Three-Day%20Information%20Sharing%20 - PowerPoint PPT Presentation

View by Category
About This Presentation
Title:

Three-Day%20Information%20Sharing%20

Description:

... movement and all the true mujahideen, pledge to God to avenge our brother's ... All (67) | News (67) | Reports (0) | Blogs (0) | Audio/Video (0) | Fact Sheets (0) ... – PowerPoint PPT presentation

Number of Views:116
Avg rating:3.0/5.0
Slides: 78
Provided by: RobertDav1
Category:

less

Write a Comment
User Comments (0)
Transcript and Presenter's Notes

Title: Three-Day%20Information%20Sharing%20


1
Three-Day Information Sharing Analytics
Orientation www.oss.net www.earth-intelligence.
net Words for Each Slide in Notes
2
Security Risk Assessment
Security Risk Management Report United Nations
System in Lebanon
If and when the United Nations chooses to accept
the US Department of Defense offer to fund the
office of an Assistant Secretary General for
Decision Support, this is the notional briefing
that we would use to begin training toward the
day when every element of the United Nations
System is a collector, producer, and consumer of
legal ethical decision support information and
analysis.
3
DSS Mission Statement
  • The Department of Safety and Security is
    responsible for providing leadership, operational
    support and oversight of the security management
    system to enable the safest and most efficient
    conduct of the programmes and activities of the
    United Nations System.
  • Observation Information is the modern means for
    achieving security, both for protection of UN
    personnel, facilities, organizations, and
    missions, and for the host member states and
    indigenous or migrant populations.

4
DSS Deficiencies of Concern
  • Threat Risk Assessments are delayed incomplete
  • Threat Risk Assessments do not reflect 360 UN
    System view nor regional/adjacent threat
    information
  • Threat Risk Assessments do not have a
    well-founded directory of Indicators,
    Accelerators, and Triggers relevant to UN System
    security.
  • UN Missions individual UN agencies or forces
    have no integrated decision-support mechanism
    helpful to one and all.
  • UN System has no global directory of sources with
    defined biases, sponsors, or agendas.
  • UN System is not perceived as having an effective
    but totally moral, legal, ethical information
    system helpful to both the UN System Host
    Government.
  • UN System does not have safe, efficient, or
    reliable (constant) means of sharing helpful
    information across all UN System boundaries
    (agencies, countries, missions, locations)
  • UN System information is not efficiently
    acquired, exploited, or shared
  • UN System has no means for identifying relevant
    sources, softwares, and services for
    multinational information sharing and internal
    analytics.
  • UN System is not recognizing information as a
    major contributor to security.

5
DSS Host Overview
  • We Must Connect
  • DPA
  • DPI
  • DPKO
  • DSS
  • All Other
  • Participating Groups
  • UNIIIC
  • UNIFIL
  • ESCWA
  • DSS
  • UNTSO
  • UNDOF
  • Three Ps
  • Posture
  • Perception
  • Political Compromise
  • Fundamentals
  • Food Water
  • Shelter
  • Clothing
  • Education
  • Security
  • JOC/JMAC useful model
  • Member Nations creating Open Source Intelligence
    units (e.g. Scotland Yard) that have been very
    effective in achieving improved security.

Sharing Legal Ethical Information Can Enhance
Security Performance for All
6
Nine Pillars of Vulnerability Mitigation in UN
System Security
  • POLITICAL COMPROMISE
  • MEDIA MANAGEMENT
  • MANDATE MISSION
  • POSTURE PERCEPTION
  • INFORMATION MANAGEMENT
  • OPERATIONAL PROCEDURES
  • PHYSICAL SECURITY
  • TECHNICAL SECURITY
  • HUMAN INTELLIGENCE (Defensive Passive
    Counter-Surveillance, Surveillance Detection, NOT
    Offensive Penetration)

InformationOpen, Legal, Ethical Informationis
the Essential Means for Mitigating All Nine UN
System Vulnerabilities While Also Contributing to
UN System Efficiency in Every Organization, at
Every Level, for Every Function and Mission.
7
Conceptual Opportunity
  • IOSAS
  • Integrated
  • Open
  • Source
  • Analytical
  • Support
  • UNODIN
  • United
  • Nations
  • Open-Source
  • Decision-Support
  • Information
  • Network

