SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Anthony Fiorot - WW Web Experience & Social Business Solutions Executive
10 October 2012




Social Networks: The Next Emerging Spectrum in Asymmetric
Warfare & Counter Insurgency Operations (COIN)




                                                                           © 2009 IBM Corporation
Social Networks: The Next Emerging Spectrum in Asymmetric Warfare
& Counter Insurgency Operations (COIN)




 Social Networks are the next emerging spectrum in Asymmetric Warfare Operations. We
 will explore how professional social network technologies are transforming the Command
 Post of the Future. We will discuss next generation collaboration and communications
 capabilities. How our enemies and terrorists are using social technologies to communicate
 and collaborate in Asymmetric environments. We will discuss social analytic techniques and
 emerging tradecraft. We will discuss emerging best social practices in support of
 Operations Other then War (OOTW), specifically Counter Insurgency Operations (COIN),
 Humanitarian and Disaster Response Operations.




                                                                                © 2009 IBM Corporation
A Social Transformation is taking place in how people
     communicate and how relationships form and develop




                                                             Social
                                           Internet

                               PCs


                Departmental                     The Fifth IT Era:
                                                   The era of


    Mainframe
3                                                                © 2009 IBM Corporation
The Social Transformation has brought upon us Social Business


       Social Business embraces networks of people with social collaboration
         technologies and tools to create business value and opportunities




           A Social Business...
                      Connects people across all types of boundaries
                      Allows networks of people to form and dissipate as needed
                      Delivers the right content and expertise to the right people
                      Improves and accelerates how works get done

 4                                                                                   © 2009 IBM Corporation
Government leaders plan dramatic improvements in organizational
openness through greater external and internal collaboration

      To what extent will you sustain or make changes to the following aspects of your organization over the next 3 to 5 years?




                                                                              Government                Global

                    Partnering/collaborating with other organizations                          59%                  53%
                                                                                                59%                  53%

                                                  Internal collaboration                   47%                      52%
                                                                                            47%                      52%

                              Management and/or organization structure                  41%                    40%
                                                                                         41%                    40%

                                                     Governance models                  40%                  31%
                                                                                         40%                  31%

                           C-suite composition, skills and responsibilities             39%                      41%
                                                                                         39%                      41%

                                              Decision-making processes               37%                        43%
                                                                                       37%                        43%

                                          Supervisory board composition          23%                  15%
                                                                                  23%                  15%

                                              Values of your organization      18%                    18%
                                                                                18%                    18%




Source: The IBM CEO 2012 Study.   The response sample = 176 Government organizations out of 1700 CEOs
  5                                                                                                                        © 2009 IBM Corporation
“What’s Your Social Business Strategy for Your Defense Agency ?”

Would you be interested in learning how other defense and
government agencies are using “Professional Social Network
Solutions” to:

•Become more proactive and not reactive
•Be a more efficient government workforce
•Improve inter-agency services
•Improve your analysts web experience
•Share & Retain Knowledge – Retiring Workforce
•Attract New Hires - Social
•Be more mobile & agile
•Modernize & Transform
•Be innovative?
•Save money & reduce budgets




                                                             © 2009 IBM Corporation
Social Intelligence Environment (SIE) Defined




                                                © 2009 IBM Corporation
The INTELLIGENCE Cycle

      Monitoring & Analyzing the Social Intelligence
    Environment (SIE) - provides critical intelligence for
       law enforcement investigations & operations




8                                                     © 2009 IBM Corporation
Social Threat Assessment and Intelligence Process


 Monitor -


             Analyze -



                        Disseminate -


                                                    © 2009 IBM Corporation
Monitoring the Social Intelligence Environment (SIE)




  Website - www.tactrend.com
  Whitepaper - http://www.hmstech.com/tactrend/Tactical-Trending-White-Paper.pdf

                                                                       © 2009 IBM Corporation
Monitoring the SIE – LE Intelligence




                                       © 2009 IBM Corporation
Monitoring - Two Recent Defense Use Cases

                           Case Study – “Para Jumper (PJ)” In October 2011, a women
                           tweeted “Please say a prayer for my BFF’s husband who is a PJ
                           in the Air Force, he got shot three times in Afghanistan last
                           night.” The command found out that a member in it’s
                           command was wounded in action on Twitter before the
                           official military messaging notification system.




                            Case Study – “IED In Afghanistan” US and allied personnel
                            send out Twitter messages on observed Improved Explosive
                            Device (IED) explosions or detections to share immediate
                            intelligence with other members across their command.
                            Most fastest and quickest way to warn each other of IEDs in
                            the AOR.




                                                                            © 2009 IBM Corporation
Monitoring – Bin Laden Raid - Pakistan




One Tweet Could Have Compromised the Mission !
                                                 © 2009 IBM Corporation
Monitoring - Two Recent Counter Terrorism Use Cases

                                 Case Study – “I Have A Bomb On This Plane” (Miami
                                 Airport) In January 2012, an airline passenger tweeted
                                 she had a bomb on a Jet Blue commercial aircraft at
                                 the Miami International Airport. Within 3 minutes of
                                 detecting the Tweeted threat, a suspect was identified.
                                 TSA and FBI were immediately notified and the
                                 passenger was detained before the plane departed the
                                 gate. No bomb was found… but the suspect did get her
                                 hashtag wish: #tostayinmiamialittlewhilelonger.




