Information Sharing & Analytics Orientation 7 March 2008 International Intelligence Fellows Program www.oss.net www.earth-intelligence.net Words for Each Slide in Notes Before We Begin…. The U.S. Intelligence Community Before & After 9/11 Collection Failure Breakdown in Coverage and Language Access Digital Analog English Language NRO NSA Foreign Languages* Oral/Unpublished FBIS UN/STATE CIA/DO Cascading Deficiencies: 1) Don’t even try to access most information 2) Can’t process hard-copy into digital 3) Can’t translate most of what we collect *29 predominant languages, over 3,000 distinct languages in all. Processing Failure Breakdown in Exploitation, Dissemination 50% Less Costly Does Not Exist More Satisfying OSINT 0% HUMINT STATE SIGINT IMINT MASINT 50% What the Czar Does… I am NOT making this up…. Analytic Matrix for Understanding, Dialog & Action Over Time Affordable, Implementable 50-Year Strategy for Using Public Intelligence to Save Humanity & Earth Credible, Complete Plan for Integrating Public Information to Create Public Understanding and MorallySound Sustainable Policies & Harmonized Budgets at Every Level of Action Without Centralizing Anything at All URL: http://www.earth-intelligence.net, Click on about EIN for 10-page brochure. Earth Intelligence Network: High-Level Threat Summary + Two Breach of Trust Demands Electoral Reform Insist on legislation passing by 4 July‘08 Poverty Infectious Disease Environmental Degradation Inter-State Conflict • Without borders • Kills rich & leaders • Prevention critical • Low cost medicine • Changes that took 10,000 yrs now take 3 • Toxicity of everything • Poisoned earth/water • Security Council members sell the guns • Ban on arms exports • Regional peace nets Civil War Genocide Other Atrocities Proliferation • Corruption • Dictators (42 of 44 supported by USA) • Over basics of life • Resource scarcity • Lifetime of learned hatreds • Israel must adapt • Child slavery • Child prostitution • By name kidnapping • Murder for body parts • Cluster bombs, land mines, & small arms • Peaceful energy trumps nuclear bombs Terrorism Transnational Crime Corruption Fraud • One man’s bribe is a community’s loss of all • Open Money and Open Books can fix • Must improve salaries across the board • Apply Tobin Tax of .0006 to all Federal Reserve transactions • IRS gets same books as stockholders • “True Costs” up front • Pandemic • 5 billion globally • Increasing in USA • Foundation for all other threats • Cannot win “war” against a “tactic” • Law enforcement can resolve this • Too much on military, not enough on aid • $2 trillion a year • Vatican, Wall Street, USG, Mafia all are intertwined • Drug cash is liquidity Earth Intelligence Network: Transpartisan Policy Summary Debt. $9 Trillion is “a lot,” Debt scales & incapacitates. USA Insolvent. MUST HAVE a Balanced Budget 25 years out. Agriculture Diplomacy Economy Education • Local & Organic • Deep Root Farming • Family/Community Owned Farming • Dogma kills • Restore USIA • Need global information sharing • End CEO Greed • $10/hr minimum wage • Full employment • LOCAL supply chain • Self-paced Online • Apprenticeships • Team Learning • Learn to learn Energy Family Health Immigration • Wind & Solar NOW • Portable Hydrogen • Two-way Grid • Green capitalism • One job per couple • End overtime • Community Centers • Build neighborhoods • Lifestyle • Environment • Natural Cures • Generic at 1% of cost • Enforce Labor Law • GLOBAL standards •Border Patrol +25,000 • National Service 2 yrs Justice Security Society Water • Pardon all marijuana offenders • Wind down the prison-slave complex • Eliminate corporate “personality” amnesty • Wage peace not war •Reduce the militaryindustrial complex • Belief systems and morality are core. • Connect 5B poor • Universal service • Universal health care • Preventive medicine • English required for citizenship & extended residence • Reflect True Cost • Global Manhattan Project to restore aquifers, push salt back • Regional Water Authorities (Global) Earth Intelligence Network: Transpartisan Challengers Summary Eight Challengers, Four Methods Our only hope is to create an EarthGame™ the Challengers Can Use Brazil China India Indonesia • Demographic power • Energy independent • Macau connection to China • Energy Crisis • Water Crisis • Doing well on poverty • Exporting wombs • Water crisis • Most complex mix • IT rich, farm poor • Merits investments • Proving resilient • Rich in resources • Key to anti-piracy • Could lead region Iran Russia Venezuela Wild Cards • We overturned their democracy • Persians are not ragheads • Get over it & deal • Putin on a roll • Buffer on China only if we keep it European • Enormous potential • Embrace & assist • Populism is not socialism • Energy independent • Charismatic leaders can be ignorant • Congo •Malaysia • Pakistan • South Africa • Turkey Budget Design EarthGame™ “True Costs” • Balanced budget mandatory • Medicare okay if go with generic drugs • Too much on spies & military, shift $250B/yr • Sustainable • Cradle to Cradle • Lease don’t buy • Minimize shipping • End absentee owners • Public Health • Reality plus budgets plus active citizens online levels the field • For one third of war costs, can eliminate all ten high-level threats • Every product and service can