise, decentralized networks, and burden sharing between allies. Rules 24 discusses the need for analysts to manage projects and priorities while collectors take a more analytical role.
The final rules propose creating shared resources and standards between intelligence agencies internationally. Rule 26 emphasizes that while some
The document discusses the role of CIOs in combating terrorism through cybersecurity. It outlines how terrorists now use the internet and social media to recruit, fundraise, and plan attacks. CIOs must secure corporate networks and share threat information to prevent their networks from being used by terrorists. The document proposes establishing a regional cybersecurity cooperation center to facilitate collaboration between companies, governments, and law enforcement in addressing cyber threats.
Reverse Engineering the Wetware: Understanding Human Behavior to Improve Info...Alexandre Sieira
The human mind evolved to draw quick conclusions for survival. Behavioral economists, like Daniel Kahneman and Dan Ariely, are publishing research on when, why and how decision making can be consistently and predictably irrational. You could say these researchers are reverse engineering the wetware, finding bugs and race conditions and disclosing them.People are key to an organization’s information security, even if you believe in the “people, processes and technology” tripod. People define and execute processes. People decide funding for, implement, operate and/or monitor the technology. Your adversaries are people. At least until we reach the AI singularity, that is.Until then, the aim of this talk is to present some of the counter-intuitive findings of behavioral economics research and their implications for how information security is handled at the organizational and market levels. Our hope is that the audience will find they could benefit from changing established, seemingly sensible and logical actions we all do to better match how the wetware actually works.
Presented at BSides SF on Feb. 28th, 2016.
This document provides an overview of privacy and related concepts from an ethics perspective. It defines privacy as allowing individuals some level of control over access to their personal information and physical selves. The document discusses perspectives on privacy, ways technology can compromise privacy, and benefits and harms of privacy. It also covers topics like trusting relationships, disclosing information, data mining, identity theft, and encryption. The learning outcomes are to explain privacy perspectives, describe how technology impacts privacy, and apply ethics to privacy issues.
ESF15 Information Management -PIO AwarenessTrost, Micki
This document provides an overview of the role and responsibilities of a Public Information Officer (PIO) during an emergency incident. It discusses the PIO's role in the Incident Command System and the Joint Information System, including coordinating public information through a Joint Information Center. The document also describes the PIO's key functions during an incident, such as determining public information needs, managing media interactions, using social media, and monitoring information flow. The goal is to provide an orientation to the public information role in emergency management.
This document provides an introduction to information fluency. It defines information fluency as the ability to find, critically evaluate, analyze, communicate, and use information and computer literacy skills to solve problems. The document outlines the information fluency cycle of defining an information need, locating relevant information, evaluating source quality, and using information ethically. It explains that information fluency is an essential 21st century skill and those without it may fall behind, widening the digital divide.
The future of work is changing. Forces of change are affecting the three major dimensions of work: the work itself, who does the work, and where work is done. Delivering projects, requires project managers working globally, across time zones, cultures and with technology. This is causing considerable anxiety—and with good reason. The future of project management, therefore, stands at an important juncture and requires the knowledge of Artificial Intelligence (AI), Emotional Intelligence (EQ) and Cultural Intelligence (CQ). Emotional intelligence skills such as influencing, persuading, social understanding and empathy will become differentiators as artificial intelligence and machine learning take over work. Emotional intelligence (EQ) , with its ability to understand how skilfully one manages personal emotions and harnesses the emotional drivers in others, will continue to be fundamentally important. But in the connected world where all global markets are accessible with the click of a mouse, another dimension will be critical - Cultural Intelligence (CQ). A balance of these three field and/or skills is a must have for all project managers and organisations that deliver value through project management. We need to learn how to work in this new environment and how we can excel. The aim of this presentation is to explain how, AI, EQ and CQ is set to transform project management, and show how project managers can develop these capabilities and be ready for the future.
Great Learning & Information Security - English editionChuan Lin
How ancient Chinese Classics, Great Learning, remains relevant in modern information security profession. This presentation will show side by side of what was true back in 400 BC, can also apply to modern day 21st Century. It is also the first book on MaaS (Management as a Service).
