2008 information sharing orientation dia international fellows
1. Information Sharing & Analytics Orientation
7 March 2008
International Intelligence Fellows Program
www.oss.net www.earth-intelligence.net
Words for Each Slide in Notes
2. Before We Begin….
The U.S. Intelligence Community Before & After 9/11
3. Collection Failure
Breakdown in Coverage and Language
Access
Digital Analog Oral/Unpublished
English
Language
Foreign
Languages*
NRO
NSA FBIS UN/STATE
CIA/DO
Cascading Deficiencies:
1) Don’t even try to access most information
2) Can’t process hard-copy into digital
3) Can’t translate most of what we collect
*29 predominant languages, over 3,000 distinct languages in all.
4. Processing Failure
Breakdown in Exploitation,
Dissemination
50% Less Costly
More Satisfying
Does Not Exist
SIGINT
OSINT
HUMINT
IMINT
MASINT
STATE
0% 50%
6. Analytic Matrix for
Understanding, Dialog &
Action Over Time
Affordable, Implementable 50-Year
Strategy for Using Public Intelligence to
Save Humanity & Earth
Credible, Complete
Plan for Integrating Public Information to
Create Public Understanding and Morally-
Sound Sustainable Policies & Harmonized
Budgets at Every Level of Action Without
Centralizing Anything at All
URL: http://www.earth-intelligence.net, Click on about EIN for 10-page brochure.
7. Earth Intelligence Network: High-Level Threat Summary + Two
Breach of Trust Demands Electoral Reform
Insist on legislation passing by 4 July‘08
Poverty
• Pandemic
• 5 billion globally
• Increasing in USA
• Foundation for all
other threats
Infectious
Disease
• Without borders
• Kills rich & leaders
• Prevention critical
• Low cost medicine
Environmental
Degradation
• Changes that took
10,000 yrs now take 3
• Toxicity of everything
• Poisoned earth/water
Inter-State
Conflict
• Security Council
members sell the guns
• Ban on arms exports
• Regional peace nets
Civil War
• Corruption
• Dictators (42 of 44
supported by USA)
• Over basics of life
Genocide
• Resource scarcity
• Lifetime of learned
hatreds
• Israel must adapt
Other Atrocities
• Child slavery
• Child prostitution
• By name kidnapping
• Murder for body parts
Proliferation
• Cluster bombs, land
mines, & small arms
• Peaceful energy
trumps nuclear bombs
Terrorism
• Cannot win “war”
against a “tactic”
• Law enforcement can
resolve this
• Too much on military,
not enough on aid
Transnational
Crime
• $2 trillion a year
• Vatican, Wall Street,
USG, Mafia all are
intertwined
• Drug cash is liquidity
Corruption
• One man’s bribe is a
community’s loss of all
• Open Money and
Open Books can fix
• Must improve salaries
across the board
Fraud
• Apply Tobin Tax of .
0006 to all Federal
Reserve transactions
• IRS gets same books
as stockholders
• “True Costs” up front
8. Earth Intelligence Network: Transpartisan Policy Summary
Debt. $9 Trillion is “a lot,” Debt scales & incapacitates.
USA Insolvent. MUST HAVE a Balanced Budget 25 years out.
Agriculture
• Local & Organic
• Deep Root Farming
• Family/Community
Owned Farming
Diplomacy
• Dogma kills
• Restore USIA
• Need global
information sharing
Economy
• End CEO Greed
• $10/hr minimum wage
• Full employment
• LOCAL supply chain
Education
• Self-paced Online
• Apprenticeships
• Team Learning
• Learn to learn
Energy
• Wind & Solar NOW
• Portable Hydrogen
• Two-way Grid
• Green capitalism
Family
• One job per couple
• End overtime
• Community Centers
• Build neighborhoods
Health
• Lifestyle
• Environment
• Natural Cures
• Generic at 1% of cost
Immigration
• Enforce Labor Law
• GLOBAL standards
•Border Patrol +25,000
• National Service 2 yrs
Justice
• Pardon all marijuana
offenders
• Wind down the
prison-slave complex
• Eliminate corporate
“personality” amnesty
Security
• Wage peace not war
•Reduce the military-industrial
complex
• Belief systems and
morality are core.
• Connect 5B poor
Society
• Universal service
• Universal health care
• Preventive medicine
• English required for
citizenship & extended
residence
Water
• Reflect True Cost
• Global Manhattan
Project to restore
aquifers, push salt
back
• Regional Water
Authorities (Global)
9. Earth Intelligence Network: Transpartisan Challengers Summary
Eight Challengers, Four Methods
Our only hope is to create an EarthGame™ the Challengers Can Use
Brazil
• Demographic power
• Energy independent
• Macau connection to
China
China
• Energy Crisis
• Water Crisis
• Doing well on poverty
• Exporting wombs
India
• Water crisis
• Most complex mix
• IT rich, farm poor
• Merits investments
Indonesia
• Proving resilient
• Rich in resources
• Key to anti-piracy
• Could lead region
Iran
• We overturned their
democracy
• Persians are not
ragheads
• Get over it & deal
Russia
• Putin on a roll
• Buffer on China only if
we keep it European
• Enormous potential
• Embrace & assist
Venezuela
• Populism is not
socialism
• Energy independent
• Charismatic leaders
can be ignorant
Wild Cards
• Congo
•Malaysia
• Pakistan
• South Africa
• Turkey
Budget
• Balanced budget
mandatory
• Medicare okay if go
with generic drugs
• Too much on spies &
military, shift $250B/yr
Design
• Sustainable
• Cradle to Cradle
• Lease don’t buy
• Minimize shipping
• End absentee owners
• Public Health
EarthGame™
• Reality plus budgets
plus active citizens
online levels the field
• For one third of war
costs, can eliminate all
ten high-level threats
“True Costs”
• Every product and
service can be listed in
online database
• End-user can get true
costs at point of sale
via cell phone
10. Affordable NOW
First, get US to pay for Multinational Decision Support Centre and
ASG/DS
Second, creat $1 trillion a year Range of Gifts Table posted online
Third, host an annual Harmonized Giving Conference for Foundations,
Governments, and Corporations, with an individual donor table online.
11. DSS Mission Statement
• The Department of Safety and Security is
responsible for providing leadership, operational
support and oversight of the security
management system to enable the safest and
most efficient conduct of the programmes and
activities of the United Nations System.
• Observation: Information is the modern means
for achieving security, both for protection of UN
personnel, facilities, organizations, and
missions, and for the host member states and
indigenous or migrant populations.
12. DSS Deficiencies of Concern
• Threat Risk Assessments are
delayed & incomplete
• Threat Risk Assessments do not
reflect 360° UN System view nor
regional/adjacent threat
information
• Threat Risk Assessments do not
have a well-founded directory of
Indicators, Accelerators, and
Triggers relevant to UN System
security.
• UN Missions & individual UN
agencies or forces have no
integrated decision-support
mechanism helpful to one and all.
• UN System has no global directory
of sources with defined biases,
sponsors, or agendas.
• UN System is not perceived as
having an effective but totally
moral, legal, ethical information
system helpful to both the UN
System & Host Government.
• UN System does not have safe,
efficient, or reliable (constant)
means of sharing helpful
information across all UN System
boundaries (agencies, countries,
missions, locations)
• UN System information is not
efficiently acquired, exploited, or
shared
• UN System has no means for
identifying relevant sources,
softwares, and services for
multinational information sharing
and internal analytics.
• UN System is not recognizing information as a major contributor to security.
13. DSS Host Overview
• We Must Connect
– DPA
– DPI
– DPKO
– DSS
– All Other
• Participating Groups
– UNIIIC
– UNIFIL
– ESCWA
– DSS
– UNTSO
– UNDOF
• Three P’s
– Posture
– Perception
– Political Compromise
• Fundamentals
– Food & Water
– Shelter
– Clothing
– Education
– Security
• JOC/JMAC useful model
• Member Nations creating
Open Source Intelligence units
(e.g. Scotland Yard) that have
been very effective in
achieving improved security.