Mission Joint Operations Centers and Force Joint
Military Analysis Centers exist now, at an
elementary level as conceptualized by MajGen
Cammaert. Our endeavors will over time
dramatically improve both JOC JMAC concepts,
doctrine, manning, equipping, training,
outsourcing, sourcing, analytics. Our
objective over the next 20 years is to establish
a global grid that makes the UN System the
worlds best Early Warning, Multinational
Information Sharing, and Decision Support
capability in support of peace and prosperity.
Information should be the nerves, blood, and
brain of the UN System.
8
Goal of the Training Initiative
  • The goal of this training initiative is to find
    ways to efficiently and effectively navigate the
    broad spectrum of open source material available,
    and to integrate pertinent elements of the 80
    into the 20 available from currently recognized
    national and UN sources into an Integrated Open
    Source Analytic Support (IOSAS) mechanism.
  1. Host Country National/Military Security,
    Diplomatic Missions
  2. UNDSS, DPA, DPI, Other UN Agencies, Other NGO

9
Three-Day Plan
  • Thursday
  • Introductions of Participants
  • Strategic View of Multinational Information
    Operations
  • Discussion of Two Online Guides with Links
  • www.oss.net/BASIC
  • www.oss.net/LIBRARY
  • Discussion of Current Event Information
  • Participant Identification of Top Issues for
    Discussion
  • Sources Methods (eg NATO)
  • How to Create a Wiki for Any Mission (eg30
    ExpertWiki)
  • NOTE This gathering has three purposes
  • To introduce six UN Lebanon groups to one another
    in person for improved sharing support.
  • To identify global online and offline resources
    immediately available, free, to all
    participants. their colleagues
  • To begin the process, with this Class Before
    One of defining how best to enhance UN access to
    and exploitation of multinational information
    among DSS, DPA, DPI, IM.
  • Friday
  • Sources
  • 24/7 Call-In Number
  • Eight Sharing Tribes
  • Source Directory
  • Belief Systems
  • Financial Sources
  • Subscription Sources
  • Password-Protected
  • Methods
  • Internet Speed
  • Online versus Personal
  • Cultural Factors
  • Creating Flow
  • Forecasting
  • Summaries Opinions
  • Indicators, Accelerants, Triggers (Share
    Improve)
  • Empowering Technologies
  • Ingestion
  • Saturday
  • Security Risk Assessment (Training Exercise)
  • Brief Senior Person from Each of Six UN Elements
  • Establish missing Essential Elements of
    Information (EEI)
  • Discuss the needs of senior officers (e.g.
    Commissioner, spokesperson for UNIFIL)
  • Open Dialog
  • Challenge Questions
  • Specify follow-up actions for instructor and for
    participants in next thirty days
  • Instructor to develop a proposed syllabus for UN
    DSS open source decision support information
    network (UNODIN) and with help from participants,
    a draft UN Handbook on Early Warning,
    Multinational Information Sharing, and Decision
    Support.
  • NOTE all opinions are personal and off the
    record.

10
Class Before One
  • A training conceptbefore the first official
    class, there is always a Class Before One that
    helps develop the need, the solution, and the
    presentation.
  • You are the Class Before One. Be very proud of
    this, each of you is a UN System decision-support
    pioneer.

11
(No Transcript)
12
Open Everything The Path to Peace Prosperity
  • Information Management is the center of gravity
    for UN System.

