View
218
Download
1
Embed Size (px)
Citation preview
Overview What is INSER? Colloquium
Topics Panel Discussion Exercise
Institute for National Security Education &
Research (INSER) Established at UW during ‘05-’06 academic year
Housed in the Information School
Provides a “forum for independent research
and cutting-edge scholarship”
Focuses on “areas of broad relevance to public safety
and national security issues”
Founded by Office of the Director of National
Intelligence
Designed to increase the pool of eligible
applicants in core
IC skill sets
Provides colleges and universities with the
opportunity to
implement curricula focusing on “critical” IC
skill sets
• Information technology specialists
• Language specialists
• Political/economic specialists
• Threat environment specialists
• Science specialists
Intelligence Community Centers of Academic Excellence (IC CAE)
The United States Intelligence Community’s 5 Year Strategic Human
Capital Plan
From the Office of the Director of National
Intelligence (2006)
An annex to the National Intelligence
Strategy (NIS)
Goal: to “Win the war for talent” by
attracting and retaining the best and
brightest candidates
Goal: to strengthen the IC by creating a
culture of leadership and fostering an
ethos that values selfless service,
integrity, and accountability
Called for the IC CAE
Opening Remarks:Matthew Saxton
Over-arching theme:
“It’s all about human behavior and human
motivation, and not about the perfect system. “
“…fundamental human behavior issues are evolving
in this social media/social computing
environment.”
Cybersecurity Virtual Worlds Cybersecurity and Virtual
Worlds Ethical Issues in
Information Panel Discussion
Topics
Cybersecurity: Social aspects
Information Security is a behavior Culture Clash
Not just about your computer It’s what information you emit It’s not ephemeral (Twitter)
Individual vs organizational expectations Persuasion rather than enforcement Coping w/ uncertainty Assume breach People make mistakes
Need more behavioral research relevant to this emerging technology
Virtual Worlds: Web 3.0 emerging
Photo-realistic representation vs. text-based
Every physical object is programmable
No borders – co-creation SecondLife:
15 million registered accounts Individual and business Education, training, business 24,000 “islands”
Virtual Worlds:Avatars as Citizens
Social dynamics emerge Emotional/physical responses Instantaneous identity changes Development of reputations Disabled become enabled
Social structures built Organizing, governing,
adjudicating Ownership
Virtual Worlds Concerns:
BandwidthTelecomm companies rules/$ ?InteroperabilityGovernance (IP management)Security and Privacy
Potential for misuseMisinformationTerrorist training
Cybersecurity and Virtual Worlds Threats:
Deceit capability is far reaching
No legal world No face-to-face
interaction Identity theft Terrorist training grounds Organized crime
Panel Discussion
Dan Chirot, Ph.D., UW School of International Studies We are not a confident society
Current age of paranoiaRecalls other periods in history, Cold War and
McCarthyismTechnology creates abilities to intrude (i.e., for
commercial and political uses) Alarming trends since 9/11
Why are intelligence agencies bypassing the FISA court? (given that FISA has almost never rejected a request)
Conclusion: There is good reason to suggest that security agencies around us are not concerned with ethics
Panel Discussion
Adam Moore, Ph.D., UW Department of Philosophy, iSchool Privacy is necessary for health and well-being People are almost always willing to trade privacy for
security Contend that this is not a binary choice Promoting security also promotes privacy
Role of government Hobbes’ view that human condition is 'nasty, brutish, and
short', therefore we need a powerful leviathan (government)
Locke's argument that giving government too much power undermines the mission of providing security
Conclusion Only at margins of law should privacy be traded for security, and
then only with due process and strong sunlight provisions
Panel Discussion
Mark Haselkorn, Ph.D. UW Human Centered Design and Engineering, Dir. Pacific Rim Visualization and Analytics Center Tension between truth and harm
Role of the university is to tell society the truth
Challenge is how to adhere to the truth when it can do great harm
This tension in universities is a critical one
Panel Discussion
Gregory Witkop, M.D., FBIDifference between intelligence and
information Intelligence is meaningful and actionable
Gain an edge over an adversary
Just War/Just Intelligence theoryContend that you can apply principles of ‘just war’ to ‘just intelligence’
Matrix of threat and applicable intelligence methods/means
Conclusion: Intelligence community must exemplify values and rule of law
Civil Liberties and Privacy Office
“Protecting privacy and civil liberties is part
of the fabric of the IC and it helps define
who we are. In order to effectively use the
tools and information we need to keep our
country safe, we must have the trust of
the American people and demonstrate that
we are worthy of that trust. “
The term “intelligence” conspicuously absent
Categories
OSINT HUMINT SIGINT
COMINT ELINT FISINT
GEOINT IMINT
MASINT
http://www.nytimes.com/pages/todayspaper/index.html
Other Departments
The National Media Exploitation Center (NMEC)
all acquired and seized media across the
intelligence, counterintelligence, military, and law
enforcement communities.
The National Virtual Translation Center (NVTC)
established 2003
Partnering with elements of the U.S. Government,
academia, and private industry to identify
translator resources and engage their services
connected virtually to the program office in
Washington, D.C
IC CAE:What’s Ahead
Interview with Jeff Kim, Director
Exercise
Scenario
Players: Claire: Librarian, new to Midvale Mike: Mayor, up for re-election Bob: Chief of police Bob’s son: searching for info. on gay-
friendly colleges (with Claire’s help, without Bob’s knowledge)
FBI Citizens of Midvale
Participating Organizations
UW/Govt. agencies: APL: http://www.apl.washington.edu/ CIASC: http://ciac.ischool.washington.edu/ INSER: http://cluster.ischool.washington.edu/
caenser/ PARVAC:
http://www.hitl.washington.edu/projects/parvac
PNNL: http://www.pnl.gov/ FBI: http://www.fbi.gov/hq/ci/domain.htm /
Private Companies (Virtual Worlds): 2b3d: http://2b3d.net/ Fourth Wall Studios:
http://www.fourthwallstudios.com/