                                  Case Study – 2012 SUPERBOWL Threat – Just days
                                  before the 2012 Superbowl, "RulingElite" Tweeted he
                                  would carry out a biological attack designed to kill
                                  thousands of fans in the stadium. Out of one billion
                                  Tweets, our technology and tradecraft detected and
                                  reported this threat to authorities in real-time.




                                                                       © 2009 IBM Corporation
Actual Photos found on one person’s open and public Twitter Account




                                                                © 2009 IBM Corporation
But Wait   There’s More !!!




                              © 2009 IBM Corporation
Best Practices & Things to Consider When It Comes to Social
     Monitoring for Law Enforcement Intelligence & Operations

      1.   Partner with LE Social Intelligence Partners not marketing &
           social media analytics companies
      2.   LE Intel Methodology that complies to privacy laws
      3.   Cloud / Anonymous / No Bread Crumbs
      4.   Evidence / Forensics / Prosecution
      5.   Fuse Geo Spatial / IMINT / Social Monitoring / Reporting
      6.   Create a virtual Intel COP mashing all your data
      7.   Collaborate / Share Intel Using Your Social Tools (Instant
           Messaging / Professional Social Networks)
      8.   Real time language translation




17                                                                 © 2009 IBM Corporation
Combining Social Monitoring with Social Analytics -
Predicting Events & Activities Before They Happen




       Ingesting unrelated big data and finding the relationships !


                                                                  © 2009 IBM Corporation
Analyzing Use Case - Syria Case Study

     Benefit:
     – Within a Major Command, on
       average it takes 75 Analysts to only
       view 9% of the Social Intelligence     Our Social Monitoring
       Environment (SIE)                      & Analytics Platform
     – SIE Analytics: We believe we can       predicted 12 out of 15
                                              events in Syria before
       accomplish 100% with just 25             they occurred last
       analysts                                       month




19                                                       © 2009 IBM Corporation
UNCLASSIFIED




Most Influential vs Most Followed
                                                      MASS INFLUENCER
          Wael Ghonim                            @Weddady – Mass Influencer
    Twitter Followers: 86,000+                     Twitter Followers: 6,900+
   Reactions Generated: 3,291                     Reactions Generated: 1,281
  Reactions per 1K followers: 38                Reactions per 1K followers: 186




                                            Justin Bieber
                                    Twitter Followers: 7.4 Million
                                      Reactions Generated: 294
                                   Reactions per 1K followers: 0.04
        UNCLASSIFIED                                                  © 2009 IBM Corporation
UNCLASSIFIED




Case Study - Trevon Martin / Miami High School / Walk Out




       UNCLASSIFIED                                         © 2009 IBM Corporation
Analyzing Use Case –
2011 Asia Pacific Economic Cooperation (APEC)




   Protecting the President & Asia Pacific Prime Ministers at the Asia Pacific Economic Committee (APEC)
                                           Hawaii, November 2011


                                                                                             © 2009 IBM Corporation
Combining Social Monitoring and Analytics with Real-Time
Dissemination / Collaboration
Professional Social Network Technologies for Defense, Intelligence &
Counter Terrorism)




       Share New Insights and Knowledge Using “Professional Social Network Technologies”


                                                                                   © 2009 IBM Corporation
Defense Case Study – United States Special Operations Command (USSOCOM)
International SOF Information Sharing System (ISISS)



                                       ISISS - Enables International Special
                                        Operations Forces (ISOF) from over
                                            120+ countries the ability to
                                       communicate and collaborate through
                                             professional social network
                                        technologies to share knowledge and
                                                create new insights.




                                                                 © 2009 IBM Corporation
© 2009 IBM Corporation
Dissemination / Collaboration –
United States Special Operations Command (USSOCOM)
ISISS Program




                                                 © 2009 IBM Corporation
Defense Case Study – United States Special Operations Command (USSOCOM)
International SOF Information Sharing System (ISISS)
 ISISS – Screenshot of the
  SOF Asia Pacific Region –
Includes SAF SOF members.



      ISISS Features –

           Profiles
         Communities
     Language Translation
            Files
       Training Videos
          Activities
            Blogs
            Wikis
      Instant Messaging
            eMail




                                                                © 2009 IBM Corporation
Extending the Social Experience to the Tactical (Mobile) Edge




28                                                     © 2009 IBM Corporation
Social Business Framework can address the challenges faced by agencies
  through 3 business outcomes
                Citizen Interaction                                                                                 How People Work


                 Deepen relationships                         Generate new ideas                    Enable a more effective
 Business
 outcomes           with citizens                                   faster                            Federal workforce
                             (external)                           (external + internal)                           (internal)
 Target         Citizen Customer Service Departments                                                  Government and Operation Leaders,
 audiences                and Organizations               Local Government and Innovation Leaders
                                                                                                             Human Resources

  Business
 challenges          Citizen Expectations                          Seeding innovation                       Breaking down silos


IBM CEO 2012         Engaging citizens as                      Amplifying innovation with                  Empowering employees
     Study                                                           partnerships                             through values
                        individuals
  alignment

                                             Professional Social Collaboration Capabilities
                  Communities and Forums               Expertise and Content Tagging                Knowledge Management
 Enabling                                                                                           Dynamic personal profiles and status
                  Social Portals                       Social Analytics
 capabilities
                  Mobile Applications                  Crowd-sourcing & Collective Intelligence     updates
                  Blogs and Wikis                      Cross Agency and Cross Department            Content management based on the
                  Open Data                            Collaboration                                person, not the document
 “Open”
 principles         Transparency                   Accessibility                   Participation              Collaboration



