® The Failure of 20 th Century Intelligence Hackers on Planet Earth (HOPE) 6 Robert David Steele Updated 20 July 2006.

Slides:



Advertisements
Similar presentations
Intelligence in the 21st Century: Re-focusing Intelligence to Shape the Strategic Environment Joint Military Intelligence Training Center Douglas H. Dearth.
Advertisements

Open Source Intelligence Doctrine
® DigitalAnalogOral/Unpublished English Language Foreign Languages* *29 predominant languages, over 3,000 distinct languages in all. NSA FBIS UN/STATE.
® Information Peacekeeping & The Future of Intelligence The United Nations, Smart Mobs, & the Seven Tribes Robert David Steele NISA 15 Nov 02.
TIME IMPACT SHORT TIME IMPACT LONG MULTI-CULTURAL & TRANS-NATIONAL EQUITIES SINGLE-CULTURE SINGLE-ORGANIZATION EQUITIES LEADERS DECIDE PEOPLE DECIDE TOP-DOWN.
® COLLECTION: Know Who Knows Robert David Steele Intelligence Coach
® Modern Strategic Governance Director General Global Strategy Deputy Director Global Strategy Deputy Director Response Management Associate Directors.
Policy/ Threats Poverty Disease Ecology State War Civil War Genocide Oth. Atroc. Proliferation Terrorism Trans. Crime Debt Economy Education Energy Diplomacy.
Searching for Bin Laden: The Use of Intelligence in the War on Terror Robert David Steele (Vivas) CEO, OSS.Net, Inc. World Affairs Council 14 June 2006.
Open Source Intelligence (OSINT): Defense Overview 26 August 2009 Version 3.1 LEADERSHIP BRIEF (6 Slides) As Created by Robert Steele.
® Afterthoughts & Additions Robert David Steele Intelligence Coach Prepared 30 August 2003.
Hacking Health Planned Words in Notes Format. Healthy Lifestyle Healthy Environment Natural and Alternative Remediation Surgical & Pharmaceutical Remediation.
® Strategic Threat Assessment: A Regional Approach to Intelligence, Force Structure, & Combined Operations Robert David Steele OSS.NET 3 March 2003 Miami,
® European Intelligence Network Open borders demand regional intelligence Decades of lax control over immigration & citizenship demand aggressive policing.
Peace From Above: Envisioning the Future of UN Aerospacepower.
1 The role of macro- regional strategies after 2013 The Commissions view (or rather the view of one official) David Sweet, DG Regional Policy, European.
Steele-Yale-6 Reality Intelligence Tired Wired Ethics Solutions Eight Tribes OSE M4IS2 New Mind Robert David Steele CEO (pro bono) Earth Intelligence Network.
The EU as a global actor by 2030 Context –Multipolar world with China, India and U.S. as the most important players. –Globalization –More regionally organized.
US Foreign Policy in the Age of Obama Renewal, Return, and Continuity Michael Baun Valdosta State University.
Emperor Qin Positive Accomplishments/ReformsNegative Accomplishments/Reforms -Great Wall protected China from nomads -Great Wall protected China from invasions.
Defense Transformation: Concepts and Affordability Jack Treddenick George C. Marshall Center DRESMARA 16 October 2006.
Mid-term forensic challenges of E-crime mag.oec. Sasa Aksentijevic,univ.spec.oec. court expert in information and telecommunication technology.
1 US debate about “China Rising” 美國對 “ 中國崛起 ” 的爭論 By Vincent Chan.
Cold War in the Atomic Age Section 14.3 Nuclear test destroys a Pacific atoll.
Getting the extra resources to be successful or the Seven Habits of Successful Fundraisers.
CIO Academy Journey to Influential IT Leadership Journey to CIO Academy Strategic Competencies for 21st Century CIO Success Influential IT Leadership:
Chapter 10.  Import substituting industrialization  Trade liberalization since 1985  Export oriented industrialization Copyright © 2009 Pearson Addison-Wesley.
ON INTELLIGENCE Overview 2.6
1 Informing a Data Revolution Getting the right data, to the right people, at the right time, on the right format Johannes Jütting, PARIS21 Tunis, 8 Decemeber.
Economic Systems. The Three Basic Economic Questions:  What should we produce?  How should we produce?  For whom should we product?
Energy Consciousness Taking a Systems Approach to Energy Dr. Rachel Leslie Resilience Research Portfolio Manager Defence Science and Technology Laboratory.
Chapter The United States + The World. Goals of Foreign Policy.
Pinkerton Common Alerting Protocol Implementation and Value
Conclusions for the New NATO Members from the UK Experience in Defence Research and Development Author: Ventzislav Atanassov, MSc in Ec., MCSc.
INFORMING DEMOCRACY NAPC Meeting May 13, 2005 Washington, D.C. Christopher Hoenig Chairman, Executive Committee.
ON INTELLIGENCE Overview 2.4
INTELLIGENCE SERVICES. The Stratfor Advantage As the world’s leading private intelligence company, Stratfor is able to analyze and deliver timely, accurate.
Peace From Above: Envisioning the Future of UN Aerospace Power.
CHRIS BATT consulting Libraries and Revolution: Seven Challenges for the 21st Century Chris Batt OBE CHRIS BATT consulting
Growth and Poverty Reduction: Latin American Experience with Economy-wide Policies Alberto Valdés Taking Action for the World’s Poor and Hungry People.
Foreign Policy A policy based on decision making, influenced by relations with the rest of the world.
1 Chapter 14 - Intelligence Operations. 2 Why did the Intelligence Fail to Precipitate Appropriate Action? Pearl Harbor The Japanese had already.
Mr. Tom Matthews OUSD(I) The overall classification of this brief is UNCLASSIFIED Discussion with the Intelligence Community Officer Course 10 April 2006.
Funding Information Systems
0 Content Management and the Need for Change in Technical Communication Written by: Scott P. Abel 20 June 2007 Nick Savillo ENG 393.
Headquarters U.S. Air Force Fly – Fight – Win APEX Orientation Arthur J. Lichte Assistant Vice Chief of Staff.
Foreign Policy III February 9, Examples of Domestic Policy Issues List the 5 you think are most important  Federal Budget  Constitutional Rights.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Intelligence and Counterintelligence and Terrorism CHAPTER 8.
THE SECURITY SECTOR REVIEW PROCESS. ISSUES Understanding: -Scope: What are the elements of a SS Review? -Need: Why review the Security Sector? -Process:
David Drinkwater Ⓒ Salamander Productions Open Publish Aim high and get real Successful Content Management Solutions David Drinkwater.
The IC Today Chapter 3 ©2013, Taylor & Francis. Introduction The IC is a work in progress It has undergone a major reorganization – Adversaries that possess.
PPBS Planning Programming Budgeting Systems. PPBS The Department of Defense is the only Agency to use this type of budget.budget.
Introduction and Overview.  When two countries oppose each other politically and economically, but do not actually participate in a full military conflict.
Chapter 17: Foreign Policy and National Defense Section 2.
1 RAND October 30, 2003 Border Security Issues After 9/11 November 5, 2003.
INNOVATION IN POLISH TEXTILE AND CLOTHING INDUSTRY Federation of Apparel & Textiles Industry Employers Krakow 2015.
Introduction to Economics What do you think of when you think of economics?
Area Studies Controversy ID01302 Kih, Hee-Seong. Questions Who are Social Scientists? And who are Area Specialists?
The Multi-Faceted Role of Maritime Training in and for NATO and Non-NATO Operations by Professor Kostas A. Lavdas* &  Dr. Marios P. Efthymiopoulos**
Smart Cities & DigiGov - on the Road to Reality
The Political Party Platforms:
Quality of government expenditure
Alberto Valdés Taking Action for the World’s Poor and Hungry People
The Climate conditions from a European perspective is the blue Arctic or High North with increased access and opportunities for social and economic development,
The Climate conditions from a European perspective is the blue Arctic or High North with increased access and opportunities for social and economic development,
Foreign and Defense Policymaking
Robert David Steele NISA 15 Nov 02
Foreign and Defense Policymaking
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Presentation transcript:

® The Failure of 20 th Century Intelligence Hackers on Planet Earth (HOPE) 6 Robert David Steele Updated 20 July 2006

® Elements of Intelligence Collection Human Technical Analysis Current Estimative Covert Action Black Ops Mind Ops Counter- intelligence Defensive Offensive Leadership Mindset Courage

® Brief History of Intelligence Secret War –For centuries, this has been the primary focus on national-level intelligence. It remains valid. Strategic Analysis –Sherman Kent introduced this as the focal point, but he was not successful. It remains valid. Smart Nation –This is where I think we need to go. More later.

® Global Collection Failure I Ignored Open Source Information 80% of what we need to do intelligence is not secret, not digital, not in your language, and not owned by the government. We failed to treat open sources with respect. We need OSINT!

® Global Collection Failure II Very Limited Non-Official Cover 80% of the bad boys and girls that we need to recruit/monitor for clandestine operations do not attend Embassy cocktail parties. We have been lazy and cheap about non- official cover (in USA).

® Global Collection Failure III Almost no Technical Processing If we do not process what we have collected (generally at great expense), we might as well not collect it at all--we can save the money. C N + P N = Intel NN Processing Matters!

® Global Processing Failure I No Data Standards Data standards (for instance, XML) are vital if we are to be able to exploit modern information technology. Microsoft is the enemy of the state! Open source software, and data standards, add value to your work.

® Global Processing Failure II No Geospatial Attributes Automated “all-source fusion” is not possible unless every datum, in every medium, has both a time and a geospatial attribute. XML Geo needs to be an international standard--you can lead.