be listed in online database • End-user can get true costs at point of sale via cell phone Affordable NOW First, get US to pay for Multinational Decision Support Centre and ASG/DS Second, creat $1 trillion a year Range of Gifts Table posted online Third, host an annual Harmonized Giving Conference for Foundations, Governments, and Corporations, with an individual donor table online. DSS Mission Statement • The Department of Safety and Security is responsible for providing leadership, operational support and oversight of the security management system to enable the safest and most efficient conduct of the programmes and activities of the United Nations System. • Observation: Information is the modern means for achieving security, both for protection of UN personnel, facilities, organizations, and missions, and for the host member states and indigenous or migrant populations. DSS Deficiencies of Concern • • • • • Threat Risk Assessments are delayed & incomplete Threat Risk Assessments do not reflect 360° UN System view nor regional/adjacent threat information Threat Risk Assessments do not have a well-founded directory of Indicators, Accelerators, and Triggers relevant to UN System security. UN Missions & individual UN agencies or forces have no integrated decision-support mechanism helpful to one and all. UN System has no global directory of sources with defined biases, sponsors, or agendas. • • • • UN System is not perceived as having an effective but totally moral, legal, ethical information system helpful to both the UN System & Host Government. UN System does not have safe, efficient, or reliable (constant) means of sharing helpful information across all UN System boundaries (agencies, countries, missions, locations) UN System information is not efficiently acquired, exploited, or shared UN System has no means for identifying relevant sources, softwares, and services for multinational information sharing and internal analytics. • UN System is not recognizing information as a major contributor to security. DSS Host Overview • We Must Connect – – – – – DPA DPI DPKO DSS All Other • Participating Groups – – – – – – UNIIIC UNIFIL ESCWA DSS UNTSO UNDOF • Three P’s – Posture – Perception – Political Compromise • Fundamentals – – – – – Food & Water Shelter Clothing Education Security • JOC/JMAC useful model • Member Nations creating Open Source Intelligence units (e.g. Scotland Yard) that have been very effective in achieving improved security. Sharing Legal Ethical Information Can Enhance Security & Performance for All Nine Pillars of Vulnerability Mitigation in UN System Security • POLITICAL COMPROMISE • OPERATIONAL PROCEDURES • MEDIA MANAGEMENT • PHYSICAL SECURITY • MANDATE & MISSION • TECHNICAL SECURITY • POSTURE & PERCEPTION • HUMAN INTELLIGENCE (Defensive Passive CounterSurveillance, Surveillance Detection, NOT Offensive Penetration) • INFORMATION MANAGEMENT Information—Open, Legal, Ethical Information—is the Essential Means for Mitigating All Nine UN System Vulnerabilities While Also Contributing to UN System Efficiency in Every Organization, at Every Level, for Every Function and Mission. Conceptual Opportunity • IOSAS – – – – – Integrated Open Source Analytical Support • UNODIN – – – – – – United Nations Open-Source Decision-Support Information Network Mission Joint Operations Centers and Force Joint Military Analysis Centers exist now, at an elementary level as conceptualized by MajGen Cammaert. Our endeavors will over time dramatically improve both JOC & JMAC concepts, doctrine, manning, equipping, training, outsourcing, sourcing, & analytics. Our objective over the next 20 years is to establish a global grid that makes the UN System the world’s best Early Warning, Multinational Information Sharing, and Decision Support capability in support of peace and prosperity. Information should be the nerves, blood, and brain of the UN System. Goal of the Training Initiative 1 2 Open Source Information • The goal of this training initiative is to find ways to efficiently and effectively navigate the broad spectrum of open source material available, and to integrate pertinent elements of the 80% into the 20% available from currently recognized national and UN sources into an Integrated Open Source Analytic Support (IOSAS) mechanism. 1. Host Country National/Military Security, Diplomatic Missions 2. UNDSS, DPA, DPI, Other UN Agencies, Other NGO Three-Day Plan Thursday • Introductions of Participants • Strategic View of Multinational Information Operations • Discussion of Two Online Guides with Links: – www.oss.net/BASIC – www.oss.net/LIBRARY • Discussion of Current Event Information • Participant Identification of Top Issues for Discussion • Sources & Methods (eg NATO) • How to Create a Wiki for Any Mission (eg30 ExpertWiki) NOTE: This gathering has three purposes: 1. To introduce six UN Lebanon groups to one another in person for improved sharing & support. 2. To identify global online and offline resources immediately available, free, to all participants.