Sharing Legal Ethical Information Can Enhance
Security & Performance for All
14. Nine Pillars of Vulnerability
Mitigation in UN System Security
• POLITICAL
COMPROMISE
• MEDIA MANAGEMENT
• MANDATE & MISSION
• POSTURE &
PERCEPTION
• INFORMATION
MANAGEMENT
• OPERATIONAL
PROCEDURES
• PHYSICAL SECURITY
• TECHNICAL SECURITY
• HUMAN INTELLIGENCE
(Defensive Passive Counter-
Surveillance, Surveillance
Detection, NOT Offensive
Penetration)
Information—Open, Legal, Ethical Information—is the Essential Means
for Mitigating All Nine UN System Vulnerabilities While Also
Contributing to UN System Efficiency in Every Organization, at Every
Level, for Every Function and Mission.
15. Conceptual Opportunity
• IOSAS
– Integrated
– Open
– Source
– Analytical
– Support
• UNODIN
– United
– Nations
– Open-Source
– Decision-Support
– Information
– Network
Mission Joint Operations Centers and Force Joint Military Analysis Centers
exist now, at an elementary level as conceptualized by MajGen Cammaert.
Our endeavors will over time dramatically improve both JOC & JMAC concepts, doctrine, manning,
equipping, training, outsourcing, sourcing, & analytics. Our objective over the next 20 years is to
establish a global grid that makes the UN System the world’s best Early Warning, Multinational
Information Sharing, and Decision Support capability in support of peace and prosperity.
Information should be the nerves, blood, and brain of the UN System.
16. Goal of the Training Initiative
• The goal of this training
initiative is to find ways to
efficiently and effectively
navigate the broad
spectrum of open source
material available, and to
integrate pertinent
elements of the 80% into
the 20% available from
currently recognized
national and UN sources
into an Integrated Open
Source Analytic Support
(IOSAS) mechanism.
1
Open Source
Information
2
1. Host Country National/Military Security, Diplomatic Missions
2. UNDSS, DPA, DPI, Other UN Agencies, Other NGO
17. Three-Day Plan
Thursday
• Introductions of Participants
• Strategic View of Multinational
Information Operations
• Discussion of Two Online
Guides with Links:
– www.oss.net/BASIC
– www.oss.net/LIBRARY
• Discussion of Current Event
Information
• Participant Identification of Top
Issues for Discussion
• Sources & Methods (eg NATO)
• How to Create a Wiki for Any
Mission (eg30 ExpertWiki)
NOTE: This gathering has three
purposes:
1. To introduce six UN Lebanon
groups to one another in
person for improved sharing &
support.
2. To identify global online and
offline resources immediately
available, free, to all
participants.& their colleagues
3. To begin the process, with this
“Class Before One” of defining
how best to enhance UN
access to and exploitation of
multinational information
among DSS, DPA, DPI, IM.
Friday
• Sources
– 24/7 Call-In Number
– Eight Sharing Tribes
– Source Directory
– Belief Systems
– Financial Sources
– Subscription Sources
– Password-Protected
• Methods
– Internet Speed
– Online versus Personal
– Cultural Factors
– Creating Flow
– Forecasting
– Summaries & Opinions
• Indicators, Accelerants, &
Triggers (Share & Improve)
• Empowering Technologies
– Ingestion
– Sense-Making
– Sharing
– SILOBREAKER
• Organizational Engineering
– The Boss
– The Source
– The Budget
– The Public
Saturday
• Security Risk Assessment
(Training Exercise)
- Brief Senior Person from
Each of Six UN Elements
- Establish missing Essential
Elements of Information (EEI)
- Discuss the needs of senior
officers (e.g. Commissioner,
spokesperson for UNIFIL)
• Open Dialog
• Challenge Questions
• Specify follow-up actions for
instructor and for participants
in next thirty days
• Instructor to develop a
proposed syllabus for UN
DSS open source decision
support information network
(UNODIN) and with help from
participants, a draft UN
Handbook on Early Warning,
Multinational Information
Sharing, and Decision
Support.
NOTE: all opinions are
personal and off the record.
18. Class Before One
• A training concept—before the first “official” class, there is
always a “Class Before One” that helps develop the need,
the solution, and the presentation.
• You are the Class Before One. Be very proud of this, each
of you is a UN System decision-support pioneer.
20. Imagine the UN System as a
Wealth Creation Network
Information Management is the
center of gravity for UN System.
21. Public Advantage I
We were here in 2006…
9-11 & Katrina,
then multiple
policy failures
Here in 2008!
US public scared
back into reading
and thinking; 75K
amputees, GAO
declares USA
insolvent, 27
secessionist
movements,
“home rule” up,
and corporate
personality down.
Critical Junctures
22. TIME
IMPACT
SHORT
TIME
IMPACT
LONG
Public Advantage II
SINGLE-CULTURE
SINGLE-ORGANIZATION
EQUITIES
MULTI-CULTURAL &
TRANS-NATIONAL
EQUITIES
LEADERS
DECIDE
PEOPLE
DECIDE
TOP-DOWN
COMMAND & CONTROL
SECRET
SOURCES & METHODS
OPEN
SOURCES & METHODS
BOTTOM-UP
INFORMATION-SHARING
OBVIOUS DETAIL
OBSCURE DETAIL
OLD
NEW
Localized
Resilience
Sustainable Reality-Based
Transpartisan Budgets
23. Public Advantage III
Expert Forum
Weekly Review
Distance
Learning
Virtual
Library
Shared
Calendar
Virtual
Budget
Shared
24/7 Plot
Shared
Rolodex
24. Public Advantage IV
National Military Law Enforcement Business
Secrets
"Intelligence"
"Protected"
Open
Targeting
Signals
Imagery
Order of Battle
Mapping
Undercover
Investigation
Privacy
Metrics
Client Information
Pricing Information
Cost Information
External Information
Academic NGO-Media Citizen+
Secret
Sensitive
Private
Open
Secret
Sensitive
Private
Open
Secret
Sensitive
Private
Open
27. Organizations
Fateh Al-Islam
Al Qaeda
Gama´a al-Islamiyya
Fatah Party
Show More
Key Phrases
Refugee Camp
Terrorist Group
Martyrdom Allotment
Show More
Topics
Civil Disruption / Riots
Democratization
Land Forces
Territorial Disputes
Show More
Cities
Tripoli (Libya)
Beirut
Damascus
ʿAmman
Show More
Countries
Lebanon
Syria
United States
Israel
Show More
Current Story
Lebanon:
Fatah al-Islam
No. 2 killed
Documents matching your search Documents | Stories
All (67) | News (67) | Reports (0) | Blogs (0) | Audio/Video (0) | Fact Sheets (0)
Documents Sort by: Date | Relevance
While Gaza burns Haaretz 08/21/2007
Quotes ...near the Palestinian refugee camp of Nahr el-Bared where Fatah Islam militants have been fighting
Lebanese soldiers for more than two months. "Cabinet was informed by Interior Minister Hassan Sabei that Lebanese
security forces have killed the Fatah Islam's No 2 in the Abu Samra neighbourhood" in Tripoli, Aridi told reporters
following a Cabinet meeting last night [08/07/2007] DDI News -
Lebanon announces killing Fatah Islam deputy commander The group said it was bringing the 'good news to the
Muslims of the martyrdom of a noble brother,' according to the statement. "We in the Fatah Islam movement and all the
true mujahideen, pledge to God to avenge our brother's blood from the infidels and the renegades" The authenticity of
the statement, posted on a Web site which commonly carries messages from Al Qaeda and other militant groups, could
not be independently... [08/09/2007] FOXNews.com - Fatah Islam's No. 2 Killed by Lebanese Troops
• www.silobreaker.com is the single best tool, free for now
• Sense-making tools can be applied to both their content and yours.
29. Intelligence = Decision Support
• Intelligence is a process
that creates decision-support.
• It is NOT defined by
secret sources &
methods.
• The Brahimi Report,
Military Advisors to the
Secretary General, and
The High Level Threat
Panel all validate urgency
of creating a UN/NGO
global decision support
and multinational
information sharing
network.
30. Orientation, Not Micro-Training
• You will learn more on your own, and by sharing
with one another, than can be taught here in
three days
• www.oss.net/BASIC has the primary links
• www.oss.net/LIBRARY has 30,000 pages from
750+ speakers, this directory can be sorted and
also searched
• Consider viewing the lectures and movies first,
especially the lectures on Analysis & New Rules,
and the movie on Creating the World Brain.
31. Analysis is a Profession
• Four D’s
– Discovery
– Discrimination
– Distillation
– Delivery
• If you do nothing else,
read the Analytic
Tradecraft booklet by
Jack Davis, easily
accessed online, free, via
www.oss.net/BASIC.