The document discusses developing a digital marketing plan, including collecting customer data online, monitoring social media for brand mentions, and legal and ethical issues around privacy and data collection. It also covers creating a Google account and using Google Alerts, Google Plus, and Google Hangouts for collaboration as part of modern digital education. Students are instructed to split into groups to define their company and target customer as the starting point for creating their own digital marketing plan.
Information security management requires having a plan to manage security, understanding the business needs, and promoting a security-positive culture. Effective communication and understanding business drivers are important. Information security professionals need to adopt risk-based approaches, classify sensitive information, and ensure compliance with relevant regulations while supporting business objectives. Maintaining security also involves incident response, business continuity planning, and keeping up with emerging threats and technologies.
The document describes the Cognitive Process Profile (CPP), an assessment that measures an individual's ability to think strategically and deal with complexity. The CPP evaluates a person's fluid intelligence through simulation exercises and provides insights into their thinking styles, processes, learning potential, and ability to work in different levels of complexity. It is used for leadership development, succession planning, recruitment, and matching the right people to roles. Over 180,000 professionals have completed the CPP worldwide.
This document discusses the state of intelligence and proposes a new "third era" model. It identifies gaps in holistic analysis and fragmented knowledge. The document advocates for open-source intelligence, integrity, and bringing together different fields of knowledge to create a more complete understanding and help address major threats facing humanity like poverty, disease, and environmental issues.
This document discusses various types of modern conflicts and threats facing societies post-9/11. It addresses threats from non-state actors, infectious diseases, poverty, environmental degradation, and more. It argues that current defense strategies focus too narrowly on state-based military threats while largely ignoring other challenges. A holistic approach is needed to understand the full spectrum of threats and their interrelated nature in order to effectively address risks to security and stability.
This document discusses intelligence and open source information. It argues that intelligence should focus on decision support, holistic analysis, counterintelligence on domestic threats, and integrated scalable IT. The document outlines a preliminary holistic analytic model and proposes that open source information can address most economic, social and military threats. It advocates for a whole of government approach to intelligence that focuses on cross-cutting issues rather than individual countries or domains. The document also discusses the need for new rules and approaches for intelligence, including greater emphasis on non-traditional threats, cultural and geospatial analysis, and collaborative work.
My latest thinking on the future of intelligence for traditional intelligence communities (not be be confused with my latest thinking on the open source everything innovation hub). This is the invited keynote, there is also a workshop briefing.
A more polished simple attempt to explain to the University of Maryland at College Park how they could become the hub for a world brain and a school of future-oriented hybrid governance. No joy.
Robert David Steele presents his ideas on achieving reflexive and integral consciousness. He argues that the current systems of academia, government, and business lack integrity and do not serve the public interest. Steele proposes the creation of open-source analytic models and decision-making frameworks that incorporate the true social and environmental costs of policies and factor in input from all members of society. His goal is to establish feedback loops between all people to support non-zero-sum solutions and conscious evolution for the benefit of humanity.
The USA is hosed until such time as We the People eradicate the two-party tyranny, restore integrity to our electoral process, and demand that governance be transparent, truthful, and trustworthy.
The document outlines Robert David Steele's vision for GW's future, with 3 main ideas: capturing real estate like the South-Central Campus, creating relevance through institutes like a World Brain Institute, and improving rankings by becoming a leader in areas like an Open Source Agency. Steele proposes specific actions over 2012-2015, like securing State Department funding for an Open Source Agency on the South-Central Campus and raising $600M from Saudis and the JFK Center for new buildings. He argues GW should focus on integrating knowledge across disciplines, addressing threats like knowledge fragmentation, and becoming the national university and hub for connecting diverse groups.
Pitch to President of George Washington University on creating a School of Future-Oriented Hybrid Governance and a World Brain Institute. He never bothered to respond.