  29                                                                                                                    © 2009 IBM Corporation
Examples of how federal governments are using professional
social networks to drive each business outcome
     Deepen relationships                  Generate new                        Enable a more
         with citizen                       ideas faster
                                          (External + Internal)             effective workforce
               (External)                                                             (Internal)


       Promote citizen community         Formulate Crowd sourcing for       Promote a collaborative virtual
       blogs and social forums           new services                       environment
                                         Use of Jams, blogs and wikis to    Develop knowledge sharing and
       Conduct citizen care analytics
                                         address challenges and solve       promote asset re-use
       Connect right experts to answer                                      Develop talent sourcing
                                         problems
       citizen questions
                                         Promote virtual gaming for         Infuse community building
       Improve community driven
                                         innovation and education           Promote blogs, wikis
       citizen support and engagement
                                         Improve ways of designing and      Create social internal platforms for
       Inform and educate citizens       producing services                 rewards and recognition
       continuously                      Integrate citizen feedback and     Promote Borderless Public
       Bring in Transparency and         insight with program and service   Service Organization
       accountability for an improved    development                        Generate real-time information
       perception of Government          Create social platforms for        accessibility
       Open data and share service       citizen award/recognition          Develop skills by virtual
       information                       Innovate to exceed citizen         training/gaming within
                                         expectations                       departments
                                         Open data and share service        Open data and share service
                                         information                        information




30                                                                                                  © 2009 IBM Corporation

Weitere ähnliche Inhalte

Was ist angesagt?

Create A Net Centered Company eMarketing Techniques 2009
Create A Net Centered Company eMarketing Techniques 2009Create A Net Centered Company eMarketing Techniques 2009
Create A Net Centered Company eMarketing Techniques 2009Corporate College
 
TripleTree Collaboration
TripleTree  CollaborationTripleTree  Collaboration
TripleTree CollaborationChris Hoffmann
 
Managed services the road to operational efficiency
Managed services the road to operational efficiencyManaged services the road to operational efficiency
Managed services the road to operational efficiencycaidadao
 
Liberty university cjus 250
Liberty university cjus 250Liberty university cjus 250
Liberty university cjus 250Christina Walkar
 

Was ist angesagt? (6)

Create A Net Centered Company eMarketing Techniques 2009
Create A Net Centered Company eMarketing Techniques 2009Create A Net Centered Company eMarketing Techniques 2009
Create A Net Centered Company eMarketing Techniques 2009
 
TripleTree Collaboration
TripleTree  CollaborationTripleTree  Collaboration
TripleTree Collaboration
 
Gina poole 2013
Gina poole 2013Gina poole 2013
Gina poole 2013
 
CFO Cloud Savings
CFO Cloud SavingsCFO Cloud Savings
CFO Cloud Savings
 
Managed services the road to operational efficiency
Managed services the road to operational efficiencyManaged services the road to operational efficiency
Managed services the road to operational efficiency
 
Liberty university cjus 250
Liberty university cjus 250Liberty university cjus 250
Liberty university cjus 250
 

Andere mochten auch

Effects Based Operations A Guide For Practitioners
Effects Based Operations A Guide For PractitionersEffects Based Operations A Guide For Practitioners
Effects Based Operations A Guide For PractitionersDouglas Webster
 
Effect based operation
Effect based operationEffect based operation
Effect based operationWahid haque
 
Fabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealedFabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealedFabio Ghioni
 
Social media for the Military
Social media for the MilitarySocial media for the Military
Social media for the MilitaryUlrich Janßen
 
Defining asymmetric warfare
Defining asymmetric warfareDefining asymmetric warfare
Defining asymmetric warfareLex Pit
 
Government and Social Media Military Facebook Use Study
Government and Social Media Military Facebook Use StudyGovernment and Social Media Military Facebook Use Study
Government and Social Media Military Facebook Use StudyNativa
 
Military Operations and Social Media
Military Operations and Social MediaMilitary Operations and Social Media
Military Operations and Social MediaInfo Ops HQ
 
Indian Armed Forces Perspective in the Background of Low Intensity Conflicts
Indian Armed Forces Perspective in the Background of Low Intensity ConflictsIndian Armed Forces Perspective in the Background of Low Intensity Conflicts
Indian Armed Forces Perspective in the Background of Low Intensity ConflictsNilendra Kumar
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismPierluigi Paganini
 
National Security College 29 August 2013
National Security College 29 August 2013National Security College 29 August 2013
National Security College 29 August 2013Bob Crawshaw
 
Dr. Saleh Al - Najem - Social Media Ananlytics for national_security
Dr. Saleh Al - Najem - Social Media Ananlytics for national_securityDr. Saleh Al - Najem - Social Media Ananlytics for national_security
Dr. Saleh Al - Najem - Social Media Ananlytics for national_securitypromediakw
 

Andere mochten auch (14)

Effects Based Operations A Guide For Practitioners
Effects Based Operations A Guide For PractitionersEffects Based Operations A Guide For Practitioners
Effects Based Operations A Guide For Practitioners
 
Effect based operation
Effect based operationEffect based operation
Effect based operation
 