13
Public Advantage I
14
Public Advantage II
Sustainable Reality-Based Transpartisan Budgets
Localized Resilience
15
Public Advantage III
16
Public Advantage IV
17
Advantage II
Public Advantage V This is the real End Game
18
Future Vision for Global Information Sharing
Management
19
Organizations Fateh Al-Islam Al Qaeda
Gamaa al-Islamiyya Fatah Party Show
More Key Phrases Refugee Camp Terrorist Group
Martyrdom Allotment Show More Topics Civil
Disruption / Riots Democratization Land
Forces Territorial Disputes Show More Cities
Tripoli (Libya) Beirut Damascus ?Amman
Show More Countries Lebanon Syria United
States Israel Show More
Current Story Lebanon Fatah al-Islam No. 2
killed
Documents matching your search Documents  
Stories All (67) News (67) Reports (0)
Blogs (0) Audio/Video (0) Fact Sheets (0)
Documents Sort by Date Relevance While Gaza
burns Haaretz   08/21/2007
Quotes ...near the Palestinian refugee camp of
Nahr el-Bared where Fatah Islam militants have
been fighting Lebanese soldiers for more than two
months. "Cabinet was informed by Interior
Minister Hassan Sabei that Lebanese security
forces have killed the Fatah Islam's No 2 in the
Abu Samra neighbourhood" in Tripoli, Aridi told
reporters following a Cabinet meeting last night
08/07/2007 DDI News - Lebanon announces killing
Fatah Islam deputy commander The group said it
was bringing the 'good news to the Muslims of the
martyrdom of a noble brother,' according to the
statement. "We in the Fatah Islam movement and
all the true mujahideen, pledge to God to avenge
our brother's blood from the infidels and the
renegades" The authenticity of the statement,
posted on a Web site which commonly carries
messages from Al Qaeda and other militant groups,
could not be independently... 08/09/2007
FOXNews.com - Fatah Islam's No. 2 Killed by
Lebanese Troops
  • www.beta.silobreaker.com is the single best tool,
    free for now
  • Expect to pay 400 a year if UN does not make a
    special deal for all.
  • Instant 360 view of any topic, e.g. El Fatah
    al-Islam
  • Sense-making tools can be applied to both their
    content and yours.

20
(No Transcript)
21
Intelligence Decision Support
  • Intelligence is a process that creates
    decision-support.
  • It is NOT defined by secret sources methods.
  • The Brahimi Report, Military Advisors to the
    Secretary General, and The High Level Threat
    Panel all validate urgency of creating a UN/NGO
    global decision support and multinational
    information sharing network.

22
Orientation, Not Micro-Training
  • You will learn more on your own, and by sharing
    with one another, than can be taught here in
    three days
  • www.oss.net/BASIC has the primary links
  • www.oss.net/LIBRARY has 30,000 pages from 650
    speakers, this directory can be sorted and also
    searched
  • Consider viewing the lectures and movies first,
    especially the lectures on Analysis New Rules,
    and the movie on Creating the World Brain.

23
Analysis is a Profession
  • Four Ds
  • Discovery
  • Discrimination
  • Distillation
  • Delivery
  • If you do nothing else, read the Analytic
    Tradecraft booklet by Jack Davis, easily accessed
    online, free, via www.oss.net/BASIC.
  • Facts Are Not Enough
  • History
  • Cultural Context
  • Adjacent Players
  • Localized Indicators, Accelerators, Triggers
  • Sharing 24/7
  • Cast a Wide Net
  • Wild Cards Abound
  • Thinking Matters More Than Technology

24
Ten High-Level Threats
  • Poverty
  • Infectious Disease
  • Environmental Degradation
  • Inter-State Conflict
  • Civil War
  • Genocide
  • Other Atrocities
  • Proliferation
  • Terrorism
  • Transnational Crime

Every Mission Confronts These Ten Threats One Way
or Another Avoid Narrow Focus, Always See the
Forest, Not Just The Tree in Front of You
25
Open Sources Ten Threats
  • Economic and social threats including 95
  • poverty, 99
  • infectious disease and 95
  • environmental degradation 90
  • Inter-State conflict 75
  • Internal conflict, including 90
  • civil war, 80
  • genocide and 95
  • other large-scale atrocities 95
  • Nuclear, radiological, chemical, and
  • biological weapons (proliferation) 75
  • Terrorism 80
  • Transnational organized crime 80