This document summarizes a proposal for a new position of Vice President for Global Strategies at George Mason University. The proposal outlines plans to make GMU's learning more integrated, international, and focused on addressing global issues. It suggests creating a World Brain Institute and Center for Public Intelligence to collect and share knowledge from around the world and support decision making. The proposal argues this could make GMU a leader in global education, research, and intelligence.
This document discusses hacking humanity to end corruption and restore humanity. It advocates educating the poor through calls and creating infinite wealth. It criticizes current paradigms like government, military, and business for being uninformed and lacking feedback. It proposes reforms like ending fraud, waging peace, and educating all. It provides examples of matching needs and gifts globally and applying investment harmonization across places and time. It advocates sharing data and forgotten knowledge through integrity. It proposes initiatives like an Earth Rescue Network and global call centers to connect the world's poor. It criticizes the White House and Congress for not working in the public interest and advocates non-violent intelligence to end corruption and connect the poor.
First presentation of the local to global range of gifts table that disintermediates, eliminates NGO waste and theft, and allows for meeting needs of all people through a data-driven sparse matrix that leveraging multiple individual humans to meet specific needs.
This document proposes envisioning a future for UN air power that is intelligence-driven and focused on precision peacekeeping. It advocates for a new emphasis on open-source intelligence sharing across agencies and countries to address modern threats like poverty, disease, and humanitarian crises. Key aspects include establishing a global network of "Peace Jumpers" to rapidly respond to needs via precision air drops coordinated by regional air traffic management. The goal is to use air assets, guided by accurate open-source intelligence, to efficiently deliver targeted humanitarian aid and support sustainable outcomes.
By invitation of Stephen E. Arnold one of my IT heroes, put forward a few thoughts on real time information. Without Open Source Everything, the information sharing and sense-making we need to do is simply not possible.
This document provides an 18 slide staff briefing on open source intelligence (OSINT) and defense. It discusses how defense intelligence needs have changed from focusing solely on conventional threats during the Cold War to addressing unconventional threats today. It argues that OSINT can provide the most satisfaction of intelligence requirements at the lowest cost. It recommends establishing an OSINT program line across the Department of Defense and an open source intelligence center to better leverage openly available information for defense needs.
Failed attempt to get the Undersecretary of Defense for Intelligence (today the Director of National Intelligence) to be serious about producing decision-support instead of simply spending money wantonly.
This document provides an agenda and overview for a 3-day training on information sharing and analytics for UN personnel from different agencies in Lebanon. The training aims to improve information sharing across UN organizations and identify open source resources. The agenda covers introducing participants and resources, discussing current events, sources and methods for analysis, and conducting a security risk assessment exercise. The overall goal is to enhance the UN's access to and use of multinational information for decision support.
This document promotes openness and sharing of information to address major issues facing humanity. It discusses creating an Earth Intelligence Network to connect people and information. Key points include harnessing open source intelligence and sharing across networks, cultures, and organizations to understand threats and foster positive trends like sustainable problem solving. The goal is empowering citizens with accessible, transparent information.
Offered in Beirut by invitation, lots of interest but UN bureaucracy, like the US Government political leadership, is absolutely not interested in the truth at any cost even if it lowers all other costs.
1. ®
COLLECTION:
Know Who Knows
Robert David Steele
Intelligence Coach
bear@oss.net
2. ®
Elements of Collection
Open Source
Intelligence
Clandestine
Human
Intelligence
Signals
Intelligence
Imagery
Intelligence
Leadership
• Mindset
• Courage
3. ®
Open Source Intelligence I
Lessons of History
China, Islam, Ethnic, Etc.
I
Lessons of History
Narrowly focused!
• Neither the academics
nor the government
have done well here.
• We need to fund both
specialists in history,
and a massive
digitization project for
Chinese, Islamic, other
key histories.
4. ®
Open Source Intelligence II
Global Burden Sharing
II
Global Coverage
Cost-Sharing with Others--
Shared Early Warning
Narrowly focused!
• No one has the time,
money, or ability to
cover the world.
• We must find new
means of sharing the
burden of collection,
translation, digitization
of global open sources in
29+ languages.
• The Internet is vital.
5. ®
Open Source Intelligence III
Leveraging the Private Sector
Narrowly focused!