Clausewitz and terrorism
Clausewitz and terrorismClausewitz and terrorism
Clausewitz and terrorism
 
Fabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealedFabio Ghioni Asymmetric Warfare and Interception revealed
Fabio Ghioni Asymmetric Warfare and Interception revealed
 
4GW
4GW4GW
4GW
 
Social media for the Military
Social media for the MilitarySocial media for the Military
Social media for the Military
 
Defining asymmetric warfare
Defining asymmetric warfareDefining asymmetric warfare
Defining asymmetric warfare
 
Government and Social Media Military Facebook Use Study
Government and Social Media Military Facebook Use StudyGovernment and Social Media Military Facebook Use Study
Government and Social Media Military Facebook Use Study
 
Military Operations and Social Media
Military Operations and Social MediaMilitary Operations and Social Media
Military Operations and Social Media
 
Indian Armed Forces Perspective in the Background of Low Intensity Conflicts
Indian Armed Forces Perspective in the Background of Low Intensity ConflictsIndian Armed Forces Perspective in the Background of Low Intensity Conflicts
Indian Armed Forces Perspective in the Background of Low Intensity Conflicts
 
The Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern Terrorism
 
Army Social Media Presentation
Army Social Media PresentationArmy Social Media Presentation
Army Social Media Presentation
 
National Security College 29 August 2013
National Security College 29 August 2013National Security College 29 August 2013
National Security College 29 August 2013
 
Dr. Saleh Al - Najem - Social Media Ananlytics for national_security
Dr. Saleh Al - Najem - Social Media Ananlytics for national_securityDr. Saleh Al - Najem - Social Media Ananlytics for national_security
Dr. Saleh Al - Najem - Social Media Ananlytics for national_security
 

Ähnlich wie Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter Insurgency Operations

Social business and innovation
Social business and innovationSocial business and innovation
Social business and innovationJohn Mancini
 
Content Opportunities in Revolutionary Times
Content Opportunities in Revolutionary TimesContent Opportunities in Revolutionary Times
Content Opportunities in Revolutionary TimesJohn Mancini
 
How Social Networks are Delivering on the Failed Promise of Knowledge Management
How Social Networks are Delivering on the Failed Promise of Knowledge ManagementHow Social Networks are Delivering on the Failed Promise of Knowledge Management
How Social Networks are Delivering on the Failed Promise of Knowledge ManagementPaul Gillin
 
Staying Productive with Social Streams
Staying Productive with Social StreamsStaying Productive with Social Streams
Staying Productive with Social StreamsLuis Benitez
 
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your OrganizationJesse Wilkins
 
Trends in Collaboration Technology and Open Source Software 2011-2012
Trends in Collaboration Technology and Open Source Software 2011-2012Trends in Collaboration Technology and Open Source Software 2011-2012
Trends in Collaboration Technology and Open Source Software 2011-2012Mithi Software Technologies Pvt Ltd
 
Digital Update USC #CorpGov Summit
Digital Update USC #CorpGov SummitDigital Update USC #CorpGov Summit
Digital Update USC #CorpGov SummitFayFeeney
 
Using Social Media to Drive Employee Engagement
Using Social Media to Drive Employee Engagement Using Social Media to Drive Employee Engagement
Using Social Media to Drive Employee Engagement Michael Specht
 
2009 Internet Strategy Forum Corporate Internet Executive Research Study -- 4...
2009 Internet Strategy Forum Corporate Internet Executive Research Study -- 4...2009 Internet Strategy Forum Corporate Internet Executive Research Study -- 4...
2009 Internet Strategy Forum Corporate Internet Executive Research Study -- 4...sgehlen
 
How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?John Mancini
 
IBM Connect Sofia 2013, Key Note, Robert Blatnik
IBM Connect Sofia 2013, Key Note, Robert BlatnikIBM Connect Sofia 2013, Key Note, Robert Blatnik
IBM Connect Sofia 2013, Key Note, Robert BlatnikIBS Bulgaria
 
IBM Social Business Development for CXOs
IBM Social Business Development for CXOsIBM Social Business Development for CXOs
IBM Social Business Development for CXOsFriedel Jonker
 
Future of the it department 17 may 2012 mt
Future of the it department 17 may 2012 mtFuture of the it department 17 may 2012 mt
Future of the it department 17 may 2012 mtIBM
 
Jane McConnell_Intralife2010
Jane McConnell_Intralife2010Jane McConnell_Intralife2010
Jane McConnell_Intralife2010Intralife
 
Trends in Collaboration Technology and Open Source Software 2011-2012
Trends in Collaboration Technology and Open Source Software 2011-2012Trends in Collaboration Technology and Open Source Software 2011-2012
Trends in Collaboration Technology and Open Source Software 2011-2012Mithi Software Technologies Pvt Ltd
 
Ibm smarter learning 2012
Ibm smarter learning 2012Ibm smarter learning 2012
Ibm smarter learning 2012Friedel Jonker
 
20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media GovernanceJesse Wilkins
 
Engage at Melcrum Summit 2012
Engage at Melcrum Summit 2012Engage at Melcrum Summit 2012
Engage at Melcrum Summit 2012Engage Group
 
Information opportunities in social, mobile, and cloud technologies
Information opportunities in social, mobile, and cloud technologiesInformation opportunities in social, mobile, and cloud technologies
Information opportunities in social, mobile, and cloud technologiesJohn Mancini
 

