SlideShare a Scribd company logo
1 of 34
Download to read offline
www.ShepherdsPi.com
“What technologies
will be required
over the next 10 years
to protect U.S. interests?”
An Exercise in Prediction
What if we had asked that question,
15 years ago?
“Asymmetric adversary” = an information challenge
(i.e. = intel hard target)
Seeming irrelevance of traditional methods for new targets
- Order of battle
- State-to-state analysis
- “Kremlinological” approaches
- Staid, “authoritative Core Knowledge” repositories
Challenges of IT during wartime
- Stress on systems infrastructure of 2 wars (3?)
- Stress on software (link-analysis, SNA, “search”)
- Stress on collection capacity (sensor grids, Internet)
- Stress on integrity of systems & comms (“cybersecurity”)
- Stress on analysts’ – and technologists’ – imagination
Some IC Surprises Post-9/11
Pace of Technology Change continued along Moore’s Law
Lines of Business disrupted by Internet and related tech
- Communications biz ( -> mobile, transnational, price drops)
- PC biz (laptops, tablets, smartphones)
- Music biz (iTunes, streaming)
- Media biz (near-death print, narrowcasting, ad revolution)
Increasing Role of USG in shaping/governing Internet policy
Private Sector Surprises Post-9/11
• Technological Change
• Difficulties in Supporting USG
• Globalization
Future Business Challenges
New Innovation, New Opportunities
Natural User
Interfaces
Social
Media
Augmented
Reality
Big Data
Machine
Learning
Collaboration Cloud & Services
Cyber
Security
Mobility
Ambient Computing
Machine Learning
Two core themes
of advanced R&D
Two core themes
of advanced R&D
The next paradigm shift: Ambient Computing
Important Implications of these two:
Machine learning is the ability for computers to learn
automatically from data to improve their future
performance continually.
Ambient computing refers to having computing devices,
embedded all around in the environment, that can
understand people’s intent and operate on their behalf.
Machine learning
Ambient computing
Consumer play from these waves:
An era where we move beyond the
personal computer to a world where
computing all around us becomes
more personal.
Government relevance of these waves:
• Unique and insanely powerful mission applications
• Government workforce and workplace transformed
by the Consumer transformation
Government missed 3 recent paradigm shifts…
badly.
1980 1990 2000 2010
Imagine if the WWII War Department had refused to
use telephones because of a Security argument citing
“Person-in-the-middle” re switchboards, or “Endpoint
vulnerability” re Party-lines?
Source: ComScore Reports, March 2014
Globalization
• Technological Change
• Difficulties in Supporting USG
• Globalization
Policy Challenges
Company data sources; Kleiner-Perkins research
Big Data is being used to
solve problems…
Policy
From three facets
1 2 3
Courtesy of and adapted from David Aucsmith
Legal
Pace of technological
change outpaces
regulatory expertise
1 2 3
Courtesy of and adapted from David Aucsmith
Defense Science Board 2015 Summer Study on Autonomy
…identify the science, engineering, and policy problems
that must be solved to permit greater operational use of
autonomy across all war-fighting domains…
…exploration of the bounds – both technological and
social – that limit the use of autonomy across a wide range of
military operations….”
Five Agreed-upon Principles, which
as a set are consistent with established
global norms of free expression and
privacy
Principles are designed to ensure that
governments’ law-enforcement and
intelligence efforts are:
• Rule-bound
• Narrowly tailored
• Transparent
• Subject to oversight
Brad Smith, December 8, 2013 press release
We’ll be watching as
technologies,
cultures,
governments
collide…
IC-CAE - Shepherd: The Internet 2015-2025
IC-CAE - Shepherd: The Internet 2015-2025

More Related Content

Viewers also liked

Viewers also liked (7)

Rahm 2.0
Rahm 2.0Rahm 2.0
Rahm 2.0
 
Final draft corrected pdf
Final draft corrected pdfFinal draft corrected pdf
Final draft corrected pdf
 