III
National Intelligence
Harness distributed
intelligence of Nation
• The national intelligence
tribe must establish open
protocols for linking and
leveraging the other
tribes: military, law
enforcement, business,
academic, NGO-media,
and religious.
• A national intelligence
federation is needed.
6. ®
Clandestine Collection I
Get Away from Official Cover
• The best agents don’t
go to cocktail parties
or meet with official
cover personalities.
• It is not possible to
manage truly secret
operations from a
fixed point known to
local liaison.
7. ®
Clandestine Collection II
Focus on Long-Term Secure Agents
• The best case officers
should be trained to
spot, assess, recruit,
and handle long-term
secure agents that have
access to truly unique
information that
cannot be gotten via
open source channels.
8. ®
Clandestine Collection III
Devise Multilateral Operations
• Multi-lateral
clandestine operations
that leverage trained
indigenous case offices
(e.g. black South
Africans, French Arabs,
Russian mujahids) will
have more success.
• We must get serious.
9. ®
Satellite Collection I
Leverage Commercial Capabilities
• 80% of what we need
can be bought at
relatively low cost
from the private
sector--this is
especially true for
commercial imagery
and global signals
broadcast monitoring.
10. ®
Satellite Collection II
Processing Matters More Than Collection
• 80% of the value to be
had from satellite
collection--whether
images or signals--
comes from post-processing.
• Spending on collection
that is not processed is
a very wasteful habit.
11. ®
Satellite Collection III
Go After US Shuttle Mission DTED
• The value of
commercial imagery
can be doubled or
tripled if we can get
the USA to release the
Digital Terrain
Elevation Data
(DTED) taken at
levels 1-3 from the
space shuttle in 2000.
12. ®
Close-In Technical Collection I
When Encryption Really Hurts
• Remember that 80% of
the value of signals
intelligence is in the
pattern and the
connection--not the text.
• If you must have the
text, then close-in
collection is a good
option--drug the dogs.
13. ®
Close-in Technical Collection II
Processing Cost Almost Too Great
• Every hour of close-in
collection takes four
hours to transcribe, and
generally produces less
than 5 minutes of good
stuff.
• Don’t do close-in
collection unless that
five minutes is worth it.
VALUE
TIME
PAGES
COST
14. ®
Close-in Technical Collection III
Covert People Beacons the Next Big Thing
• Terrorists and
criminals are getting
too difficult to track
using old means.
• Covertly implanted
beacons, both in their
bodies and in their
vehicles, could be the
next big thing.
15. ®
Right People I
Must Profile for Excellence
• Each aspect of
intelligence requires a
special kind of
personality profile.
• We must carefully
identify profiles of the
best street officers, the
best analysts, and then
find more of the same.
16. ®
Right People II
Professionalization through Training
• The old days of “on the
job training” are over.
If intelligence is to be
professionalized and
standardized, then
training must be intense
at the beginning, and
continuous throughout
a career.
• What we do is hard!
17. ®
Right People III
Sustainment Through Proper Pay
• You get what you pay
for. If we are to avoid
corruption, time theft,
and having the wrong
people doing critical
jobs improperly, then
we must plan for top
salaries and health
benefits and quality of
life when off the job.
18. ®
Right Managers I
Gold Collar Workers Are Thoroughbreds
• Intelligence
professionals are “gold
collar workers”--vastly
superior to “white
collar” or “blue collar.”
• Managers must learn to
treat intelligence
professionals as race
horses, not plow horses.
19. ®
Right Managers II
Nurturing, Coaching, Mentoring, Protecting
• Management is no
longer about costs,
results, or objectives.
• The core management
skills today lie in
nurturing, coaching,
mentoring, and
protecting people.
• They know better--get
that knowledge to work.
• Nurture imagination
• Coach talent at every level
• Mentor juniors everywhere
• Protect speakers of truth
20. ®
Right Managers III
Your Worst Employee Defines You
• If you are not cutting
the worst 10% of your
employees every few
months, they will
infect the others and
undermine your work.
• Your worst employee
defines you as a
manager.
