1 / 23

Overview

Overview. What is INSER? Colloquium Topics Panel Discussion Exercise. Institute for National Security Education & Research (INSER). Established at UW during ‘05-’06 academic year Housed in the Information School Provides a “forum for independent research

madge
Télécharger la présentation

Overview

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Overview • What is INSER? • Colloquium Topics • Panel Discussion • Exercise

  2. Institute for National Security Education & Research (INSER) • Established at UW during ‘05-’06 academic year • Housed in the Information School • Provides a “forum for independent research • and cutting-edge scholarship” • Focuses on “areas of broad relevance to public safety • and national security issues”

  3. Intelligence Community Centers of Academic Excellence (IC CAE) • Founded by Office of the Director of National Intelligence • Designed to increase the pool of eligible applicants in core • IC skill sets • Provides colleges and universities with the opportunity to • implement curricula focusing on “critical” IC skill sets • Information technology specialists • Language specialists • Political/economic specialists • Threat environment specialists • Science specialists

  4. The United States Intelligence Community’s 5 Year Strategic Human Capital Plan • From the Office of the Director of National Intelligence (2006) • An annex to the National Intelligence Strategy (NIS) • Goal: to “Win the war for talent” by attracting and retaining the best and brightest candidates • Goal: to strengthen the IC by creating a culture of leadership and fostering an ethos that values selfless service, integrity, and accountability • Called for the IC CAE

  5. Opening Remarks:Matthew Saxton Over-arching theme: “It’s all about human behavior and human motivation, and not about the perfect system. “ “…fundamental human behavior issues are evolving in this social media/social computing environment.”

  6. Topics • Cybersecurity • Virtual Worlds • Cybersecurity and Virtual Worlds • Ethical Issues in Information • Panel Discussion

  7. Cybersecurity: Social aspects • Information Security is a behavior • Culture Clash • Not just about your computer • It’s what information you emit • It’s not ephemeral (Twitter) • Individual vs organizational expectations • Persuasion rather than enforcement • Coping w/ uncertainty • Assume breach • People make mistakes • Need more behavioral research relevant to this emerging technology

  8. Virtual Worlds: • Web 3.0 emerging • Photo-realistic representation vs. text-based • Every physical object is programmable • No borders – co-creation • SecondLife: • 15 million registered accounts • Individual and business • Education, training, business • 24,000 “islands”

  9. Virtual Worlds:Avatars as Citizens • Social dynamics emerge • Emotional/physical responses • Instantaneous identity changes • Development of reputations • Disabled become enabled • Social structures built • Organizing, governing, adjudicating • Ownership

  10. Virtual Worlds • Concerns: • Bandwidth • Telecomm companies rules/$ ? • Interoperability • Governance (IP management) • Security and Privacy • Potential for misuse • Misinformation • Terrorist training

  11. Cybersecurity and Virtual Worlds • Threats: • Deceit capability is far reaching • No legal world • No face-to-face interaction • Identity theft • Terrorist training grounds • Organized crime

  12. Panel Discussion Dan Chirot, Ph.D., UW School of International Studies • We are not a confident society • Current age of paranoia • Recalls other periods in history, Cold War and McCarthyism • Technology creates abilities to intrude (i.e., for commercial and political uses) • Alarming trends since 9/11 • Why are intelligence agencies bypassing the FISA court? (given that FISA has almost never rejected a request) • Conclusion: There is good reason to suggest that security agencies around us are not concerned with ethics

  13. Panel Discussion Adam Moore, Ph.D., UW Department of Philosophy, iSchool • Privacy is necessary for health and well-being • People are almost always willing to trade privacy for security • Contend that this is not a binary choice • Promoting security also promotes privacy • Role of government • Hobbes’ view that human condition is 'nasty, brutish, and short', therefore we need a powerful leviathan (government) • Locke's argument that giving government too much power undermines the mission of providing security • Conclusion • Only at margins of law should privacy be traded for security, and then only with due process and strong sunlight provisions

  14. Panel Discussion Mark Haselkorn, Ph.D. UW Human Centered Design and Engineering, Dir. Pacific Rim Visualization and Analytics Center • Tension between truth and harm • Role of the university is to tell society the truth • Challenge is how to adhere to the truth when it can do great harm • This tension in universities is a critical one

  15. Panel Discussion Gregory Witkop, M.D., FBI • Difference between intelligence and information • Intelligence is meaningful and actionable • Gain an edge over an adversary • Just War/Just Intelligence theory • Contend that you can apply principles of ‘just war’ to ‘just intelligence’ • Matrix of threat and applicable intelligence methods/means • Conclusion: Intelligence community must exemplify values and rule of law

  16. Civil Liberties and Privacy Office “Protecting privacy and civil liberties is part of the fabric of the IC and it helps define who we are. In order to effectively use the tools and information we need to keep our country safe, we must have the trust of the American people and demonstrate that we are worthy of that trust. “ The term “intelligence” conspicuously absent

  17. Categories http://www.nytimes.com/pages/ todayspaper/index.html • OSINT • HUMINT • SIGINT • COMINT • ELINT • FISINT • GEOINT • IMINT • MASINT

  18. Other Departments • The National Media Exploitation Center (NMEC) • all acquired and seized media across the intelligence, counterintelligence, military, and law enforcement communities. • The National Virtual Translation Center (NVTC) established 2003 • Partnering with elements of the U.S. Government, academia, and private industry to identify translator resources and engage their services • connected virtually to the program office in Washington, D.C

  19. IC CAE:What’s Ahead • Interview with Jeff Kim, Director

  20. Exercise

  21. Scenario Players: • Claire: Librarian, new to Midvale • Mike: Mayor, up for re-election • Bob: Chief of police • Bob’s son: searching for info. on gay-friendly colleges (with Claire’s help, without Bob’s knowledge) • FBI • Citizens of Midvale

  22. Participating Organizations • UW/Govt. agencies: • APL: http://www.apl.washington.edu/ • CIASC: http://ciac.ischool.washington.edu/ • INSER:http://cluster.ischool.washington.edu/caenser/ • PARVAC: http://www.hitl.washington.edu/projects/parvac • PNNL: http://www.pnl.gov/ • FBI: http://www.fbi.gov/hq/ci/domain.htm / • Private Companies (Virtual Worlds): • 2b3d: http://2b3d.net/ • Fourth Wall Studios: http://www.fourthwallstudios.com/

More Related