• Facts Are Not Enough
– History
– Cultural Context
– Adjacent Players
– Localized Indicators,
Accelerators, Triggers
– Sharing 24/7
– Cast a Wide Net
– Wild Cards Abound
– Thinking Matters More
Than Technology
32. Ten High-Level Threats
• Poverty
• Infectious Disease
• Environmental
Degradation
• Inter-State Conflict
• Civil War
• Genocide
• Other Atrocities
• Proliferation
• Terrorism
• Transnational Crime
Every Mission Confronts These Ten Threats One Way or Another—
Avoid Narrow Focus, Always See the Forest, Not Just The Tree in Front of You
33. Open Sources & Ten Threats
• Economic and social threats including 95%
– poverty, 99%
– infectious disease and 95%
– environmental degradation 90%
• Inter-State conflict 75%
• Internal conflict, including 90%
– civil war, 80%
– genocide and 95%
– other large-scale atrocities 95%
• Nuclear, radiological, chemical, and
biological weapons (proliferation) 75%
• Terrorism 80%
• Transnational organized crime 80%
On balance, open sources are more than adequate to understand and address
the ten high-level threats, but the UN System’s Information Management is not.
34. Scotland Yard OSINT
1. Created Open Source Branch in SO-11 in 1995
2. This helped put more terrorists and arms smugglers in jail faster and
cheaper (instead of 3000 Euro for a surveillance team, 30 Euro for an
address)
3. Unanticipated bonus: increased property and financial assets that could
be confiscated from convicted organized crime bosses.
36. Twelve Action Areas
• Agriculture
• Diplomacy
• Economy
• Education
• Energy
• Family
• Health
• Immigration/Migration
• Justice
• Security
• Society
• Water
Every Mission Has Narrow Channels and Deep Bureaucracies.
Information Sharing is a Proper Ethical Means for Enhancing Effectiveness.
If Any Action Area is Overlooked, Boss Needs to Know This.
37. Analysis Cannot Do It All
Prediction/Prevention
Self protection
Environmental Security
Retaliation
You
Everyone
Else
1. Improve Sources
2. Improve Sharing
3. Improve Analysis
4. Improve Decisions by
Supported Bosses
39. Hezbollah, Iran, Regional Surprise
Warning, meaning, need, elsewhere
• 14 Aug 07 News Release
• Sheikh Hassan Nasrallah
promises “surprise” if Israel
attacks Lebanon again.
• Hezbollah has not been
disarmed—15,000 rockets
remain hidden (other source)
• Lebanon divided, Israeli
soldiers still captive, situation is
volatile
• Direct negotiations could help,
truth & reconciliation
• Israel may not appreciate full
extent of Iranian ability to
provide supporting attacks, e.g.
exploding buildings in Tel Aviv,
cutting of US land supply line
from Kuwait to Baghdad,
Sunburn missile attack against
Maritime Force.
• Israel, not Iran or Syria, is the
most likely to take unilateral
violent action that will trigger
the “surprise.”
Probability: High
Damage: Very High
Surprise: Strikes
Outside of Lebanon,
Not by Hezbollah
Israel 9-11 in Tel Aviv
40. Why Analysts Are Special
The New
Intelligence
Gap: the
difference
between what
you can know
and what you
can use!
INFORMATION TIME
Actionable
Intelligence
Available
Information
Complex Organizations are Drowning in Information.
Analytic Tradecraft, Applied by Analysts, is the Solution.
41. Levels of Analysis: Threat Changes!
Over time and space
Channels & Borders
Of strategic value
Quantities & Distribution
Internally available for use
Volatility of sectors
Training & Maintenance
Mobility implications
Cohesion & Effectiveness
STRATEGIC
Integrated
Application
OPERATIONAL
Selection of
Time and Place
TACTICAL
Application of
Finite Resources
TECHNICAL
Isolated
Capabilities
Military Sustainability
Geographic Location
Civil Allies
Military Systems One by One
Climate Manipulation
Civil Power, Transport,
Communications,
Finance
Military Availability
Geographic Resources
Civil Stability
Military Reliability
Geographic Terrain
Civil Psychology
Military Lethality
Geographic Atmosphere
Civil Infrastructure
This is very important. The threat changes depending on the level of analysis,
and the threat is distinct, more on this shortly, in relation to the UN Mission, fixed
facilities, mobile units, and individuals with both fixed homes and mobile platforms.
42. Creating an Analysis Cell
Central discovery, distributed exploitation
• Six people can leverage
global open sources for an
entire Ministry or Service or
Command
• This reduces duplication
while increasing decision
support to all bosses
• Saves money and creates
value that can be shared
with host country and
others
Senior All-Source
Collection Manager
Internet
Specialist
Commercial
Online Expert
Primary
Research
External
Contracts
All-Source Analyst/
Presentation Manager
43. Seven Tribes (Eight)
Military
Law Enforcement
Business
Religions, Clans,
Labor Unions,
Citizen Observers
Academic
National
NGOs
Media
44. New Decision-Support Paradigm
OLD
• NGO’s Don’t “Do”
• Policy Over Intelligence
• Unilateral
• Mostly Secret
• Technical Emphasis
• Collection Emphasis
• One-language filter
• Mistakes hidden
• Short-term thinking
NEW
• Brahimi Report ++
• Intelligence Over Policy
• Multilateral
• Mostly Public
• Human Emphasis
• Analysis Emphasis
• Multi-lingual filters
• Mistakes acknowledged
• Long-term thinking
45. Open Source Intelligence I
Lessons of History
China, Islam, Ethnic, Etc.
I
Lessons of History
• Neither the
academics nor the
government have
done well here.
• We need to fund both
specialists in history,
and a massive
digitization project for
Chinese, Islamic,
other key histories.
46. Open Source Intelligence II
Multinational Burden Sharing
II
Global Coverage
Cost-Sharing with Others--
Shared Early Warning
• No one has the time,
money, or ability to
cover the world.
• We must find new
means of sharing the
burden of collection,
translation, digitization
of global open sources
in 33+ languages.
• The Internet is vital.
47. Open Source Intelligence III
Leveraging the Private Sector
• We must establish
open protocols for
linking and leveraging
the other tribes:
military, law
enforcement,
business, academic,
NGO-media, and
religious.
• A global intelligence
federation is needed.
III
National Intelligence
Harness distributed
intelligence of Nation
50. Enhancing Performance I
Data standards and sharing matter
Open
Human
It’s the
back and
forth
that
allows
DNA to
define
life.
• From north to south,
east to west, if the
information is not
entered digitally and
according to some
agreed upon
standard, it will not
be shared and will
not contribute to UN
early warning or
decision support.
Imagery
Signals
Tip of the hat to the Director of the NIA in South Africa for this important insight.
51. Enhancing Performance II
24/7 Geospatial “Plot” is Vital
• There is no substitute
for a 24/7 watch
center that has a
geospatial “plot” and
can combine a
knowledge of
intelligence sources
with a real-world
depiction of locations,
vehicles, targets, and
individuals.
52. Enhancing Performance III
Fail in Isolation, Thrive in Combination
• We are our own worst
enemy.
• Compartmentation and
security are the enemy
of timely intelligence.
• Sources achieve their
greatest effect when
combined, not when
“Okay, so maybe I was wrong not isolated.
to tell you about my source--but
you should have told me first…...”
53. The Big Picture
Four processing quadrants
III - External Information
EXTERNAL
Data
Visualization
Expert Hires
“Just Enough,
Just in Time”
Business
Intelligence
Institutionalized
Local
Knowledge
Environmental Monitoring
Technology Monitoring
Customer Monitoring
TECHNICAL HUMAN
Vendor Reporting
INTERNAL
Organizational
Memory System
Heterogeneous
Search & Retrieval
Data
Conversion
Churning
(Rotationals)
Trip
Reports
Internal Reporting
Government Monitoring
CHUNKS
(Intellectual Property)
PERSONALITY
(Insight/Intuition)
Patents, Etc.