21. ®
Collection Management I
Find It or Get It for Free
• Our first challenge is
to know if we already
know this or can get it.
• Can we FIND or GET
the information we
need within our own
databases or those of
other organizations?
• This is a skill track.
22. ®
Collection Management II
Buy It From Private Sector, Cheaply
• If we cannot FIND it
or GET it free, can we
BUY the information
cheaply from a private
sector provider?
• We must know what
the private sector can
do, we must budget
funds for buying
information.
23. ®
Collection Management III
Task It to Secret Capabilities
• This is the last
question we should be
asking, but too often it
is the only question we
ask.
• Only if we cannot
FIND, GET, or BUY,
should we be tasking
classified assets and
stealing information.
24. ®
Conclusion I
Data standards and sharing matter
OSINT
HUMINT
It’s the
back and
forth
that
allows
DNA to
define
life.
• From north to south,
east to west, if the
information is not
entered digitally and
according to some
agreed upon standard,
it will not be shared
and will not contribute
to national intelligence.
IMINT
SIGINT
25. ®
Conclusion II
24/7 Geospatial “Plot” is Vital
• There is no substitute
for a 24/7 watch center
that has a geospatial
“plot” and can
combine a knowledge
of intelligence sources
with a real-world
depiction of locations,
vehicles, targets, and
individuals.
26. ®
Conclusion III
Die in Isolation, Thrive in Combination
• We are our own enemy.
Compartmentation and
security are the enemy
of timely intelligence.
• Sources achieve their
greatest effect when
combined, not when
isolated.
“Okay, so maybe I was wrong not to tell you about my secret
source--but you should have told me first…...”
Editor's Notes
To set the stage for considering how intelligence has failed at the national level, it is helpful to first emphasize that intelligence is about much more than simply secret collection or general analysis.
Especially important in this illustration is the co-equal importance of counterintelligence--including operational security which most commanders and policymakers refuse to respect--and covert action, the “third way” between diplomacy and warfare.
Finally, leadership is essential. The mindset and moral courage of intelligence leaders is the sine qua non for successful intelligence. Bureaucrats will fail.
My second book, THE NEW CRAFT OF INTELLIGENCE: Personal, Public, & Political, lays out the future of intelligence as I believe the citizen-taxpayer must insist it be.
Specifically, we can no longer afford to ignore either history or the historical statements of other players in their own languages; we must devise a means of sharing the burden of monitoring all open sources in all languages all the time; we must harness the considerable knowledge we have in our private sector; and we must focus our spies on the hard stuff.
My second book, THE NEW CRAFT OF INTELLIGENCE: Personal, Public, & Political, lays out the future of intelligence as I believe the citizen-taxpayer must insist it be.
Specifically, we can no longer afford to ignore either history or the historical statements of other players in their own languages; we must devise a means of sharing the burden of monitoring all open sources in all languages all the time; we must harness the considerable knowledge we have in our private sector; and we must focus our spies on the hard stuff.
My second book, THE NEW CRAFT OF INTELLIGENCE: Personal, Public, & Political, lays out the future of intelligence as I believe the citizen-taxpayer must insist it be.
Specifically, we can no longer afford to ignore either history or the historical statements of other players in their own languages; we must devise a means of sharing the burden of monitoring all open sources in all languages all the time; we must harness the considerable knowledge we have in our private sector; and we must focus our spies on the hard stuff.
STS-99 Crew Works in Shifts to Complete Mapping MissionEndeavour's international crew of seven spent 11 days in orbit during February 2000 mapping the Earth's surface with radar instruments.
Commander Kevin Kregel, Pilot Dom Gorie and Mission Specialists Janice Voss, Janet Kavandi, Gerhardt Thiele and Mamoru Mohri split their schedule into two shifts to support round-the-clock operations. Thiele -- a native of Germany -- represented the European Space Agency, and Mohri represented Japan's space agency, NASDA.
http://www.shuttlepresskit.com/STS-99/OBJ107.htm
http://www.shuttlepresskit.com/STS-99/OBJ107.htm