Ähnlich wie Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter Insurgency Operations (20)

Social business and innovation
Social business and innovationSocial business and innovation
Social business and innovation
 
Andy Blumenthal Talks About Social Media
Andy Blumenthal Talks About Social MediaAndy Blumenthal Talks About Social Media
Andy Blumenthal Talks About Social Media
 
Content Opportunities in Revolutionary Times
Content Opportunities in Revolutionary TimesContent Opportunities in Revolutionary Times
Content Opportunities in Revolutionary Times
 
How Social Networks are Delivering on the Failed Promise of Knowledge Management
How Social Networks are Delivering on the Failed Promise of Knowledge ManagementHow Social Networks are Delivering on the Failed Promise of Knowledge Management
How Social Networks are Delivering on the Failed Promise of Knowledge Management
 
Staying Productive with Social Streams
Staying Productive with Social StreamsStaying Productive with Social Streams
Staying Productive with Social Streams
 
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
20111031 KMWorld 2011 Applying the Social Business Roadmap to Your Organization
 
Trends in Collaboration Technology and Open Source Software 2011-2012
Trends in Collaboration Technology and Open Source Software 2011-2012Trends in Collaboration Technology and Open Source Software 2011-2012
Trends in Collaboration Technology and Open Source Software 2011-2012
 
Digital Update USC #CorpGov Summit
Digital Update USC #CorpGov SummitDigital Update USC #CorpGov Summit
Digital Update USC #CorpGov Summit
 
Using Social Media to Drive Employee Engagement
Using Social Media to Drive Employee Engagement Using Social Media to Drive Employee Engagement
Using Social Media to Drive Employee Engagement
 
2009 Internet Strategy Forum Corporate Internet Executive Research Study -- 4...
2009 Internet Strategy Forum Corporate Internet Executive Research Study -- 4...2009 Internet Strategy Forum Corporate Internet Executive Research Study -- 4...
2009 Internet Strategy Forum Corporate Internet Executive Research Study -- 4...
 
How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?
 
IBM Connect Sofia 2013, Key Note, Robert Blatnik
IBM Connect Sofia 2013, Key Note, Robert BlatnikIBM Connect Sofia 2013, Key Note, Robert Blatnik
IBM Connect Sofia 2013, Key Note, Robert Blatnik
 
IBM Social Business Development for CXOs
IBM Social Business Development for CXOsIBM Social Business Development for CXOs
IBM Social Business Development for CXOs
 
Future of the it department 17 may 2012 mt
Future of the it department 17 may 2012 mtFuture of the it department 17 may 2012 mt
Future of the it department 17 may 2012 mt
 
Jane McConnell_Intralife2010
Jane McConnell_Intralife2010Jane McConnell_Intralife2010
Jane McConnell_Intralife2010
 
Trends in Collaboration Technology and Open Source Software 2011-2012
Trends in Collaboration Technology and Open Source Software 2011-2012Trends in Collaboration Technology and Open Source Software 2011-2012
Trends in Collaboration Technology and Open Source Software 2011-2012
 
Ibm smarter learning 2012
Ibm smarter learning 2012Ibm smarter learning 2012
Ibm smarter learning 2012
 
20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance
 
Engage at Melcrum Summit 2012
Engage at Melcrum Summit 2012Engage at Melcrum Summit 2012
Engage at Melcrum Summit 2012
 
Information opportunities in social, mobile, and cloud technologies
Information opportunities in social, mobile, and cloud technologiesInformation opportunities in social, mobile, and cloud technologies
Information opportunities in social, mobile, and cloud technologies
 

Mehr von IBMGovernmentCA

Cge leadership summit ibm presentation public sector analytics
Cge leadership summit   ibm presentation public sector analyticsCge leadership summit   ibm presentation public sector analytics
Cge leadership summit ibm presentation public sector analyticsIBMGovernmentCA
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorIBMGovernmentCA
 
Investigating, Mitigating and Preventing Cyber Attacks with Security Analytics
Investigating, Mitigating and Preventing Cyber Attacks with Security AnalyticsInvestigating, Mitigating and Preventing Cyber Attacks with Security Analytics
Investigating, Mitigating and Preventing Cyber Attacks with Security AnalyticsIBMGovernmentCA
 
CEO Study Insights; Career Resiliency In Time of Change
CEO Study Insights; Career Resiliency In Time of ChangeCEO Study Insights; Career Resiliency In Time of Change
CEO Study Insights; Career Resiliency In Time of ChangeIBMGovernmentCA
 
Overview of IBM Capabilities
Overview of IBM CapabilitiesOverview of IBM Capabilities
Overview of IBM CapabilitiesIBMGovernmentCA
 
Business Process Management
Business Process ManagementBusiness Process Management
Business Process ManagementIBMGovernmentCA
 
Information Governance for Smarter Government Strategy and Solutions
Information Governance for Smarter Government Strategy and SolutionsInformation Governance for Smarter Government Strategy and Solutions
Information Governance for Smarter Government Strategy and SolutionsIBMGovernmentCA
 
Smarter Computing Integrated Systems
Smarter Computing Integrated SystemsSmarter Computing Integrated Systems
Smarter Computing Integrated SystemsIBMGovernmentCA
 
Smarter Software for Smarter Governments
Smarter Software for Smarter GovernmentsSmarter Software for Smarter Governments
Smarter Software for Smarter GovernmentsIBMGovernmentCA
 