& their colleagues 3. To begin the process, with this “Class Before One” of defining how best to enhance UN access to and exploitation of multinational information among DSS, DPA, DPI, IM. Friday • Sources – 24/7 Call-In Number – Eight Sharing Tribes – Source Directory – Belief Systems – Financial Sources – Subscription Sources – Password-Protected • Methods – Internet Speed – Online versus Personal – Cultural Factors – Creating Flow – Forecasting – Summaries & Opinions • Indicators, Accelerants, & Triggers (Share & Improve) • Empowering Technologies – Ingestion – Sense-Making – Sharing – SILOBREAKER • Organizational Engineering – The Boss – The Source – The Budget – The Public Saturday • Security Risk Assessment (Training Exercise) - Brief Senior Person from Each of Six UN Elements - Establish missing Essential Elements of Information (EEI) - Discuss the needs of senior officers (e.g. Commissioner, spokesperson for UNIFIL) • Open Dialog • Challenge Questions • Specify follow-up actions for instructor and for participants in next thirty days • Instructor to develop a proposed syllabus for UN DSS open source decision support information network (UNODIN) and with help from participants, a draft UN Handbook on Early Warning, Multinational Information Sharing, and Decision Support. NOTE: all opinions are personal and off the record. Class Before One • A training concept—before the first “official” class, there is always a “Class Before One” that helps develop the need, the solution, and the presentation. • You are the Class Before One. Be very proud of this, each of you is a UN System decision-support pioneer. Imagine the UN System as a Wealth Creation Network Information Management is the center of gravity for UN System. Public Advantage I Here in 2008! We were here in 2006… US public scared back into reading and thinking; 75K amputees, GAO declares USA insolvent, 27 secessionist movements, “home rule” up, and corporate personality down. Critical Junctures 9-11 & Katrina, then multiple policy failures Public Advantage II TOP-DOWN COMMAND & CONTROL OLD SINGLE-CULTURE SINGLE-ORGANIZATION EQUITIES LEADERS DECIDE SECRET SOURCES & METHODS Sustainable Reality-Based Transpartisan Budgets OBSCURE DETAIL TIME IMPACT SHORT TIME IMPACT LONG OBVIOUS DETAIL OPEN SOURCES & METHODS Localized Resilience PEOPLE DECIDE MULTI-CULTURAL & TRANS-NATIONAL EQUITIES NEW BOTTOM-UP INFORMATION-SHARING Public Advantage III Expert Forum Shared Calendar Shared Rolodex Distance Learning Virtual Library Shared 24/7 Plot Virtual Budget Weekly Review Public Advantage IV National Military Law Enforcement Targeting Secrets "Intelligence" Investigation Imagery "Protected" Open Academic Secret Sensitive Private Open Pricing Information Cost Information Order of Battle Mapping Client Information Undercover Signals Business Privacy External Information Metrics NGO-Media Secret Sensitive Private Open Citizen+ Secret Sensitive Private Open Public Advantage V This is the real “End Game” Future Vision for Global Information Sharing & Management Organizations Current Story Lebanon: Fatah al-Islam No. 2 killed Fateh Al-Islam Al Qaeda Gama´a al-Islamiyya Fatah Party Show More Key Phrases Refugee Camp Terrorist Group Martyrdom Allotment Show More Topics Civil Disruption / Riots Democratization Land Forces Documents matching your search Documents | Stories Territorial Disputes All (67) | News (67) | Reports (0) | Blogs (0) | Audio/Video (0) | Fact Sheets (0) Show More Documents Sort by: Date | Relevance Cities While Gaza burns Haaretz 08/21/2007 Tripoli (Libya) Quotes ...near the Palestinian refugee camp of Nahr el-Bared where Fatah Islam militants have been fighting Beirut Lebanese soldiers for more than two months. "Cabinet was informed by Interior Minister Hassan Sabei that Lebanese security forces have killed the Fatah Islam's No 2 in the Abu Samra neighbourhood" in Tripoli, Aridi told reporters Damascus following a Cabinet meeting last night [08/07/2007] DDI News - Lebanon announces killing Fatah Islam deputy ĘżAmman commander The group said it was bringing the 'good news to the Muslims of the martyrdom of a noble brother,' Show More Countries Lebanon Syria United States Israel Show More according to the statement. "We in the Fatah Islam movement and all the true mujahideen, pledge to God to avenge our brother's blood from the infidels and the renegades" The authenticity of the statement, posted on a Web site which commonly carries messages from Al Qaeda and other militant groups, could not be independently... [08/09/2007] FOXNews.com - Fatah Islam's No. 2 Killed by Lebanese Troops • • www.silobreaker.com is the single best tool, free for now Sense-making tools can be applied to both their content and yours. Intelligence = Decision Support • Intelligence is a process that creates decisionsupport. • It is NOT defined by secret sources & methods. • The Brahimi Report, Military Advisors to the Secretary General, and The High Level Threat Panel all validate urgency of creating a UN/NGO global decision support and multinational information sharing network. Orientation, Not Micro-Training • You will learn more on your own, and by sharing with one another, than can be taught here in three days • www.oss.net/BASIC has the primary links • www.oss.net/LIBRARY has 30,000 pages from 750+ speakers, this directory can be sorted and also searched • Consider viewing the lectures and movies first, especially the lectures on Analysis & New Rules, and the movie on Creating the World Brain. Analysis is a Profession • Four D’s – – – – Discovery