® Global Processing Failure III No Interoperability or All-Source Mixing Security is the opposite of intelligence. Compartmentation is the enemy of knowledge. There must be one single processing agency where everything can be mixed and evaluated.

® Global Analysis Failure I Emphasis on Security Instead of Answers Intelligence is about decision-support--about answering the question! Must not confuse expertise, foreign languages, and security clearances nor should we require that the same person have them all! Mix and match...

® Global Analysis Failure II Focused on Threats Instead of Opportunities Threats that are here and now represent a strategic warning failure. Intelligence is at its best when it makes the case for preventive investments-- anticipatory policy-- opportunities for advantage.

® Global Analysis Failure III Emphasis on Local Now Vice Global Future Greatest intelligence value comes from strategic estimative analysis about big issues--global issues Politicians already know the local nuances--must teach them--and the public-- the global tradeoffs

® Global Policy Failure I Failure to Impact on Budget National intelligence has virtually no impact on how the citizen’s taxes are allocated across various national priorities. We spend too much on hard power and almost nothing on soft power.

® Global Policy Failure II Failure to Impact on Policymaker Wisdom Policymakers are loosely-educated and often dismiss the value of global knowledge. Intelligence is most valuable to the public interest when it constantly educates policymakers in a compelling manner.

® Global Policy Failure III Failure to Win Public Support for Intelligence Intelligence is not taught in schools and there is no public appreciation for its vital contributions. We must establish a public discipline of intelligence across the seven tribes and in the public eye.

® Global Acquisitions Failure I Failure to Impact on What We Buy US military buys what contractors want to sell, not what we need. Strategic generalizations about the real world have no impact on procurement. US ignores allied interoperability and affordability needs. Examples Aviation temperatures Cross-country mobility Line of sight distances Bridge loading limits Ports (-), Airheads (+) C4I anti-Internet/open OOTW assets (MP etc.)

® Global Acquisitions Failure II Failure to Impact on Private Sector IT Failed to legislate stable transparent Application Program Interfaces (API). Failed to define generic functionalities for joint development. Failed to define an agile security architecture. MicrosoftSystran

® Global Acquisitions Failure III Failure to Provide for Intelligence US mobility, weapons, and C4I systems do not program funds for the acquisition and delivery of necessary data. Intelligence is treated as a “free” good. Commanders “assume” intelligence will be provided when needed.

® Global Operations Failure I Cannot Do Wide Area Surveillance US satellites optimized for finding Soviet missile silos Air-breather options never had the processing system created to do near real time change detection. Still a labor intensive “hit or miss” activity.

® Global Operations Failure II Cannot Do Last Mile Can’t see under jungle canopy or into city streets Can’t find single individuals with technology--still a clandestine human endeavor and generally can’t do it

® Global Operations Failure III Cannot Do Real-Time Change Detection Air Operations Plans now require 24+ hours to prepare (US/NATO) Sensor to shooter processing is terrible-- and mostly manual Have lost ability to do quick reaction strikes-- when the lawyers let us.

® Philosophical Failure I National Tribe instead of Global Tribes National intelligence tribe has monopolized the money/attention. Failed to create generic intelligence discipline with seven tribes. Failed to develop regional or global intelligence networks.

® Philosophical Failure II Government Secrecy Over Public Sharing The new paradigm rewards sharing more than secrecy. Secrets are primarily valuable in the context of a rich open source knowledge foundation. Cannot have smart spies within dumb nation.

® Philosophical Failure III Letting Americans Lead is Wasteful American dominance of NATO intelligence is wasteful & dangerous. We need a European alternative emphasizing commercial security, web-based sharing, multi-cultural approaches, global burden-sharing.

® Conclusion I...spies only know secrets Intelligence is about discovering, discriminating, distilling, and delivering ANSWERS. The problem with spies is they only know secrets. So, we still need secrets, but we need to be smarter about the context for our secrets.

® Conclusion II Spies & schoolboys We do not get extra points for collecting information in the hardest or most expensive way. Do not send a spy where a schoolboy can go. Find, Get, Buy, Steal--in that order.

® Conclusion III Make sense or add value If you cannot make sense of the raw data, or add value, you are not creating intelligence. It’s about actionable answers, not about secrets, or spies, or toys. Intelligence saves time, lives, money, and honor.

® HUMINTSIGINTIMINTMASINT ALL-SOURCE ANALYSIS OPEN SOURCE INFORMATION OPEN SOURCE INTELLIGENCE 5% of cost80% of value 95% of cost20% of value Secret Intelligence Misses 80% of the Relevant Information!

® Policy/ Threats Poverty Disease Ecology State War Civil War Genocide Oth. Atroc. Proliferation Terrorism Trans. Crime Debt Economy Education Energy Diplomacy Family Immigration Justice Revenue Security Soc. Sec. Water Big Dogs Brazil China India Indonesia Iran Russia Venezuela Wild Cards