Perspectives and Case Studies on Effective Theatre Base Service Management
Perspectives and Case Studies on Effective Theatre Base Service ManagementPerspectives and Case Studies on Effective Theatre Base Service Management
Perspectives and Case Studies on Effective Theatre Base Service ManagementIBMGovernmentCA
 
Reducing IT Costs and Improving Security with Purpose Built Network Appliances
Reducing IT Costs and Improving Security with Purpose Built Network AppliancesReducing IT Costs and Improving Security with Purpose Built Network Appliances
Reducing IT Costs and Improving Security with Purpose Built Network AppliancesIBMGovernmentCA
 
Improving Defence Program Execution
Improving Defence Program ExecutionImproving Defence Program Execution
Improving Defence Program ExecutionIBMGovernmentCA
 
A Hybrid Technology Platform for Increasing the Speed of Operational Analytics
A Hybrid Technology Platform for Increasing the Speed of Operational AnalyticsA Hybrid Technology Platform for Increasing the Speed of Operational Analytics
A Hybrid Technology Platform for Increasing the Speed of Operational AnalyticsIBMGovernmentCA
 
Defense Intelligence & The Information Challenge
Defense Intelligence & The Information ChallengeDefense Intelligence & The Information Challenge
Defense Intelligence & The Information ChallengeIBMGovernmentCA
 
Analytics for Smarter Defence
Analytics for Smarter DefenceAnalytics for Smarter Defence
Analytics for Smarter DefenceIBMGovernmentCA
 
Keynote phaedra boinodiris serious games beyond training from process optim...
Keynote phaedra boinodiris   serious games beyond training from process optim...Keynote phaedra boinodiris   serious games beyond training from process optim...
Keynote phaedra boinodiris serious games beyond training from process optim...IBMGovernmentCA
 

Mehr von IBMGovernmentCA (20)

Cge leadership summit ibm presentation public sector analytics
Cge leadership summit   ibm presentation public sector analyticsCge leadership summit   ibm presentation public sector analytics
Cge leadership summit ibm presentation public sector analytics
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
 
Investigating, Mitigating and Preventing Cyber Attacks with Security Analytics
Investigating, Mitigating and Preventing Cyber Attacks with Security AnalyticsInvestigating, Mitigating and Preventing Cyber Attacks with Security Analytics
Investigating, Mitigating and Preventing Cyber Attacks with Security Analytics
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
Reputational Risk
Reputational RiskReputational Risk
Reputational Risk
 
CEO Study Insights; Career Resiliency In Time of Change
CEO Study Insights; Career Resiliency In Time of ChangeCEO Study Insights; Career Resiliency In Time of Change
CEO Study Insights; Career Resiliency In Time of Change
 
Overview of IBM Capabilities
Overview of IBM CapabilitiesOverview of IBM Capabilities
Overview of IBM Capabilities
 
Business Process Management
Business Process ManagementBusiness Process Management
Business Process Management
 
Information Governance for Smarter Government Strategy and Solutions
Information Governance for Smarter Government Strategy and SolutionsInformation Governance for Smarter Government Strategy and Solutions
Information Governance for Smarter Government Strategy and Solutions
 
Smarter Computing Integrated Systems
Smarter Computing Integrated SystemsSmarter Computing Integrated Systems
Smarter Computing Integrated Systems
 
Smarter Software for Smarter Governments
Smarter Software for Smarter GovernmentsSmarter Software for Smarter Governments
Smarter Software for Smarter Governments
 
Perspectives and Case Studies on Effective Theatre Base Service Management
Perspectives and Case Studies on Effective Theatre Base Service ManagementPerspectives and Case Studies on Effective Theatre Base Service Management
Perspectives and Case Studies on Effective Theatre Base Service Management
 
Reducing IT Costs and Improving Security with Purpose Built Network Appliances
Reducing IT Costs and Improving Security with Purpose Built Network AppliancesReducing IT Costs and Improving Security with Purpose Built Network Appliances
Reducing IT Costs and Improving Security with Purpose Built Network Appliances
 
Improving Defence Program Execution
Improving Defence Program ExecutionImproving Defence Program Execution
Improving Defence Program Execution
 
A Hybrid Technology Platform for Increasing the Speed of Operational Analytics
A Hybrid Technology Platform for Increasing the Speed of Operational AnalyticsA Hybrid Technology Platform for Increasing the Speed of Operational Analytics
A Hybrid Technology Platform for Increasing the Speed of Operational Analytics
 
Defense Intelligence & The Information Challenge
Defense Intelligence & The Information ChallengeDefense Intelligence & The Information Challenge
Defense Intelligence & The Information Challenge
 
Analytics for Smarter Defence
Analytics for Smarter DefenceAnalytics for Smarter Defence
Analytics for Smarter Defence
 
Keynote phaedra boinodiris serious games beyond training from process optim...
Keynote phaedra boinodiris   serious games beyond training from process optim...Keynote phaedra boinodiris   serious games beyond training from process optim...
Keynote phaedra boinodiris serious games beyond training from process optim...
 
