230 likes | 375 Views
Overview. What is INSER? Colloquium Topics Panel Discussion Exercise. Institute for National Security Education & Research (INSER). Established at UW during ‘05-’06 academic year Housed in the Information School Provides a “forum for independent research
E N D
Overview • What is INSER? • Colloquium Topics • Panel Discussion • Exercise
Institute for National Security Education & Research (INSER) • Established at UW during ‘05-’06 academic year • Housed in the Information School • Provides a “forum for independent research • and cutting-edge scholarship” • Focuses on “areas of broad relevance to public safety • and national security issues”
Intelligence Community Centers of Academic Excellence (IC CAE) • Founded by Office of the Director of National Intelligence • Designed to increase the pool of eligible applicants in core • IC skill sets • Provides colleges and universities with the opportunity to • implement curricula focusing on “critical” IC skill sets • Information technology specialists • Language specialists • Political/economic specialists • Threat environment specialists • Science specialists
The United States Intelligence Community’s 5 Year Strategic Human Capital Plan • From the Office of the Director of National Intelligence (2006) • An annex to the National Intelligence Strategy (NIS) • Goal: to “Win the war for talent” by attracting and retaining the best and brightest candidates • Goal: to strengthen the IC by creating a culture of leadership and fostering an ethos that values selfless service, integrity, and accountability • Called for the IC CAE
Opening Remarks:Matthew Saxton Over-arching theme: “It’s all about human behavior and human motivation, and not about the perfect system. “ “…fundamental human behavior issues are evolving in this social media/social computing environment.”
Topics • Cybersecurity • Virtual Worlds • Cybersecurity and Virtual Worlds • Ethical Issues in Information • Panel Discussion
Cybersecurity: Social aspects • Information Security is a behavior • Culture Clash • Not just about your computer • It’s what information you emit • It’s not ephemeral (Twitter) • Individual vs organizational expectations • Persuasion rather than enforcement • Coping w/ uncertainty • Assume breach • People make mistakes • Need more behavioral research relevant to this emerging technology
Virtual Worlds: • Web 3.0 emerging • Photo-realistic representation vs. text-based • Every physical object is programmable • No borders – co-creation • SecondLife: • 15 million registered accounts • Individual and business • Education, training, business • 24,000 “islands”
Virtual Worlds:Avatars as Citizens • Social dynamics emerge • Emotional/physical responses • Instantaneous identity changes • Development of reputations • Disabled become enabled • Social structures built • Organizing, governing, adjudicating • Ownership
Virtual Worlds • Concerns: • Bandwidth • Telecomm companies rules/$ ? • Interoperability • Governance (IP management) • Security and Privacy • Potential for misuse • Misinformation • Terrorist training
Cybersecurity and Virtual Worlds • Threats: • Deceit capability is far reaching • No legal world • No face-to-face interaction • Identity theft • Terrorist training grounds • Organized crime
Panel Discussion Dan Chirot, Ph.D., UW School of International Studies • We are not a confident society • Current age of paranoia • Recalls other periods in history, Cold War and McCarthyism • Technology creates abilities to intrude (i.e., for commercial and political uses) • Alarming trends since 9/11 • Why are intelligence agencies bypassing the FISA court? (given that FISA has almost never rejected a request) • Conclusion: There is good reason to suggest that security agencies around us are not concerned with ethics
Panel Discussion Adam Moore, Ph.D., UW Department of Philosophy, iSchool • Privacy is necessary for health and well-being • People are almost always willing to trade privacy for security • Contend that this is not a binary choice • Promoting security also promotes privacy • Role of government • Hobbes’ view that human condition is 'nasty, brutish, and short', therefore we need a powerful leviathan (government) • Locke's argument that giving government too much power undermines the mission of providing security • Conclusion • Only at margins of law should privacy be traded for security, and then only with due process and strong sunlight provisions
Panel Discussion Mark Haselkorn, Ph.D. UW Human Centered Design and Engineering, Dir. Pacific Rim Visualization and Analytics Center • Tension between truth and harm • Role of the university is to tell society the truth • Challenge is how to adhere to the truth when it can do great harm • This tension in universities is a critical one
Panel Discussion Gregory Witkop, M.D., FBI • Difference between intelligence and information • Intelligence is meaningful and actionable • Gain an edge over an adversary • Just War/Just Intelligence theory • Contend that you can apply principles of ‘just war’ to ‘just intelligence’ • Matrix of threat and applicable intelligence methods/means • Conclusion: Intelligence community must exemplify values and rule of law
Civil Liberties and Privacy Office “Protecting privacy and civil liberties is part of the fabric of the IC and it helps define who we are. In order to effectively use the tools and information we need to keep our country safe, we must have the trust of the American people and demonstrate that we are worthy of that trust. “ The term “intelligence” conspicuously absent
Categories http://www.nytimes.com/pages/ todayspaper/index.html • OSINT • HUMINT • SIGINT • COMINT • ELINT • FISINT • GEOINT • IMINT • MASINT
Other Departments • The National Media Exploitation Center (NMEC) • all acquired and seized media across the intelligence, counterintelligence, military, and law enforcement communities. • The National Virtual Translation Center (NVTC) established 2003 • Partnering with elements of the U.S. Government, academia, and private industry to identify translator resources and engage their services • connected virtually to the program office in Washington, D.C
IC CAE:What’s Ahead • Interview with Jeff Kim, Director
Scenario Players: • Claire: Librarian, new to Midvale • Mike: Mayor, up for re-election • Bob: Chief of police • Bob’s son: searching for info. on gay-friendly colleges (with Claire’s help, without Bob’s knowledge) • FBI • Citizens of Midvale
Participating Organizations • UW/Govt. agencies: • APL: http://www.apl.washington.edu/ • CIASC: http://ciac.ischool.washington.edu/ • INSER:http://cluster.ischool.washington.edu/caenser/ • PARVAC: http://www.hitl.washington.edu/projects/parvac • PNNL: http://www.pnl.gov/ • FBI: http://www.fbi.gov/hq/ci/domain.htm / • Private Companies (Virtual Worlds): • 2b3d: http://2b3d.net/ • Fourth Wall Studios: http://www.fourthwallstudios.com/