Trade Secrets
Meta-Data
Knowledge Capital™
Rolodexes/E-Mail
Personal Brand
Out-Sourcing of
Information
Processing
Project/Group
Management
Training
E-Commerce
Automated Analysis
Cell #
IV - Organizational Intelligence
I - Knowledge Management II - Collaborative Work
54. Processing Quadrant #1
Knowledge Management
• Know what you know
• Do not lose data,
insights, links
• Integrate people,
projects, vendors,
times, places, objects
• Optimize application
of technology to
internal information
INTERNAL
• Internal Reporting
• Vendor Reporting
• Project Management
• Data Conversion
• Automated Analysis
55. Processing Quadrant #2
Collaborative Work
• Human Capital
• Inherent in People
• Who They Know
• How They Know
• When They Know
• What They Do
• Who They Tell
• How They Feel
INSIGHT
• Employee Brand Names
• Rolodexes
• E-Mail Directories
• Cell Telephone Networks
• Trip Reports
• Rotationals
• Training
56. Processing Quadrant #3
External Information Acquisition
• Peter Drucker says
this (external) must
be the focal point for
the next 50 years of
innovation
• OLD: spend on
bodies & technology
• NEW: spend on
external information
services in all
languages, from all
sources, all the time
EXTERNAL
• Local knowledge
• Expert hires “just
enough, just in time”
• Customer monitoring
• Government monitoring
• Technology monitoring
• Environment monitoring
• Legal, ethical, open!
57. Processing Quadrant #4
Organizational Intelligence
• Data standards
• Data entry mandated
• Storage & retrieval
• Historical access
without legacy system
training
• Employee shoeboxes
integrated/not lost
MEMORY
• Intellectual Property
• Organizational Memory
• Meta-Data
• History of Information
• Electronic/Human Links
• Survive Human Turnover
58. Processing
Desktop:
Analytic Toolkit
Finished Intelligence and Reporting
Revision Tracking
and Realtime Group
Review
Publishing and
Word Processing
Collaborative
Work
Interactive Search
and Retrieval of
Data
Clustering and
Linking of
Related Data
Conversion of
Paper Documents
to Digital Form
Production of
Graphics, Videos and
Online Briefings
Structured
Argument
Analysis
Modeling and
Simulations
Detection of Alert
Situations
Notetaking and
Organizing Ideas
Desktop
Graphic and Map-
Based Visualization
Detection of
Changing Trends
Automated Extraction
of Data Elements From
Text and Images
Standardizing
and Converting
Data Formats
of Data
Statistical Analysis
to Reveal
Anomalies
Processing Images,
Video, Audio,
Signal Data
Automated
Foreign Language
Translation
Open Literature Non-Text Data Restricted Information
A
B
C
Eighteen
Computer-
Assisted
Capabilities
59. Processing Desktop
No Easy Solutions, Not Integrated
PPllaann
EExxtteenndd
I2 Analyst Notebook
**Plumtree Corporate Portal
EDGE?
RReeppoorrtt
SShhaarree
OSALAT
Excaliber
Copernic CCoolllleecctt
Topic
Analyst Workbench Identifier, SIFT,
OnTopic, Labrador
GMS, Athens
Aerotext
Intelligent Miner
For Text
AAnnaallyyzzee
Content Extractor
Information Portal,
Comprendium
ClearForest Suite
CrimeLink
**C-4-U Scout
**CI Spider
**Knowledge.Works
**Market Signal Analyzer
**E-Sense
**Corporate Intelligence Service
**TextAnalyst
**Powerize
**Strategy!
**Wincite
**WisdomBuilder
Groove?
** Previously reviewed in the Fuld & Co. Software Report
MindMap?
SYSTRAN+?
Other
CATALYST
Elements?
DARPA STRONG ANGEL?
Google
Silobreaker
60. USSOCOM OSINT TOOLS
• These are the specific products used now. They are not integrated.
• Collection: Copernic Pro (Internet search and download engine); Teleport Pro
(Internet spider); Convera Spider (Spider -- downloads all or selected parts of a
website); Inxight StarTree / Crawler (Internet web site relationship mapper)
• Process: Copernic Summarizer (Summarizes individual files); SummIT!
(Specialty summarizer embedded within Retrievalware and Semio); Convera
Retrievalware (Data indexing and free text search engine); Inxight ThingFinder
(Categorizing entity extractor, allows for determination of relationships between
known entities and unknown people, places, things, etc.); Semio Taxonomy
(Automatically put data into pre-determined taxonomies for methodological retrieval);
Apptek Machine Translation Database (Ibase / Ibridge) ((database for analyst
notebook)); Inxight Categorizer (Smart categorizer)
• Analyze: Convera Retrievalware (Data indexing and free text search engine);
Inxight ThingFinder (Categorizing entity extractor, allows for predetermination or
relationships between known entities and unknown people, places, things, etc.);
Semio Taxonomy (Automatically put data into pre-determined taxonomies for
methodological retrieval)
• Visualize: Webtas (Allows you to put data into a timeline with corresponding map
information); Analyst Notebook (De-facto standard product for link product
development but manual in nature— Talend Extract, Transform, Load (ETL) is
better tool); Spire (Visualization application with "terrain" map view of data; MapInfo
(Mapping package); ARCView / ArcIMS (Mapping package); Propeller (data linages
(primarily communications focused); Intranet Brain (Web site mapping); EnFish
Onespace (Indexing engine for analyst pc's
61. Rule 7
“Two levels down” is the new
standard
• Nation-states are old
targeting standard
• New standard is at
the province,
company, and
individual level
• This is a double order
of magnitude increase
in the difficulty of
being adequate
State Targets --
Lots of Assets
Organizational Targets --
Very Few Assets
Individual Targets --
Virtually No Assets
62. Rule 13
Cross-fertilization matters more
• Old approach:
consumer to analyst
to collector to
source--the linear
paradigm
• New approach is the
diamond paradigm
where collectors and
analysts help
consumers talk
directly to sources
Consumer
Collector Analyst
Source
63. Rule 15
Collaborative Work & Informal Deals Rise
• Intelligence collectors
and analysts will have
personal “brands”
• Peer to peer networks
will form quickly to
tackle new problems
• Electronic access
more important than
physical location
64. Rule 18
Collection doctrine more sophisticated
• FIND the data if you
already know it
• GET the data if it can be
gotten free from an ally
or NATO or the church
• BUY the data from the
private sector
• TASK organic collectors
as a last resort
FIND -- free, internal
GET -- free, allies
BUY -- low cost
TASK -- expensive
65. Rule 21
Strategic intelligence matters more
• Estimative
intelligence must be
restored as one of
the primary
objectives of analysis
• Intelligence must
support preventive
action (in advance of
the threat’s
maturing), and
budget trade-off
decisions
PAST FUTURE
NOW OPTIONS
66. Security Risk Assessment
• Political: History, Incidents, UNIFIL Vital
• Media: Local, Regional, International
• Security: Mission, Facilities, Units in Motion,
Individuals (Vulnerabilities & Mitigation)
• Important Points of Mention
– Place for anything not fitting template
– Distinguish between facts and opinions
• DIME: Diplomatic, Information, Military,
Economic (UN needs pro-active media strategy,
media play, good & bad, vital)
67. SRA Process and Stages
–Introduction
–Stage One: Programme Assessment
–Stage Two: Threat Assessment
–A. Situational Awareness
–B. Determination of Threats
–Stage Three: Vulnerability Assessment
–A. Vulnerabilities
–B. Strengths
–Stage Four: Risk Analysis
–Stage Five: Select Options
–A. General Options
–B. Improved Minimum Operating Standards (MOSS)
–Stage Six: Make Decisions
–A. Step One: Determine Priorities and Create a Timeline
–B. Step Two: Determine Funding and Resource Needs
–Stage Seven: Implementation
–Stage Eight: Review and Monitoring
A
B
C
1 2
3 4
1: Mission
2. Facilities
3. Movement
4. Individuals
A: Beirut
B. North
C: South
Remember: the Threat CHANGES Depending on the Level of Analysis
(e.g. Local versus Provincial versus National)
68. Amazon Could Be World Brain
All Information, All Languages, All the Time
Expert Forum
OPG
VPN
Weekly Review
One-Stop
Shop
Displaces
Intermediaries
& Triples Profit
Distance
Learning
Virtual
Library
Shared
Calendar
Virtual
Budget
Shared
24/7 Plot
Shared
Rolodex
Major Capabilities in India, Singapore, South Africa, Panama, Roving Collection Teams
69. 360° 24/7 All Languages….