The Coder
The CoderThe Coder
The Coder
 
Textual analysis ansylery
Textual analysis ansyleryTextual analysis ansylery
Textual analysis ansylery
 
Feminist 15years slideshow
Feminist 15years slideshowFeminist 15years slideshow
Feminist 15years slideshow
 
Tuberkulosis
TuberkulosisTuberkulosis
Tuberkulosis
 
FirstSix Deck
FirstSix DeckFirstSix Deck
FirstSix Deck
 

Similar to IC-CAE - Shepherd: The Internet 2015-2025

Keis0s2 Is Stages 2008
Keis0s2 Is Stages 2008Keis0s2 Is Stages 2008
Keis0s2 Is Stages 2008Ian Miles
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesAsst.prof M.Gokilavani
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfAsst.prof M.Gokilavani
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)Adam Thierer
 
How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? Mercatus Center
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Adam Thierer
 
Roadmap for the Trillion Sensor Universe -- a Gilt-hosted, Internet of Things...
Roadmap for the Trillion Sensor Universe -- a Gilt-hosted, Internet of Things...Roadmap for the Trillion Sensor Universe -- a Gilt-hosted, Internet of Things...
Roadmap for the Trillion Sensor Universe -- a Gilt-hosted, Internet of Things...Gilt Tech Talks
 
History of computer (1)b bbb
History of computer (1)b bbbHistory of computer (1)b bbb
History of computer (1)b bbbNOSHERWANSHAHID
 
Ethics And Computing
Ethics And ComputingEthics And Computing
Ethics And ComputingDavid Ramirez
 
Marsden #Regulatingcode MIT
Marsden #Regulatingcode MITMarsden #Regulatingcode MIT
Marsden #Regulatingcode MITChris Marsden
 
2600 v03 n06 (june 1986)
2600 v03 n06 (june 1986)2600 v03 n06 (june 1986)
2600 v03 n06 (june 1986)Felipe Prado
 
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to ComeMercatus Center
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesblogzilla
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity riskblogzilla
 
Digital Networks
Digital NetworksDigital Networks
Digital NetworksKathy Gill
 
Trust and the web veria 11 12- 09
Trust and  the web  veria  11 12- 09Trust and  the web  veria  11 12- 09
Trust and the web veria 11 12- 09vafopoulos
 
Economics of Information/Technology
Economics of Information/TechnologyEconomics of Information/Technology
Economics of Information/TechnologyKathy Gill
 
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Chuck Brooks
 

Similar to IC-CAE - Shepherd: The Internet 2015-2025 (20)

INT 1010 02.pdf
INT 1010 02.pdfINT 1010 02.pdf
INT 1010 02.pdf
 
Keis0s2 Is Stages 2008
Keis0s2 Is Stages 2008Keis0s2 Is Stages 2008
Keis0s2 Is Stages 2008
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdf
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
 
top 10 Data Mining Algorithms
top 10 Data Mining Algorithmstop 10 Data Mining Algorithms
top 10 Data Mining Algorithms
 
How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things?
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
 
Roadmap for the Trillion Sensor Universe -- a Gilt-hosted, Internet of Things...
Roadmap for the Trillion Sensor Universe -- a Gilt-hosted, Internet of Things...Roadmap for the Trillion Sensor Universe -- a Gilt-hosted, Internet of Things...
Roadmap for the Trillion Sensor Universe -- a Gilt-hosted, Internet of Things...
 