Discrimination Distillation Delivery • If you do nothing else, read the Analytic Tradecraft booklet by Jack Davis, easily accessed online, free, via www.oss.net/BASIC. • Facts Are Not Enough – – – – – – – – History Cultural Context Adjacent Players Localized Indicators, Accelerators, Triggers Sharing 24/7 Cast a Wide Net Wild Cards Abound Thinking Matters More Than Technology Ten High-Level Threats • Poverty • Infectious Disease • Environmental Degradation • Inter-State Conflict • Civil War • • • • • Genocide Other Atrocities Proliferation Terrorism Transnational Crime Every Mission Confronts These Ten Threats One Way or Another— Avoid Narrow Focus, Always See the Forest, Not Just The Tree in Front of You Open Sources & Ten Threats • Economic and social threats including – poverty, – infectious disease and – environmental degradation 95% 99% 95% 90% • Inter-State conflict • Internal conflict, including – civil war, – genocide and – other large-scale atrocities • Nuclear, radiological, chemical, and biological weapons (proliferation) • Terrorism • Transnational organized crime 75% 90% 80% 95% 95% 75% 80% 80% On balance, open sources are more than adequate to understand and address the ten high-level threats, but the UN System’s Information Management is not. Scotland Yard OSINT 1. Created Open Source Branch in SO-11 in 1995 2. This helped put more terrorists and arms smugglers in jail faster and cheaper (instead of 3000 Euro for a surveillance team, 30 Euro for an address) 3. Unanticipated bonus: increased property and financial assets that could be confiscated from convicted organized crime bosses. Eastern Congo Twelve Action Areas • • • • • • Agriculture Diplomacy Economy Education Energy Family • • • • • • Health Immigration/Migration Justice Security Society Water Every Mission Has Narrow Channels and Deep Bureaucracies. Information Sharing is a Proper Ethical Means for Enhancing Effectiveness. If Any Action Area is Overlooked, Boss Needs to Know This. Analysis Cannot Do It All Prediction/Prevention You 1. 2. 3. 4. Improve Sources Improve Sharing Improve Analysis Improve Decisions by Supported Bosses Retaliation Self protection Everyone Else Environmental Security Model for Analytic Purpose Surprise Casualty Potential Probability Hezbollah, Iran, Regional Surprise Warning, meaning, need, elsewhere Probability: High Damage: Very High Surprise: Strikes Outside of Lebanon, Not by Hezbollah Israel 9-11 in Tel Aviv • • • • • • • 14 Aug 07 News Release Sheikh Hassan Nasrallah promises “surprise” if Israel attacks Lebanon again. Hezbollah has not been disarmed—15,000 rockets remain hidden (other source) Lebanon divided, Israeli soldiers still captive, situation is volatile Direct negotiations could help, truth & reconciliation Israel may not appreciate full extent of Iranian ability to provide supporting attacks, e.g. exploding buildings in Tel Aviv, cutting of US land supply line from Kuwait to Baghdad, Sunburn missile attack against Maritime Force. Israel, not Iran or Syria, is the most likely to take unilateral violent action that will trigger the “surprise.” Why Analysts Are Special I N F O R M A T I O N Available Information Actionable Intelligence The New Intelligence Gap: the difference between what you can know and what you can use! TIME Complex Organizations are Drowning in Information. Analytic Tradecraft, Applied by Analysts, is the Solution. Levels of Analysis: Threat Changes! STRATEGIC Integrated Application Military Sustainability Geographic Location Civil Allies OPERATIONAL Selection of Time and Place Military Availability Geographic Resources TACTICAL Application of Finite Resources Military Reliability Geographic Terrain TECHNICAL Isolated Capabilities Civil Stability Civil Psychology Military Lethality Geographic Atmosphere Civil Infrastructure Over time and space Channels & Borders Of strategic value Quantities & Distribution Internally available for use Volatility of sectors Training & Maintenance Mobility implications Cohesion & Effectiveness Military Systems One by One Climate Manipulation Civil Power, Transport, Communications, Finance This is very important. The threat changes depending on the level of analysis, and the threat is distinct, more on this shortly, in relation to the UN Mission, fixed facilities, mobile units, and individuals with both fixed homes and mobile platforms. Creating an Analysis Cell Central discovery, distributed exploitation Senior All-Source Collection Manager Internet Specialist Commercial Online Expert Primary Research External Contracts All-Source Analyst/ Presentation Manager • Six people can leverage global open sources for an entire Ministry or Service or Command • This reduces duplication while increasing decision support to all bosses • Saves money and creates value that can be shared with host country and others Seven Tribes (Eight) Religions, Clans, Labor Unions, Citizen Observers National NGOs Military Media Academic Law Enforcement Business New Decision-Support Paradigm OLD • NGO’s Don’t “Do” • Policy Over Intelligence • Unilateral • Mostly Secret • Technical Emphasis • Collection Emphasis • One-language filter • Mistakes hidden • Short-term thinking NEW • Brahimi Report ++ • Intelligence Over Policy • Multilateral • Mostly Public • Human Emphasis • Analysis