Where Ideas Come From
Where Ideas Come FromWhere Ideas Come From
Where Ideas Come From
 
What Are The Chances
What Are The ChancesWhat Are The Chances
What Are The Chances
 

Kürzlich hochgeladen

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

Social Networks the Next Emerging Spectrum in Asymmetric Warfare and Counter Insurgency Operations

  • 1. Anthony Fiorot - WW Web Experience & Social Business Solutions Executive 10 October 2012 Social Networks: The Next Emerging Spectrum in Asymmetric Warfare & Counter Insurgency Operations (COIN) © 2009 IBM Corporation
  • 2. Social Networks: The Next Emerging Spectrum in Asymmetric Warfare & Counter Insurgency Operations (COIN) Social Networks are the next emerging spectrum in Asymmetric Warfare Operations. We will explore how professional social network technologies are transforming the Command Post of the Future. We will discuss next generation collaboration and communications capabilities. How our enemies and terrorists are using social technologies to communicate and collaborate in Asymmetric environments. We will discuss social analytic techniques and emerging tradecraft. We will discuss emerging best social practices in support of Operations Other then War (OOTW), specifically Counter Insurgency Operations (COIN), Humanitarian and Disaster Response Operations. © 2009 IBM Corporation
  • 3. A Social Transformation is taking place in how people communicate and how relationships form and develop Social Internet PCs Departmental The Fifth IT Era: The era of Mainframe 3 © 2009 IBM Corporation
  • 4. The Social Transformation has brought upon us Social Business Social Business embraces networks of people with social collaboration technologies and tools to create business value and opportunities A Social Business... Connects people across all types of boundaries Allows networks of people to form and dissipate as needed Delivers the right content and expertise to the right people Improves and accelerates how works get done 4 © 2009 IBM Corporation
  • 5. Government leaders plan dramatic improvements in organizational openness through greater external and internal collaboration To what extent will you sustain or make changes to the following aspects of your organization over the next 3 to 5 years? Government Global Partnering/collaborating with other organizations 59% 53% 59% 53% Internal collaboration 47% 52% 47% 52% Management and/or organization structure 41% 40% 41% 40% Governance models 40% 31% 40% 31% C-suite composition, skills and responsibilities 39% 41% 39% 41% Decision-making processes 37% 43% 37% 43% Supervisory board composition 23% 15% 23% 15% Values of your organization 18% 18% 18% 18% Source: The IBM CEO 2012 Study. The response sample = 176 Government organizations out of 1700 CEOs 5 © 2009 IBM Corporation
  • 6. “What’s Your Social Business Strategy for Your Defense Agency ?” Would you be interested in learning how other defense and government agencies are using “Professional Social Network Solutions” to: •Become more proactive and not reactive •Be a more efficient government workforce •Improve inter-agency services •Improve your analysts web experience •Share & Retain Knowledge – Retiring Workforce •Attract New Hires - Social •Be more mobile & agile •Modernize & Transform •Be innovative? •Save money & reduce budgets © 2009 IBM Corporation
  • 7. Social Intelligence Environment (SIE) Defined © 2009 IBM Corporation
  • 8. The INTELLIGENCE Cycle Monitoring & Analyzing the Social Intelligence Environment (SIE) - provides critical intelligence for law enforcement investigations & operations 8 © 2009 IBM Corporation
  • 9. Social Threat Assessment and Intelligence Process Monitor - Analyze - Disseminate - © 2009 IBM Corporation
  • 10. Monitoring the Social Intelligence Environment (SIE) Website - www.tactrend.com Whitepaper - http://www.hmstech.com/tactrend/Tactical-Trending-White-Paper.pdf © 2009 IBM Corporation
  • 11. Monitoring the SIE – LE Intelligence © 2009 IBM Corporation
  • 12. Monitoring - Two Recent Defense Use Cases Case Study – “Para Jumper (PJ)” In October 2011, a women tweeted “Please say a prayer for my BFF’s husband who is a PJ in the Air Force, he got shot three times in Afghanistan last night.” The command found out that a member in it’s command was wounded in action on Twitter before the official military messaging notification system. Case Study – “IED In Afghanistan” US and allied personnel send out Twitter messages on observed Improved Explosive Device (IED) explosions or detections to share immediate intelligence with other members across their command. Most fastest and quickest way to warn each other of IEDs in the AOR. © 2009 IBM Corporation
  • 13. Monitoring – Bin Laden Raid - Pakistan One Tweet Could Have Compromised the Mission ! © 2009 IBM Corporation
  • 14. Monitoring - Two Recent Counter Terrorism Use Cases Case Study – “I Have A Bomb On This Plane” (Miami Airport) In January 2012, an airline passenger tweeted she had a bomb on a Jet Blue commercial aircraft at the Miami International Airport. Within 3 minutes of detecting the Tweeted threat, a suspect was identified. TSA and FBI were immediately notified and the passenger was detained before the plane departed the gate. No bomb was found… but the suspect did get her hashtag wish: #tostayinmiamialittlewhilelonger. Case Study – 2012 SUPERBOWL Threat – Just days before the 2012 Superbowl, "RulingElite" Tweeted he would carry out a biological attack designed to kill thousands of fans in the stadium. Out of one billion Tweets, our technology and tradecraft detected and reported this threat to authorities in real-time. © 2009 IBM Corporation
  • 15. Actual Photos found on one person’s open and public Twitter Account © 2009 IBM Corporation
  • 16. But Wait There’s More !!! © 2009 IBM Corporation