UN Could Monetize Its Information
70. Become the Earth Intelligence Network
Tailored Decision-Support on Each Topic
Collect & Produce Real-Time Raw Information
Use Information to Stabilize & Enrich
71. Inputs: Twelve Policies Actualized in All Budgets at All Levels
Brazil
China
European Union
Indonesia
India
Indonesia
Venezuela
Wild Card(s)
Russia
USA
Outputs: Sustainable Solutions for Ten High-Level Threats
Solution: Peacekeeping Abandon the War & Transparent Metaphor & Reality-Secrecy, Based Move Budgeting
Directly to Information
Real-world
Real-time
Dollars & Sense
75. Political Compromise
• Implications for safety and security
• Forget about “national” analysis
• Focus on regions, tribes, clans, families.
• Grasp history as a foundation.
• Visualize competing equities.
• Value transparency and integrity.
• The UN System must always be perceived
as moral and free of bias.
76. Media Management
• Media is not just the broadcast “main”
media but also the Internet, sermons, and
other forms of narrowcast.
• Monitoring the media is an essential
aspect of situational awareness.
• “Spin” is misunderstood as manipulation.
The UN System must focus on getting its
message into all forms of media, this is a
vital aspect of “intangible” security.
77. Mandate & Mission
• The UN mandates and mission are
inherently flawed for lack of adequate
decision support, inclusive of a grasp of
history and a nuanced understanding of all
regional actors.
• Security comes from accuracy of
understanding, before and during the
mission.
78. Posture & Perception
• Posture defines perception. A lack of
clear communication to every actor of
relevance to the UN System is a death
wish.
• Posture is a message.
• Perception is the mission.
• Every action the UN System takes to
communicate its goodness, its good
works, is one less bullet, one less bomb.
79. Information Management
• The UN System is operating at less than
20% of capacity for two simple reasons:
– Lack of 100MB Internet access for every UN
employee at work and at rest.
– Lack of access to the 80% of the open source
information needed to be effective at the
strategic, operational (regional), tactical, and
technical levels.
• Information is security. Information is
efficiency. Information will define the UN
System of the future.
80. Operational Procedures
• The threat to the UN System is as follows:
• Internal bureaucracy and big egos/small minds
• Lack of full access to all relevant information
• Recalcitrant Member Nations
• Organized opposition groups
• Internal espionage from Member Nations
• Lack of employee training and situational awareness
• Lack of focus by managers at all levels
• Lack of funding or influence over external funds
• Information management can resolve all of
these deficiencies.
81. Physical Security
• Physical security of fixed installation is the most
tangible mission of DSS, and also the least
important.
• Virtual security is much more important and
demands total situational awareness and total
efficiency.
• Morality, and the perception of the UN System
as unbiased and totally for the good of the
community being served, is the ultimate security.
82. Technical Security
• Defensive surveillance detection, and
especially alert human intelligence able to
observe and detect hostile surveillance of
UN System sites and individuals, is the
single most essential function of DSS.
• Technical surveillance detection requires
both constant audio-visual coverage, and
constant human and technical review of
the captured images and sounds.
83. Human Intelligence
• DSS is best served by having the most
intelligent, dedicated, and intuitive humans on
the planet.
• There is no higher moral duty than to serve
the UN System by protecting its missions,
facilities, movements, and individuals.
• Security is not about guns.
• Security is about minds in constant action.
84. Information Peacekeeping #1
Changing What Nations Spend Money On,
While Focusing $1T in Charitable Funding for
Ten Threats & Twelve Action Areas
• Public intelligence can
change public spending
priorities
• Less on military, more
on everything else
• Global intelligence can
create global security
forces and funds for
sustaining Earth and
Peace 0 500
Others
Russia
Europe
USA
Health
Culture
Education
Assistance
Intelligence
Diplomacy
Military
85. Information Peacekeeping #2
Changing When & How We Intervene
• Public warning can
change public policy
– More Prevention
– More Peacekeeping
– More Education
– More Long-Term Aid
– Less Corruption
– Less Censorship
We have a sacred duty.
“Inconvenient Warning” & “Warning Fatigue” Are Obstacles.
87. Information Peacekeeping #4
Changing How the World Views Intelligence
Expert Forum
Weekly Review
Distance
Learning
Virtual
Library
Shared
Calendar
Virtual
Budget
Shared
24/7 Plot
Shared
Rolodex
88. Information Peacekeeping #5
Changing the Strategic Focus
• Connectivity
everywhere
• Content is digitized
• Coordination of
standards and
investments
• C4 Security across all
eight tribes--public
safety at same level
as safety of secrets
89. Information Peacekeeping #6:
Creating Infinite Wealth for the Five
Billion at the Bottom of the Pyramid
• Representative Books:
– End of Poverty
– Fortune at the Bottom of the
Pyramid (Prahalad)
– Revolutionary Wealth
– Infinite Wealth
– Wealth of Knowledge
– Wealth of Networks
– How to Change the World
• Major Lecture:
– “Open Everything” at
http://www.oss.net/GNOME
• Today’s economy:
– Seven Trillion/Year
– Focused on 1B “Rich”
– Two Trillion Illicit
• Tomorrow’s economy:
– Ten Trillion/Year
– Focused on 5B Poor
– Transparent Budgets
Eliminate Corruption
– “Green” Capitalism
• “True Cost” Known
• Cradle to Cradle
• Re-Use Not Re-Cycle
90. Recommendations for Tribunal
• 100MB Internet access for every employee, at
work and at home, is vital to both security &
efficiency.
• Budget for outsourcing commercial decision-support,
e.g. threat evaluation of The Hague
(three groups: entrenched anti-Tribunal families;
potential host families for incoming terrorists;
and discreetly approached friendly families who
can provide Early Warning.
• Establish a 24/7 Watch Center with a widely-publicized
email address and telephone number
with Arabic speaker always on duty even if from
home.
91. Recommendation for UN
• The Coalition
Coordination Center is
immediately available as
the world’s first
multinational information
sharing and analytic
support center.
• All you have to do is get
each of your Missions to
the UN to raise the need
for such a center which
will not use secret
sources or methods.
92. United Nations
Early Warning, Multinational Information
Sharing, Decision Support
• Brahimi Report applies
• Secretary General needs
global decision support
network instead of 77 libraries
& isolated data bases
• Information can prevent
conflict, create stabilizing
wealth and possibly fund all
future UN operations through
monetization of information.
Hinweis der Redaktion
This is a summary of training I conducted in Beirut last August. A non-publicity clause applies.
This is a very serious depiction of how little we collect in the foreign affairs arena. One study of three countries suggests that we collect less than 10% of what can be known, in part because the only people with money to buy local knowledge are the spies, and they insist on treason as a condition for employment.
We are simply not serious about open sources of information, nor about information in foreign languages. To find 396 terrorist, insurgent, and opposition web sites, as OSS did in 60 days for under $60,000, required the ability to work in 29 languages including Catelan, Gaelic, Kurdish, Farsi, Urdu, and Pashto. If we can do this, CIA and NSA and the FBI should be able to as well. But they don’t have the leadership willing to change.
It gets worse. This is an official CIA depiction, from a study done in the late 1990’s, as to the relative cost and satisfaction derived from each collection discipline.
What is most noteworthy--and a major reason why we failed to “connect the dots” and prevent 9-11, is that there is no single place where it all comes together in digital form, with time and geospatial tags, such that we can automatically see patterns and detect anomalies.
Summing up: we collect less than 10% of what we should, process less than 20% of what we collect, with the result that Washington is operating, at best, on 2% of the relevant and available foreign affairs information.
This is the DSS Mission Statement. Note that in addition to security of all UN programmes and activities, DSS is also mandated with the mission of enabling the most efficient conduct of all programmes and activities.
This is why I believe that DSS Lebanon is the very first element of the entire UN System to recognize that information is a core enabler of both security and efficiency; what we do here could be of great value to the rest of the UN System. We will focus locally and share globally.
In my UN career, I have been focused on Threat Risk Assessments. The attack on the UN in Baghdad was our 9-11. In my personal view, the UN has been complacent about risk, and we have not developed the necessary capabilities to use information to identify, prevent, or reduce risk. At the same time, much of the information relevant to risk—and the analytic methods—are also relevant to UN System effectiveness. It is our duty to share this information with other UN elements, and in the process of improving DSS global information access and analytics, to contribute what we learn to the UN System.
If we are to be effective in the DSS Mission world-wide, we must help DPA, DPI, DPKO, and all other elements of the UN System by enabling information sharing and information acquisition in support of safe and efficient mission accomplishment.