Emphasis • Multi-lingual filters • Mistakes acknowledged • Long-term thinking Open Source Intelligence I Lessons of History China, Islam, Ethnic, Etc. I Lessons of History • Neither the academics nor the government have done well here. • We need to fund both specialists in history, and a massive digitization project for Chinese, Islamic, other key histories. Open Source Intelligence II Multinational Burden Sharing II Global Coverage Cost-Sharing with Others-Shared Early Warning • No one has the time, money, or ability to cover the world. • We must find new means of sharing the burden of collection, translation, digitization of global open sources in 33+ languages. • The Internet is vital. Open Source Intelligence III Leveraging the Private Sector III National Intelligence Harness distributed intelligence of Nation • We must establish open protocols for linking and leveraging the other tribes: military, law enforcement, business, academic, NGO-media, and religious. • A global intelligence federation is needed. This Is Reality: We Go For The Green! Information-Sharing & Decision-Support Targeting Signals Imagery Order of Battle Secrets Mapping "Intelligence" "Protected" Open Undercover Investigation Privacy Metrics Secret Sensitive Private Open Client Information Pricing Information Cost Information External Information Secrets "Intelligence" Secret Sensitive Private Open "Protected" Copyright OSS.Net © 2007 Open Facing Reality • Amilcar Cabral, African freedom fighter (1924-1973): Hide nothing from the masses of our people. Tell no lies. Expose lies whenever they are told. Mask no difficulties, mistakes, failures. Claim no easy victories. ... Our experience has shown us that in the general framework of daily struggle, this battle against ourselves, this struggle against our own weaknesses ... is the most difficult of all. • Henry Stiller, DG of Histen Riller, at French Information Congress, IDT ’93: 95% de l’information don’t une enterprise a besoin peut s’aquiris par des moyens honorables. • Tony Zinni, former CINCCENT: 80% of what I needed to know as CINCENT I got from open sources rather than classified reporting. And within the remaining 20%, if I knew what to look for, I found another 16%. At the end of it all, classified intelligence provided me, at best, with 4% of my command knowledge. • Daniel Elsberg, speaking to Henry Kissinger: The danger is, you’ll become like a moron. You’ll become incapable of learning from most people in the world, no matter how much experience they have in their particular areas that may be much greater than yours” [because of your blind faith in the value of your narrow and often incorrect secret information]. • Ted Shackley, Clandestine & Covert Operations Leader: In short, the collapse of the communist system in Central Europe has created a new situation for intelligence collectors. I estimate, based in part on my commercial discussions since 1990 in East Germany, Poland, Albania, Czechoslovakia, and Hungary, that 80 percent of what is on any intelligence agency’s wish list for this area as of 1991 is now available overtly. Copyright OSS.Net © 2007 Enhancing Performance I Data standards and sharing matter Open Human It’s the back and forth that allows DNA to define life. • From north to south, Imagery east to west, if the Signals information is not entered digitally and according to some agreed upon standard, it will not be shared and will not contribute to UN early warning or decision support. Tip of the hat to the Director of the NIA in South Africa for this important insight. Enhancing Performance II 24/7 Geospatial “Plot” is Vital • There is no substitute for a 24/7 watch center that has a geospatial “plot” and can combine a knowledge of intelligence sources with a real-world depiction of locations, vehicles, targets, and individuals. Enhancing Performance III Fail in Isolation, Thrive in Combination • We are our own worst enemy. • Compartmentation and security are the enemy of timely intelligence. • Sources achieve their greatest effect when combined, not when “Okay, so maybe I was wrong not isolated. to tell you about my source--but you should have told me first…...” The Big Picture Four processing quadrants IV - Organizational Intelligence Out-Sourcing of Information Processing Organizational Memory System EXTERNAL CHUNKS (Intellectual Property) Patents, Etc. Data Visualization III - External Information Environmental Monitoring Technology Monitoring Customer Monitoring Trade Secrets Meta-Data Government Monitoring E-Commerce TECHNICAL Automated Analysis Project/Group Management Heterogeneous Search & Retrieval Data Conversion Vendor Reporting Knowledge Capital™ Rolodexes/E-Mail Expert Hires “Just Enough, Just in Time” Business Intelligence Institutionalized Local Knowledge HUMAN Training Personal Brand Cell # Churning (Rotationals) Internal Reporting PERSONALITY (Insight/Intuition) Trip Reports INTERNAL I - Knowledge Management II - Collaborative Work Processing Quadrant #1 Knowledge Management INTERNAL • Internal Reporting • Vendor Reporting • Project Management • Data Conversion • Automated Analysis • Know what you know • Do not lose data, insights, links • Integrate people, projects, vendors, times, places, objects • Optimize application of technology to internal