  • 17. Best Practices & Things to Consider When It Comes to Social Monitoring for Law Enforcement Intelligence & Operations 1. Partner with LE Social Intelligence Partners not marketing & social media analytics companies 2. LE Intel Methodology that complies to privacy laws 3. Cloud / Anonymous / No Bread Crumbs 4. Evidence / Forensics / Prosecution 5. Fuse Geo Spatial / IMINT / Social Monitoring / Reporting 6. Create a virtual Intel COP mashing all your data 7. Collaborate / Share Intel Using Your Social Tools (Instant Messaging / Professional Social Networks) 8. Real time language translation 17 © 2009 IBM Corporation
  • 18. Combining Social Monitoring with Social Analytics - Predicting Events & Activities Before They Happen Ingesting unrelated big data and finding the relationships ! © 2009 IBM Corporation
  • 19. Analyzing Use Case - Syria Case Study Benefit: – Within a Major Command, on average it takes 75 Analysts to only view 9% of the Social Intelligence Our Social Monitoring Environment (SIE) & Analytics Platform – SIE Analytics: We believe we can predicted 12 out of 15 events in Syria before accomplish 100% with just 25 they occurred last analysts month 19 © 2009 IBM Corporation
  • 20. UNCLASSIFIED Most Influential vs Most Followed MASS INFLUENCER Wael Ghonim @Weddady – Mass Influencer Twitter Followers: 86,000+ Twitter Followers: 6,900+ Reactions Generated: 3,291 Reactions Generated: 1,281 Reactions per 1K followers: 38 Reactions per 1K followers: 186 Justin Bieber Twitter Followers: 7.4 Million Reactions Generated: 294 Reactions per 1K followers: 0.04 UNCLASSIFIED © 2009 IBM Corporation
  • 21. UNCLASSIFIED Case Study - Trevon Martin / Miami High School / Walk Out UNCLASSIFIED © 2009 IBM Corporation
  • 22. Analyzing Use Case – 2011 Asia Pacific Economic Cooperation (APEC) Protecting the President & Asia Pacific Prime Ministers at the Asia Pacific Economic Committee (APEC) Hawaii, November 2011 © 2009 IBM Corporation
  • 23. Combining Social Monitoring and Analytics with Real-Time Dissemination / Collaboration Professional Social Network Technologies for Defense, Intelligence & Counter Terrorism) Share New Insights and Knowledge Using “Professional Social Network Technologies” © 2009 IBM Corporation
  • 24. Defense Case Study – United States Special Operations Command (USSOCOM) International SOF Information Sharing System (ISISS) ISISS - Enables International Special Operations Forces (ISOF) from over 120+ countries the ability to communicate and collaborate through professional social network technologies to share knowledge and create new insights. © 2009 IBM Corporation
  • 25. © 2009 IBM Corporation
  • 26. Dissemination / Collaboration – United States Special Operations Command (USSOCOM) ISISS Program © 2009 IBM Corporation
  • 27. Defense Case Study – United States Special Operations Command (USSOCOM) International SOF Information Sharing System (ISISS) ISISS – Screenshot of the SOF Asia Pacific Region – Includes SAF SOF members. ISISS Features – Profiles Communities Language Translation Files Training Videos Activities Blogs Wikis Instant Messaging eMail © 2009 IBM Corporation
  • 28. Extending the Social Experience to the Tactical (Mobile) Edge 28 © 2009 IBM Corporation
  • 29. Social Business Framework can address the challenges faced by agencies through 3 business outcomes Citizen Interaction How People Work Deepen relationships Generate new ideas Enable a more effective Business outcomes with citizens faster Federal workforce (external) (external + internal) (internal) Target Citizen Customer Service Departments Government and Operation Leaders, audiences and Organizations Local Government and Innovation Leaders Human Resources Business challenges Citizen Expectations Seeding innovation Breaking down silos IBM CEO 2012 Engaging citizens as Amplifying innovation with Empowering employees Study partnerships through values individuals alignment Professional Social Collaboration Capabilities Communities and Forums Expertise and Content Tagging Knowledge Management Enabling Dynamic personal profiles and status Social Portals Social Analytics capabilities Mobile Applications Crowd-sourcing & Collective Intelligence updates Blogs and Wikis Cross Agency and Cross Department Content management based on the Open Data Collaboration person, not the document “Open” principles Transparency Accessibility Participation Collaboration 29 © 2009 IBM Corporation
  • 30. Examples of how federal governments are using professional social networks to drive each business outcome Deepen relationships Generate new Enable a more with citizen ideas faster (External + Internal) effective workforce (External) (Internal) Promote citizen community Formulate Crowd sourcing for Promote a collaborative virtual blogs and social forums new services environment Use of Jams, blogs and wikis to Develop knowledge sharing and Conduct citizen care analytics address challenges and solve promote asset re-use Connect right experts to answer Develop talent sourcing problems citizen questions Promote virtual gaming for Infuse community building Improve community driven innovation and education Promote blogs, wikis citizen support and engagement Improve ways of designing and Create social internal platforms for Inform and educate citizens producing services rewards and recognition continuously Integrate citizen feedback and Promote Borderless Public Bring in Transparency and insight with program and service Service Organization accountability for an improved development Generate real-time information perception of Government Create social platforms for accessibility Open data and share service citizen award/recognition Develop skills by virtual information Innovate to exceed citizen training/gaming within expectations departments Open data and share service Open data and share service information information 30 © 2009 IBM Corporation