Today we have brought together six distinct elements of the UN System focusing on Lebanon and the immediate region around Lebanon.
I want to emphasize to all of you that this orientation course will help you understand the posture of the UN, the perception of the UN in all its elements, and the Political Compromise that is the essence of how the UN achieves its missions.
We deal in the fundamentals of food & water, shelter, clothing, education, and security. Nothing about any of these is secret—UN blue is open, transparent, accountable, and responsive to the concerns of all parties.
JOC/JMAC is a useful model, at the same time that Open Source Intelligence (OSINT) units are being created by Member Nations. It is my intent that we use this orientation training to enable you, the Class Before One, to begin developing a UN System Handbook for Early Warning, Multinational Information Sharing, and Decision Support.
These are the nine pillars of vulnerability mitigation. While Mr. Steele has been asked to address these in a narrow mission-relevant context, and that will be toward the end of this summary briefing, he will also, because you are the Class Before One, address strategic and regional aspects of early warning, multinational information sharing, and decision-support.
The word “Intelligence” as used by the Brahimi Report and the Military Advisor to the SG is not a dirty word—used properly, it is about decision support using open, legal, ethical sources and methods.
Mr. Steele resumes speaking.
I was both shocked and honored when I was invited to bring my past 20 years of effort before you. When UNIIIC Lebanon approached me, they had already developed the idea of IOSAS—an integrated open source analytical support capability.
Here to the right you see the concept that I developed years ago in partnership with Dr. Patricia Lewis, Director of UNIDIR, and MajGen Patrick Cammaert, RN NL, then Military Advisory to the Secretary General. Although I am unknown to most subordinates in the JOC/JMAC process, I am deeply proud of the small role that I played in helping two UN seniors pursue decision-support initiatives in the last six years.
Now the time has come for me to totally subordinate myself to the United Nations, to become UN blue, and to help the UN in any way that is authorized. I have carried the load these past 20 years. Now that load must be carried by DSS and the UN and I will do whatever I am asked to do to help the UN and DSS.
My work for you here is covered by a non-publicity, non-disclosure, non-compete clause in my contract. I have no desire to sell the UN anything. I do have a very strong desire to learn how to be UN blue and to help the UN achieve its security and efficiency objectives from within.
The goal of this training initiative is to begin the process of devising ways to efficiently and effectively navigate and integrate the broad spectrum of legally and ethically open source information that is not now readily available to to the UN, nor now exploited in support of UN security and efficiency.
This is our training plan, but I wish to emphasize that because you are the Class Before One, the pioneers, this schedule is completely flexible.
At the suggestion of our training sponsor, Mr. Leo Powell, I have agreed that for the next 30 days, any questions you might have are to be answered and integrated into our final training report.
This training provides you with 40 hours of knowledge, but you must take the initiative in the next 30 days, and in the rest of your career, to use this knowledge in support of UN System security and efficiency.
I will help you create the provisional UN Handbook.
You are the Class Before One. This is a very significant honor. Twenty years from today, you will all know one another and you will all be recognized, across the UN System, as pioneers. The future of the UN begins today with you.
There is plenty of money for peace and prosperity. The USA spends well over half of all monies for waging war, including enormous sums in military assistance to selected countries in the Middle East. Apart from this money, $1 trillion a year in charitable giving can be influenced by a UN information strategy.
It is my view that information—public information in all languages—is already changing the balance of power across the planet. Elites with secret budgets are being brought to order by publics demanding transparency and accountability. The UN can accelerate this trend if it wishes to do so.
Secrecy and Openness, War and Peace, have been facing off since time immemorial.
General Tony Zinni, USMC (Ret), former Commander of the US Central Command, tells us that only 4% of his command knowledge came from secret sources and methods. 96% came from open sources that neither the US Government or any other government can claim they own. Most governments ignore the value of open sources of information that can be shared.
This is the moment in time when the UN can get a grip on open sources, and be the world leader in applying information as a means of preventing conflict, resolving conflict, addressing the ten high-level threats, and creating stabilizing wealth.
The UN could even monetize information, and eventually be free of obligation to Member contributions.
We have the advantage. Regardless of who is in office, We the People are now paying attention and demanding citizen-centered democracy and moral capitalism.
The United Nations can use budget transparency to eliminate corruption and to appeal directly to national publics for shifting spending from waging war to waging peace.
This Information Advantage is what has been missing from the UN System since its inception.
The future is here now, and it is about bottom-up multi-cultural decisions that are based primarily on shared open sources of information, not secrets, and that focus specifically on achieving sustainable long-term agreement.
Paul Hawkin and his colleagues at the Natural Capital Institute have nailed it. I believe the United Nations can use the research and posting of “true cost” information about any product or service, to move the entire planet toward green sustainable economics.
This is all it takes to be a node for the World Brain. I consider Google predatory, and also very insecure. I’m waiting for CISCO Application Oriented Network to allow me to store my personal information in my personal router, under my control, at the same time that we implement Doug Englebart’s Open Hypertextdocument System (OHS) so that we can link at the paragraph level, while allowing all data to carry geospatial as well as reputation attributes. I am trying to get Amazon to offer all eight of these functionalities and unite its authors into global expert councils at the same time that if helps its readers organize local Wisdom Councils.
As a professional with 30 years experience, including the privilege of being the co-founder of the Marine Corps Intelligence Command, I am often frustrated by the obsession that we have with secrecy. I will tell you what I have learned in the past twenty years. I have learned that 96% of what we call intelligence is not secret and 70-80 percent is unrestricted and can be shared. These pie charts depict my view of what is share-able among the seven tribes without any attention to restricted, private, or secret information. We are not going for the green, and we need to. The United Nations can become the world leader in early warning, multinational information sharing, and decision support, and this can be monetized to free the UN from reliance on Member Nation financial contributions, while the UN also uses knowledge to influence how $2 trillion a year in charitable giving and foreign assistance is applied to the ten high-level threats to humanity identified by the UN High-Level Threat Panel.
With this slide I am offering you a strategic perspective on your potential as information warriors. The book “No Logo” has it exactly right—if we all attach ourselves leech-like to a threat, a policy, a player, or to an organization, or product or service or locality, we can use information to clean house.
Ours is a uniquely moral and peaceful endeavor. We also represent mankind’s last hope.
This is my new idea. I have an eight-page flyer posted in the About section of the Earth Intelligence Network, and would be grateful for feed-back. At www.TheTransitioner.org you can see the early efforts to link expert authors with foundation money.
By harnessing volunteers and sharing this as a tool—this is to the digital era what the printing press was to the industrial era—we empower billions of people around the world, in all languages, so that they can create stabilizing wealth and thereby achieve global peace.
A book is coming out shortly be Medard Gabel, who will build the EarthGame, entitled Seven Billion Billionaires. We know how to do this.
On a more practical note of immediate value to your needs today as you do analytic support….
OSS used to spend $150,000 a year on this capability. Now it has been commoditized, and it is available to you for free now, and if the UN does not buy the company outright, or make deal for global access, you can pay $400 a year for the service when it is released as a finished online product and service.
Instead of spending a day searching for stuff, you can have the key facts, maps, quotes, stories, and photos instantly sorted in a 360° view, saving hours of your time that can be better spent on analysis in your own context.
About five years ago I was invited by the NATO N-2 to brief 66 generals, admirals, and a few colonels, each respectively responsible for their national military intelligence organizations. This was all NATO countries, the Partnership for Peace countries, and the Mediterranean Dialog countries.
Like the UN, NATO has long been dependent on Member Nations for “intelligence” or decision support. I believe that because 96% of the relevant information is not secret, that the UN can become completely free of Member Nations information contributions, and become a provider of early warning, multinational information sharing, and decision support for every aspect of the UN System as well as supported Member Nations.
It was my great privilege to publish and co-edit this book, the first book ever on Peacekeeping Intelligence. Major General Cammaert, RN NL, who appears on the cover, used his tenure as Military Advisor to the Secretary General to establish the Joint Military Analysis Center project, and with others, also the Mission-oriented Joint Operations Center.
This book has been on display in the lobby of 1 UN Plaza since its publication, and is also for sale in the UN Bookstore.
I believe General Cammaert to be supremely qualified to be the first ASP for Decision-Support and hope that before he leaves us, Sir David Veness will create this position within DSS.