On balance, open sources are more than adequate
to understand and address the ten high-level
threats, but the UN Systems Information
Management is not.
26
Twelve Action Areas
  • Agriculture
  • Diplomacy
  • Economy
  • Education
  • Energy
  • Family
  • Health
  • Immigration/Migration
  • Justice
  • Security
  • Society
  • Water

Every Mission Has Narrow Channels and Deep
Bureaucracies. Information Sharing is a Proper
Ethical Means for Enhancing Effectiveness. If Any
Action Area is Overlooked, Boss Needs to Know
This.
27
Analysis Cannot Do It All
  1. Improve Sources
  2. Improve Sharing
  3. Improve Analysis
  4. Improve Decisions by Supported Bosses

You
Everyone Else
28
Model for Analytic Purpose
29
Hezbollah, Iran, Regional Surprise Warning,
meaning, need, elsewhere
  • 14 Aug 07 News Release
  • Sheikh Hassan Nasrallah promises surprise if
    Israel attacks Lebanon again.
  • Hezbollah has not been disarmed15,000 rockets
    remain hidden (other source)
  • Lebanon divided, Israeli soldiers still captive,
    situation is volatile
  • Direct negotiations could help, truth
    reconciliation
  • Israel may not appreciate full extent of Iranian
    ability to provide supporting attacks, e.g.
    exploding buildings in Tel Aviv, cutting of US
    land supply line from Kuwait to Baghdad, Sunburn
    missile attack against Maritime Force.
  • Israel, not Iran or Syria, is the most likely to
    take unilateral violent action that will trigger
    the surprise.

Probability High Damage Very High Surprise
Strikes Outside of Lebanon, Not by Hezbollah
Israel 9-11 in Tel Aviv
30
Why Analysts Are Special
Complex Organizations are Drowning in
Information. Analytic Tradecraft, Applied by
Analysts, is the Solution.
31
Levels of Analysis Threat Changes!
This is very important. The threat changes
depending on the level of analysis, and the
threat is distinct, more on this shortly, in
relation to the UN Mission, fixed facilities,
mobile units, and individuals with both fixed
homes and mobile platforms.
32
Creating an Analysis Cell Central discovery,
distributed exploitation
  • Six people can leverage global open sources for
    an entire Ministry or Service or Command
  • This reduces duplication while increasing
    decision support to all bosses
  • Saves money and creates value that can be shared
    with host country and others

Senior All-Source Collection Manager
Internet Specialist
Commercial Online Expert
Primary Research
External Contracts
All-Source Analyst/ Presentation Manager
33
Seven Tribes (Eight)
Religions, Clans, Labor Unions, Citizen Observers
National
NGOs
Military
Media
Academic
Law Enforcement
Business
34
New Decision-Support Paradigm
  • OLD
  • NGOs Dont Do
  • Policy Over Intelligence
  • Unilateral
  • Mostly Secret
  • Technical Emphasis
  • Collection Emphasis
  • One-language filter
  • Mistakes hidden
  • Short-term thinking
  • NEW
  • Brahimi Report
  • Intelligence Over Policy
  • Multilateral
  • Mostly Public
  • Human Emphasis
  • Analysis Emphasis
  • Multi-lingual filters
  • Mistakes acknowledged
  • Long-term thinking

35
Open Source Intelligence I Lessons of History
  • Neither the academics nor the government have
    done well here.
  • We need to fund both specialists in history, and
    a massive digitization project for Chinese,
    Islamic, other key histories.

36
Open Source Intelligence II Multinational Burden
Sharing
  • No one has the time, money, or ability to cover
    the world.
  • We must find new means of sharing the burden of
    collection, translation, digitization of global
    open sources in 33 languages.
  • The Internet is vital.

37
Open Source Intelligence III Leveraging the
Private Sector
  • We must establish open protocols for linking and
    leveraging the other tribes military, law
    enforcement, business, academic, NGO-media, and
    religious.
  • A global intelligence federation is needed.

38
Enhancing Performance I Data standards and
sharing matter
  • From north to south, east to west, if the
    information is not entered digitally and
    according to some agreed upon standard, it will
    not be shared and will not contribute to UN early
    warning or decision support.