information Processing Quadrant #2 Collaborative Work INSIGHT • Employee Brand Names • Rolodexes • E-Mail Directories • Cell Telephone Networks • Trip Reports • Rotationals • Training • • • • • • • • Human Capital Inherent in People Who They Know How They Know When They Know What They Do Who They Tell How They Feel Processing Quadrant #3 External Information Acquisition EXTERNAL • Local knowledge • Expert hires “just enough, just in time” • Customer monitoring • Government monitoring • Technology monitoring • Environment monitoring • Legal, ethical, open! • Peter Drucker says this (external) must be the focal point for the next 50 years of innovation • OLD: spend on bodies & technology • NEW: spend on external information services in all languages, from all sources, all the time Processing Quadrant #4 Organizational Intelligence MEMORY • Intellectual Property • Organizational Memory • Meta-Data • History of Information • Electronic/Human Links • Survive Human Turnover • • • • Data standards Data entry mandated Storage & retrieval Historical access without legacy system training • Employee shoeboxes integrated/not lost ProcessingFinished Intelligence and Reporting Desktop: Revision Tracking and Realtime Group Review Analytic Toolkit Desktop Publishing and Word Processing A Collaborative Work B C Interactive Search and Retrieval of Data Clustering and Linking of Related Data Conversion of Paper Documents to Digital Form Eighteen ComputerAssisted Capabilities Production of Graphics, Videos and Online Briefings Notetaking and Organizing Ideas Graphic and MapBased Visualization of Data Statistical Analysis to Reveal Anomalies Automated Foreign Language Translation Structured Argument Analysis Modeling and Simulations Detection of Changing Trends Processing Images, Video, Audio, Signal Data Detection of Alert Situations Automated Extraction of Data Elements From Text and Images Standardizing and Converting Data Formats Processing Desktop No Easy Solutions, Not Integrated Plan **Powerize Extend Other CATALYST Elements? Excaliber Copernic Collect **C-4-U Scout SYSTRAN+? Topic **CI Spider GMS, Athens **E-Sense Google I2 Analyst Notebook Aerotext **Corporate Intelligence Service **Knowledge.Works OSALAT Information Portal, Silobreaker Comprendium **WisdomBuilder Identifier, SIFT, Analyst Workbench CrimeLink OnTopic, Labrador **Plumtree Corporate Portal **TextAnalyst **Strategy! Intelligent Miner Groove? For Text **Wincite **Market Signal Analyzer Share Analyze EDGE? ClearForest Suite DARPA STRONG ANGEL? Report ** Previously reviewed in the Fuld & Co. Software Report Content Extractor MindMap? USSOCOM OSINT TOOLS • These are the specific products used now. They are not integrated. • Collection: Copernic Pro (Internet search and download engine); Teleport Pro • • • (Internet spider); Convera Spider (Spider -- downloads all or selected parts of a website); Inxight StarTree / Crawler (Internet web site relationship mapper) Process: Copernic Summarizer (Summarizes individual files); SummIT! (Specialty summarizer embedded within Retrievalware and Semio); Convera Retrievalware (Data indexing and free text search engine); Inxight ThingFinder (Categorizing entity extractor, allows for determination of relationships between known entities and unknown people, places, things, etc.); Semio Taxonomy (Automatically put data into pre-determined taxonomies for methodological retrieval); Apptek Machine Translation Database (Ibase / Ibridge) ((database for analyst notebook)); Inxight Categorizer (Smart categorizer) Analyze: Convera Retrievalware (Data indexing and free text search engine); Inxight ThingFinder (Categorizing entity extractor, allows for predetermination or relationships between known entities and unknown people, places, things, etc.); Semio Taxonomy (Automatically put data into pre-determined taxonomies for methodological retrieval) Visualize: Webtas (Allows you to put data into a timeline with corresponding map information); Analyst Notebook (De-facto standard product for link product development but manual in nature— Talend Extract, Transform, Load (ETL) is better tool); Spire (Visualization application with "terrain" map view of data; MapInfo (Mapping package); ARCView / ArcIMS (Mapping package); Propeller (data linages (primarily communications focused); Intranet Brain (Web site mapping); EnFish Onespace (Indexing engine for analyst pc's Rule 7 “Two levels down” is the new standard State Targets -Lots of Assets Organizational Targets -Very Few Assets Individual Targets -Virtually No Assets • Nation-states are old targeting standard • New standard is at the province, company, and individual level • This is a double order of magnitude increase in the difficulty of being adequate Rule 13 Cross-fertilization matters more Consumer Collector Analyst Source • Old approach: consumer to analyst to collector to source-the linear paradigm • New approach is the diamond paradigm where collectors and analysts help consumers talk directly to sources Rule 15 Collaborative Work & Informal Deals Rise • Intelligence collectors and analysts will have personal “brands” • Peer to peer networks will form quickly to tackle new problems • Electronic access more important than physical location Rule 18 Collection doctrine more sophisticated • FIND the data