The Class Before One is a vanguard. You are the pioneers, within the DSS construct and via informal sharing and discussion, who will create the draft United Nations Handbook for Early Warning, Multinational Information Sharing, and Decision Support.
This handbook will be a living document that will be expanded over time to apply to every UN System mission area. I am creating a password-access wiki and entering the basic information as soon as I return, after which it can take on a life of its own.
In the meantime, here are two references. I have brought over 650 world-class speakers, including Peter Fuchs, then Director General of the International Committee of the Red Cross, together with 7,500 individuals, including the good people who created the Open Source Intelligence Branch in the Intelligence Directorate of Scotland Yard. From Sir David Veness to Detective Constable Steve Edwards, they were honored by the Queen recently for using open sources to put terrorists and arms merchants into jail faster, better, cheaper.
Analysis that produces Early Warning and Decision Support is a profession that demands Multinational Information Sharing in order to be effective.
The good news is that good analysis can be done using only legal, ethical, open sources and methods.
Search the web for “Analytic Tradecraft” to explore what has been published in this area. The seminal work by this title has been written by Jack Davis, and is easily accessible via the URL shown here.
Although I have been leading the world of open source information for twenty years, and helping a few very senior leaders in the United Nations for the past five years, it was not until the United Nations High-Level Threat Panel published its findings, a list of the ten threats to humanity in priority order, that I was inspired to conceptualize the United Nations as the leading global practitioner of what I call Information Arbitrage: converting information into peace and prosperity.
Since the ten high level threats can be addressed predominantly with open source information, it continues to astonish me that the UN, NATO, and the Member Nations still avoid establishing a global grid to use openly available low-cost and free information to address the ten high-level threats so that we might achieve a world of peace and prosperity—stabilizing prosperity.
For this reason, I am deeply impressed by the initiative and intellect of UNIIC in Lebanon, and with your help, we are beginning the long-term process of empowering and enhancing all UN System elements with early warning, multinational information sharing, and decision support.
Similarly, while not officially defined by the UN, there are twelve action areas that can be addressed at the strategic, operational (regional), tactical, and technical levels using only open sources & methods.
Let me be very clear: I believe that if the UN can develop a global strategy for prioritizing needs in the twelve action areas as related to the ten high-level threats to humanity, that it can mobilize, influence, and even direct $1 trillion per year in charitable giving, and another $1 trillion per year now spent on war instead of peace.
I am deeply sympathetic to the concern of analysts who are able to provide Early Warning, and realize that their leadership may not listen, understand, or act.
You cannot do it all. Here I depict what DSS can do for the UN System’s security & efficiency by creating Integrated Open Source Analytical Support (IOSAS) now, and—eventually—a global United Nations Open-Source Decision-Support Information Network (UNODIN) that fully integrates and enhances Multinational Information Sharing to achieve Early Warning and Decision Support for all UN and Member Nation missions related to peace, especially stabilization & reconstruction missions where the Civil Affairs organizations can play a special role in applying information to create wealth and thereby produce peace.
I am often asked to distill the elements of the analytic challenge into one slide, and this is it.
Your first responsibility is to evaluate and communicate the probability of worst case to best case scenarios relevant to UN System security and efficiency.
Your second responsibility is to evaluate the casualty potential of threats to the UN System, in order to support decisions about investments in security and operations.
Finally, and this is the most difficult and most rewarding aspect, you must evaluate and communicate how enemies of the UN System might achieve surprise.
I am indebted to the UNIIIC Security Arabic desk officer for challenging me to evaluate the 14 August 2007 Hezbollah statement.
This single page represents discrimination, distillation, and delivery of the meaning that I as a 55-year old analyst derive and wish to communicate to my boss.
I evaluate the statement as very high in credibility and probability. Based on my knowledge of the Iranian strategy and of Iranian capabilities in the region, I believe that “surprise” refers to actions against Israel and the US military, outside of Lebanon, and catastrophic in effect.
Israel is the volatile actor. The UN should discreetly implore the elected members of Hezbollah to return the two bodies with full honors to Israel, and to restore their participation in parliament. Iran is Persian—they will dominate this region, we should accept this and move on.
Peace in the Middle East requires two things: a 50-year strategic plan for the twelve policies and especially education and water; and a UN demand that all Member Nations in the region come together to create a Palestinian state separate from Israel. The Israeli “walls” in Palestine are in my opinion a crime against humanity, and Israel’s continued theft of water from Arab aquifers also an international crime. I place equal blame on the Arab nations for failing to respect the needs of the Palestinians. I know how to solve this. Terje Roed Larsen, with my decision support, can achieve peace and prosperity in the Middle East within twenty years, starting in Lebanon.
Analysts are now, and will always be, special.
Human analysts with computer-assisted analytic tools are the only means of making sense of the flood of information available, in order to discover, discriminate, distill, and delivery to the decision maker actionable intelligence, also known as decision support.
We do not have the time for a year-long course on analysis, but this is one concept I want you to understand.
The threat changes depending on the level of analysis. I will use Libyan tanks as an example.
At the technical level, they are the best tanks the Russians can provide, and a high threat. At the tactical level, the individuals are not well trained, the tanks have been cannibalized for parts, and they are stored in the open. At the operational level, there are many of them and they can have a negative effect even with the tactical deficiencies. At the strategic level, they cannot be sustained in combat for more than a few weeks, and are therefore irrelevant.
HIGH LOW MEDIUM LOW. Four different threat levels depending on the level of analysis.
There is a great deal of information on all aspects of open source information exploitation at www.oss.net, for now I just want to illustrate one concept, that of a mission or force analysis cell.
Everyone on the planet works for you, you simply have to learn how to identify who knows, reach them, and obtain the information.
This is a six-person decision-support cell that can meet the needs of any mission, any force, regardless of its size. The magic is in the formula: the best (few) people; the best technology, and one third of the budget for out-sourcing to obtain “just enough, just in time, exactly right” open source and analytic support services.
You are MANAGERS, not “workers.” Ideally you help all UN employees improve their own security & efficiency by showing them the key sources they can exploit but not find. My rule of thumb is that every employee should be an analyst but not spend more than 15 minutes looking for any source. The cell shown here should be responsible for finding sources in under an hour. If it takes more than an hour, it should be out-sourced to one of the tens of thousands professional Information Brokers such as the members of the Association of Independent Information Professionals (AIIP).
The grave error that most national “intelligence” communities make is that they confuse secrecy with intelligence, and do not respect the breadth and depth of information that can be acquired from the other seven (now eight) tribes of intelligence.
The United Nations, as an open, legal, ethical organization, has an opportunity to “capture” the 96% of the information that is not secret, and to achieve its objectives by leading the way in both multinational information sharing, and in harnessing the distributed intelligence of the eight tribes. Information Peacekeeping is going to earn a Nobel Prize one day. The United Nations should earn that prize by leading us all using information arbitrage to achieve peace and (stabilizing) prosperity.
We are entering a new era in which war and peace are defined by information, by brains, not by firepower.
The old paradigm has all of the flaws listed here. The new paradigm, and I am extremely respectful of the Honorable Brahimi, is the complete opposite of the old paradigm.
Understand me clearly: Leo Powell’s concept of an integrated open source analytical support element is both brilliant, and legal, ethical, and open. It could enhance the DSS mission by a factor of 1000 to 10,000.
My second book, THE NEW CRAFT OF INTELLIGENCE: Personal, Public, & Political, lays out the future of intelligence as I believe the citizen-taxpayer must insist it be.
Specifically, we can no longer afford to ignore either history or the historical statements of other players in their own languages.
Specifically, we must devise a means of sharing the burden of monitoring all open sources in all languages all the time.
Specifically, we must harness the considerable knowledge we have in our private sector.
As a former spy, and as one of the founders of the Marine Corps Intelligence Command, I am often frustrated by the obsession that we have with secrecy, and with intelligence. I will tell you what I have learned in the past sixteen years. I have learned that 90% of what we call intelligence is not secret; and I have learned that at least 70% of what we need to know and need to share is not intelligence. These pie charts depict my view of what is share-able among the seven tribes without any attention to restricted, private, or secret information. We are not going for the green, and we need to.
I urge you to use www.oss.net/BASIC to access and digest my 15 lectures.
DSS can and should create a global data sharing standard that includes total encryption of all information when “at rest.”
This means that the UN can utilize public communications because all of its information is totally encrypted in the “data at rest” mode, and visible only when on the screen of an authorized user.