History of computer (1)b bbb
History of computer (1)b bbbHistory of computer (1)b bbb
History of computer (1)b bbb
 
Ethics And Computing
Ethics And ComputingEthics And Computing
Ethics And Computing
 
Marsden #Regulatingcode MIT
Marsden #Regulatingcode MITMarsden #Regulatingcode MIT
Marsden #Regulatingcode MIT
 
2600 v03 n06 (june 1986)
2600 v03 n06 (june 1986)2600 v03 n06 (june 1986)
2600 v03 n06 (june 1986)
 
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Digital Networks
Digital NetworksDigital Networks
Digital Networks
 
Trust and the web veria 11 12- 09
Trust and  the web  veria  11 12- 09Trust and  the web  veria  11 12- 09
Trust and the web veria 11 12- 09
 
Economics of Information/Technology
Economics of Information/TechnologyEconomics of Information/Technology
Economics of Information/Technology
 
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 

Recently uploaded (20)

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 

IC-CAE - Shepherd: The Internet 2015-2025

  • 2. “What technologies will be required over the next 10 years to protect U.S. interests?” An Exercise in Prediction What if we had asked that question, 15 years ago?
  • 3. “Asymmetric adversary” = an information challenge (i.e. = intel hard target) Seeming irrelevance of traditional methods for new targets - Order of battle - State-to-state analysis - “Kremlinological” approaches - Staid, “authoritative Core Knowledge” repositories Challenges of IT during wartime - Stress on systems infrastructure of 2 wars (3?) - Stress on software (link-analysis, SNA, “search”) - Stress on collection capacity (sensor grids, Internet) - Stress on integrity of systems & comms (“cybersecurity”) - Stress on analysts’ – and technologists’ – imagination Some IC Surprises Post-9/11
  • 4. Pace of Technology Change continued along Moore’s Law Lines of Business disrupted by Internet and related tech - Communications biz ( -> mobile, transnational, price drops) - PC biz (laptops, tablets, smartphones) - Music biz (iTunes, streaming) - Media biz (near-death print, narrowcasting, ad revolution) Increasing Role of USG in shaping/governing Internet policy Private Sector Surprises Post-9/11
  • 5. • Technological Change • Difficulties in Supporting USG • Globalization Future Business Challenges
  • 6. New Innovation, New Opportunities
  • 8. Ambient Computing Machine Learning Two core themes of advanced R&D Two core themes of advanced R&D
  • 9. The next paradigm shift: Ambient Computing
  • 10. Important Implications of these two: Machine learning is the ability for computers to learn automatically from data to improve their future performance continually. Ambient computing refers to having computing devices, embedded all around in the environment, that can understand people’s intent and operate on their behalf.
  • 11. Machine learning Ambient computing Consumer play from these waves: An era where we move beyond the personal computer to a world where computing all around us becomes more personal. Government relevance of these waves: • Unique and insanely powerful mission applications • Government workforce and workplace transformed by the Consumer transformation
  • 12. Government missed 3 recent paradigm shifts… badly. 1980 1990 2000 2010
  • 13. Imagine if the WWII War Department had refused to use telephones because of a Security argument citing “Person-in-the-middle” re switchboards, or “Endpoint vulnerability” re Party-lines?
  • 14. Source: ComScore Reports, March 2014 Globalization
  • 15. • Technological Change • Difficulties in Supporting USG • Globalization Policy Challenges
  • 16.
  • 17. Company data sources; Kleiner-Perkins research Big Data is being used to solve problems…
  • 18. Policy From three facets 1 2 3 Courtesy of and adapted from David Aucsmith
  • 19. Legal Pace of technological change outpaces regulatory expertise 1 2 3 Courtesy of and adapted from David Aucsmith
  • 20. Defense Science Board 2015 Summer Study on Autonomy …identify the science, engineering, and policy problems that must be solved to permit greater operational use of autonomy across all war-fighting domains… …exploration of the bounds – both technological and social – that limit the use of autonomy across a wide range of military operations….”
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. Five Agreed-upon Principles, which as a set are consistent with established global norms of free expression and privacy Principles are designed to ensure that governments’ law-enforcement and intelligence efforts are: • Rule-bound • Narrowly tailored • Transparent • Subject to oversight
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. Brad Smith, December 8, 2013 press release
  • 32. We’ll be watching as technologies, cultures, governments collide…