if you FIND -- free, internal already know it • GET the data if it can be GET -- free, allies gotten free from an ally or NATO or the church BUY -- low cost • BUY the data from the private sector TASK -- expensive • TASK organic collectors as a last resort Rule 21 Strategic intelligence matters more PAST FUTURE NOW OPTIONS • Estimative intelligence must be restored as one of the primary objectives of analysis • Intelligence must support preventive action (in advance of the threat’s maturing), and budget trade-off decisions Security Risk Assessment • Political: History, Incidents, UNIFIL Vital • Media: Local, Regional, International • Security: Mission, Facilities, Units in Motion, Individuals (Vulnerabilities & Mitigation) • Important Points of Mention – Place for anything not fitting template – Distinguish between facts and opinions • DIME: Diplomatic, Information, Military, Economic (UN needs pro-active media strategy, media play, good & bad, vital) SRA Process and Stages – – – – – – – – – – – – – – – – – Introduction Stage One: Programme Assessment Stage Two: Threat Assessment A. Situational Awareness B. Determination of Threats Stage Three: Vulnerability Assessment A. Vulnerabilities B. Strengths Stage Four: Risk Analysis Stage Five: Select Options A. General Options B. Improved Minimum Operating Standards (MOSS) Stage Six: Make Decisions A. Step One: Determine Priorities and Create a Timeline B. Step Two: Determine Funding and Resource Needs Stage Seven: Implementation Stage Eight: Review and Monitoring A B C 1 2 3 4 1: Mission 2. Facilities 3. Movement 4. Individuals A: Beirut B. North C: South Remember: the Threat CHANGES Depending on the Level of Analysis (e.g. Local versus Provincial versus National) Amazon Could Be World Brain All Information, All Languages, All the Time One-Stop Shop Displaces Intermediaries & Triples Profit Expert Forum Shared Calendar Distance Learning Shared Rolodex OPG VPN Shared 24/7 Plot Virtual Library Virtual Budget Weekly Review Major Capabilities in India, Singapore, South Africa, Panama, Roving Collection Teams 360° 24/7 All Languages…. UN Could Monetize Its Information Become the Earth Intelligence Network Tailored Decision-Support on Each Topic Collect & Produce Real-Time Raw Information Use Information to Stabilize & Enrich Brazil China European Union Indonesia India Indonesia Russia Real-world Real-time Dollars & Sense USA Venezuela Wild Card(s) Outputs: Sustainable Solutions for Ten High-Level Threats Inputs: Twelve Policies Actualized in All Budgets at All Levels Integrated Open-Source Analytic Support (IOSAS) within Missions & Centers Evolved into the Universal Open-Source Decision-Support Information Network (UNODIN) Academic Expert Published Authors Amazon Expert Published Authors STRATEGIC VIEW Multinational Information Sharing Activity IO/NGO & Indigenous Practitioners Coalition Civil Affairs Units OPERATIONAL VIEW Copyright OSS.Net © 2007 IDEN: Military as hub does not resonate—why not civilians? Robert: Military is “core” force, only integrated force able to move, do, and communicate. Military Hubs Key to low-cost free offline digitization and localized acquisition. Host Govt Host Academia CCC M4IS (Two-Way Reach-Back) BIG PIPE Host LEA Coalition Military Hub at Home Spoke at CCC Free Online Access & Call Centers Host Business Directly responsive to USG Inter-Agency Directly responsive to UN/NGOs in S&R Decision-Support, Predictive Analysis, on Irregular Threats Copyright OSS.Net © 2007 Host NGO Host Media Host Civil • Advocacy Groups • Labor Unions • Religions & Tribes Regional Information Center Chief of Center Singapore Deputy for Collection Australia OSINT HUMINT IMINT SIGINT Deputy for Processing Malaysia Digitization Translation Visualization Analytic Support Deputy for Counterintelligence Japan Copyright OSS.Net © 2007 Deputy for Analysis China Warning Estimative Countries Issues Deputy for Covert Action Thailand Political Compromise • • • • • • • Implications for safety and security Forget about “national” analysis Focus on regions, tribes, clans, families. Grasp history as a foundation. Visualize competing equities. Value transparency and integrity. The UN System must always be perceived as moral and free of bias. Media Management • Media is not just the broadcast “main” media but also the Internet, sermons, and other forms of narrowcast. • Monitoring the media is an essential aspect of situational awareness. • “Spin” is misunderstood as manipulation. The UN System must focus on getting its message into all forms of media, this is a vital aspect of “intangible” security. Mandate & Mission • The UN mandates and mission are inherently flawed for lack of adequate decision support, inclusive of a grasp of history and a nuanced understanding of all regional actors. • Security comes from accuracy of understanding, before and during the mission. Posture & Perception • Posture defines perception. A lack of clear communication to every actor of relevance to the UN System is a death wish. • Posture is a message. • Perception is the mission. • Every action the UN System takes to communicate its goodness, its good works, is one less bullet, one less bomb. Information Management • The UN System is operating at less than 20% of capacity for two simple reasons: – Lack