Given the number of laptops, flash drives, and external drives that are lost every day, this is a vital part of enhancing UN System Security.
I want to emphasize to you that the fastest way for the UN System to improve both its security and its efficiency is to do three things:
Every mission must publicize for the public a 24/7 number that a human answers, to receive any early warning of threats to the UN.
A geospatial plot allows all UN mission elements to “control” their own information while sharing with all other UN elements.
Every UN employee must have 24/7 access to the Internet at 100MB speed. This is a non-negotiable first step toward making the UN the world’s most important information collector, producer, and consumer, in order for the UN to achieve 360° security & efficiency.
I understand the UN culture. It is similar to other bureaucratic cultures. Information is treated as a good to be hoarded, rather than shared. Egos dominate over brains.
The fastest way to empower the UN and change the culture and begin to bring peace and prosperity to the world is to share information while demanding high speed Internet access.
If the UN will issue a legal ethical procurement request for comments, I am certain that CISCO, Amazon, Apple, Sun, and IBM could join with the STRONG ANGEL humanitarian assistance information team to define a global grid for early warning, multinational information sharing, and decision support. The Coaltion Coordination Center in Tampa could be the “brain of the firm” and Civil Affairs units all over the world could be supporting field representatives for sharing information that can enhance peace and prosperity at the neighborhood level.
We will not spend much time here. I want you to study on your own time, but these 40 hours we have together are going to allow you each to do 400 hours of self-study.
You are the Class Before One. That is a huge honor. You are the vanguard, the leaders.
Most governments and organizations are in Quadrant One, the most elementary of the four quadrants.
The “Digital Natives” (this includes many of you as UN employees and volunteers), are the pioneers for using technology to connect dots to dots, dots to people, and people to people.
The Class Before One is a step in the right direction that embodies security and efficiency through early warning, multinational information sharing, and decision support.
The single biggest mistake that most bureaucracies make, both Member Nation bureaucracies and non-governmental or international organizations, is to ignore external information.
Peter Drucker has given us our guidance. We must focus on Information instead of on Technology. This is simple: it is about you, the Class Before One, developing new ways of connecting dots to dots, dots to people, and people to people.
Our ultimate objective is to make the UN the most intelligent organization on the planet.
This requires that the UN be able to preserve the knowledge of every employee, forever.
A simple example: today’s “Rolodexes” generally have a name and a number. They do not have the history, context, or details of the contact and its relevance to the UN System. That is something we need to fix.
These eighteen functionalities are not available today, in part because Microsoft migrated and mutated its Application Program Interfaces (API) in order to deter third-party developers.
OSS is moving to Apple and Open Office Aqua, and we support the global open source software movement.
If the UN System were to announce its commitment to open source software, all of these functionalities would be available to every UN employee within five years.
The Defense Advanced Projects Agency (DARPA) has been sponsoring the STRONG ANGEL open source intitative, I believe they have a wealth of knowledge that the UN can harvest at no expense. I certainly recommend that DSS send observzation team to the next STRONG ANGEL.
These are the existing softwares. Selected elements of the UN use Groove. OSS does not like Groove because it is too hard to use and does not integrate third party softwares.
Total encryption for “data at rest” is now available, and this opens up for the UN the possibility of utilizing commercial Internet communications capabilities.
This is the list of what US Special Operations Command’s Open Source Intelligence Branch uses.
They are not integrated and are very labor intensive.
The next generation of tools is represented by Open Office Aqua on a Macintosh, and Talend Extract, Transform, Load (ETL) technology.
We can also do much better at outsourcing the manual work to lower cost labor pools while the visualization and analysis remains inhouse. That applies to language translation as well as data conversion.
I encourage you to review all of my lectures as listed at www.oss.net/BASIC. Here are just a few of the new rules for the new craft of intelligence or decision support.
It’s not about Nations anymore, it is about neighborhoods.
Adapt or die. Communicate and share, or die.
The UN System, like all other bureaucracies, is broken. The good people within this bad system must learn to work collaboratively and informally in order to save the UN System and make it more effective.
Most organizations know what they need to know, but cannot find that knowledge when needed.
Our goal in the next twenty five years is to help the UN find what it needs to know free, get what it needs to know free, buy what is needs to know at very low cost, and as a last resort, task organic elements to learn what it needs to know.
The mandates that the UN System creates are severely deficient in most case because the UN System lacks strategic intelligence. Similarly, the forces and agencies employed are lacking in efficiency and effectiveness because the UN System lacks operational or regional intelligence in advance of the force composition
An organized grasp of history, reality, and future opportunity can create options for peace and prosperity. The UN System can be much improved by creating an early warning, multinational information sharing, and decision support capability.
The Security Risk Assessment, or SRA, is a principal manifestation of the DSS role.
The exercise you will complete tonight, as devised by Leo Powell, will help you think about what information is missing, and how you might obtain that information with your new knowledge.
Remember that you can ask me questions at any time.
The current definition of the SRA, as a single document for a single country, can be improved.
Here in Lebanon I believe we need twelve distinct SRA’s, differentiating between the three regions (north, Beirut, south) and the four targets (mission, fixed, mobile, individual).
I created this slide in the early 1990’s and 18 years later the secret world still does not get it and the private sector is not paying attention.
We are in a strategic interregnum where the first major player—be it Amazon, Google, Wikipedia, or the UN System—to actually adopt all these ideas, will in my view become the unbeatable hub for a World Brain where every information transaction will yield a profit.
This is the most talented librarian and open source researcher on the planet. His name is Arno Reuser and he is in charge of the Dutch military intelligence open source unit.
The Dutch Parliament, in the 1990’s, directed that all threats must be studied first with open sources, and that other methods can only be used if open sources are not sufficient. Around the world, organizations are discovering that up to 96% of their needs can be met with information at very low cost.
It is my personal view that the UN can monetize its existing publicly-releasable information by making it available to an information service that can pay for the information with sense-making and royalties.
This is a strategic depiction of how the UN might seek to influence $2 trillion a year in spending on the twelve policies addressing the ten threats and helping the eight big players avoid the mistakes of America and Europe. This could be the basis for a pilot project among Amazon, CISCO AON, and IBM as well as OSS and the Earth Intelligence Network, a new non-profit.
You can see daily feeds, weekly summaries, and forecasts combined with weekly histories for each of these thirty topics, at www.oss.net and also www.earth-intelligence.net. Now imagine if the UN had a prioritized budget for each of these, using UN decision support to influence charitable giving and government assistance to less fortunate Member Nations.
If a major information company can integrate global information, including numbers, and join with IBM in doing massive sense-making, then we have an opportunity to create marketable profitable public intelligence in the public interest.
I even envision a “Moody’s” that rates governments and corporations by their information transparency as well as their information responsibility.
The UN could have enormous influence beyond its own budget if it creates this kind of decision support visible to the public.
The fastest way to improve our common understanding of regional challenges of common concern—from terrorism, piracy, and crime, to corruption, refugees, starvation, poverty, and other stimulators or consequences of ungovernability, is to establish regional information centers with American money and coalition talent. Such centers can begin with open sources, and rapidly expand to include integrated clandestine and technical collection teams. Each regional theater command could and should seek funding from USDI for a regional early warning & information sharing network.
In my view, the DSS leadership associated with the Tribunal is the single best point from which to develop a pilot program for UN System security and efficiency stemming from global near-real-time access to all information in all languages.
In my view, the single fastest way to improve UN security and efficiency is to fund a policy that guarantees every UN employee with 100MB reliable Internet access 24/7.
In my view, the UN should also consider using money budgeted for unfilled positions to outsource all risk assessments while also expanding the SRA to distinguish between mission, fixed sites, movement, and individuals, and also distinguish between capital cities and provincial areas.
It has been my privilege for several years to be the primary provider of legal ethical open sources to the U.S. Special Operations Command and the U.S. Central Command, both based in Tampa.
I have discussed with both of those organizations the value of converting the existing coalition coordination center into a Multinational Information Sharing Activity that could also provide legal ethical analytic and decision support to all peacekeeping and humanitarian assistance missions. All the UN has to do is ask the senior American military officer at the UN to arrange for a visit to Tampa to inquire of these two commands their interest in exchanging full access to unrestricted UN information in return for the CCC/MISA receiving a mandate to provide direct analytic and decision support to all UN Forces and Agencies.