of 100MB Internet access for every UN employee at work and at rest. – Lack of access to the 80% of the open source information needed to be effective at the strategic, operational (regional), tactical, and technical levels. • Information is security. Information is efficiency. Information will define the UN System of the future. Operational Procedures • The threat to the UN System is as follows: • • • • • • • • Internal bureaucracy and big egos/small minds Lack of full access to all relevant information Recalcitrant Member Nations Organized opposition groups Internal espionage from Member Nations Lack of employee training and situational awareness Lack of focus by managers at all levels Lack of funding or influence over external funds • Information management can resolve all of these deficiencies. Physical Security • Physical security of fixed installation is the most tangible mission of DSS, and also the least important. • Virtual security is much more important and demands total situational awareness and total efficiency. • Morality, and the perception of the UN System as unbiased and totally for the good of the community being served, is the ultimate security. Technical Security • Defensive surveillance detection, and especially alert human intelligence able to observe and detect hostile surveillance of UN System sites and individuals, is the single most essential function of DSS. • Technical surveillance detection requires both constant audio-visual coverage, and constant human and technical review of the captured images and sounds. Human Intelligence • DSS is best served by having the most intelligent, dedicated, and intuitive humans on the planet. • There is no higher moral duty than to serve the UN System by protecting its missions, facilities, movements, and individuals. • Security is not about guns. • Security is about minds in constant action. Information Peacekeeping #1 Changing What Nations Spend Money On, While Focusing $1T in Charitable Funding for Ten Threats & Twelve Action Areas th er s Health O Culture R us sia Education pe Assistance Eu ro Intelligence U SA Diplomacy 0 500 Military • Public intelligence can change public spending priorities • Less on military, more on everything else • Global intelligence can create global security forces and funds for sustaining Earth and Peace Information Peacekeeping #2 Changing When & How We Intervene • Public warning can change public policy – – – – – – More Prevention More Peacekeeping More Education More Long-Term Aid Less Corruption Less Censorship We have a sacred duty. “Inconvenient Warning” & “Warning Fatigue” Are Obstacles. Information Peacekeeping #3 Changing Who Does the Thinking & the Deciding on Public Budgets ® Conflict Facts for 2002 23 LIC+, 79 LIC-, 175 VPC Source: PIOOM (NL), data with permission © 2002 A. Jongman • Public, not elites, must be the final judge of global security values • Public intelligence will enable public understanding/action • Berto Jongman’s map is Reference A--we must all support him. Information Peacekeeping #4 Changing How the World Views Intelligence Expert Forum Shared Calendar Shared Rolodex Distance Learning Virtual Library Shared 24/7 Plot Virtual Budget Weekly Review Information Peacekeeping #5 Changing the Strategic Focus • Connectivity everywhere • Content is digitized • Coordination of standards and investments • C4 Security across all eight tribes--public safety at same level as safety of secrets Information Peacekeeping #6: Creating Infinite Wealth for the Five Billion at the Bottom of the Pyramid • Representative Books: – End of Poverty – Fortune at the Bottom of the Pyramid (Prahalad) – Revolutionary Wealth – Infinite Wealth – Wealth of Knowledge – Wealth of Networks – How to Change the World • Major Lecture: – “Open Everything” at http://www.oss.net/GNOME • Today’s economy: – Seven Trillion/Year – Focused on 1B “Rich” – Two Trillion Illicit • Tomorrow’s economy: – Ten Trillion/Year – Focused on 5B Poor – Transparent Budgets Eliminate Corruption – “Green” Capitalism • “True Cost” Known • Cradle to Cradle • Re-Use Not Re-Cycle Recommendations for Tribunal • 100MB Internet access for every employee, at work and at home, is vital to both security & efficiency. • Budget for outsourcing commercial decisionsupport, e.g. threat evaluation of The Hague (three groups: entrenched anti-Tribunal families; potential host families for incoming terrorists; and discreetly approached friendly families who can provide Early Warning. • Establish a 24/7 Watch Center with a widelypublicized email address and telephone number with Arabic speaker always on duty even if from home. Recommendation for UN • The Coalition Coordination Center is immediately available as the world’s first multinational information sharing and analytic support center. • All you have to do is get each of your Missions to the UN to raise the need for such a center which will not use secret sources or methods. United Nations Early Warning, Multinational Information Sharing, Decision Support • Brahimi Report applies • Secretary General needs global decision support network instead of 77 libraries & isolated data bases • Information can prevent conflict, create stabilizing wealth and possibly fund all future UN operations through monetization of information.