Tip of the hat to the Director of the NIA in
South Africa for this important insight.
39
Enhancing Performance II 24/7 Geospatial Plot
is Vital
  • There is no substitute for a 24/7 watch center
    that has a geospatial plot and can combine a
    knowledge of intelligence sources with a
    real-world depiction of locations, vehicles,
    targets, and individuals.

40
Enhancing Performance III Fail in Isolation,
Thrive in Combination
  • We are our own worst enemy.
  • Compartmentation and security are the enemy of
    timely intelligence.
  • Sources achieve their greatest effect when
    combined, not when isolated.

Okay, so maybe I was wrong not to tell you about
my source--but you should have told me first...
41
The Big Picture Four processing quadrants
42
Processing Quadrant 1 Knowledge Management
  • Know what you know
  • Do not lose data, insights, links
  • Integrate people, projects, vendors, times,
    places, objects
  • Optimize application of technology to internal
    information
  • INTERNAL
  • Internal Reporting
  • Vendor Reporting
  • Project Management
  • Data Conversion
  • Automated Analysis

43
Processing Quadrant 2 Collaborative Work
  • Human Capital
  • Inherent in People
  • Who They Know
  • How They Know
  • When They Know
  • What They Do
  • Who They Tell
  • How They Feel

44
Processing Quadrant 3 External Information
Acquisition
  • Peter Drucker says this (external) must be the
    focal point for the next 50 years of innovation
  • OLD spend on bodies technology
  • NEW spend on external information services in
    all languages, from all sources, all the time

45
Processing Quadrant 4 Organizational Intelligence
  • Data standards
  • Data entry mandated
  • Storage retrieval
  • Historical access without legacy system training
  • Employee shoeboxes integrated/not lost

46
Processing Desktop Analytic Toolkit
Eighteen Computer-Assisted Capabilities
47
Processing Desktop No Easy Solutions, Not
Integrated
Plan
Excaliber
Powerize
Collect
Copernic
Extend
C-4-U Scout
SYSTRAN?
Topic
CI Spider
Other CATALYST Elements?
GMS, Athens
E-Sense
Google
I2 Analyst Notebook
Aerotext
Corporate Intelligence Service
Knowledge.Works
Information Portal, Comprendium
OSALAT
Silobreaker
WisdomBuilder
Identifier, SIFT, OnTopic, Labrador
Analyst Workbench
CrimeLink
Plumtree Corporate Portal
Intelligent Miner For Text
Strategy!
TextAnalyst
Groove?
Wincite
Market Signal Analyzer
Share
EDGE?
ClearForest Suite
DARPA STRONG ANGEL?
Report
MindMap?
Previously reviewed in the Fuld Co. Software
Report
48
USSOCOM OSINT TOOLS
  • These are the specific products used now. They
    are not integrated.
  • Collection Copernic Pro (Internet search and
    download engine) Teleport Pro (Internet spider)
    Convera Spider (Spider -- downloads all or
    selected parts of a website) Inxight StarTree /
    Crawler (Internet web site relationship mapper)
  • Process Copernic Summarizer (Summarizes
    individual files) SummIT! (Specialty summarizer
    embedded within Retrievalware and Semio) Convera
    Retrievalware (Data indexing and free text search
    engine) Inxight ThingFinder (Categorizing entity
    extractor, allows for determination of
    relationships between known entities and unknown
    people, places, things, etc.) Semio Taxonomy
    (Automatically put data into pre-determined
    taxonomies for methodological retrieval) Apptek
    Machine Translation Database (Ibase / Ibridge)
    ((database for analyst notebook)) Inxight
    Categorizer (Smart categorizer)
  • Analyze Convera Retrievalware (Data indexing and
    free text search engine) Inxight ThingFinder
    (Categorizing entity extractor, allows for
    predetermination or relationships between known
    entities and unknown people, places, things,
    etc.) Semio Taxonomy (Automatically put data
    into pre-determined taxonomies for methodological
    retrieval)
  • Visualize Webtas (Allows you to put data into a
    timeline with corresponding map information)
    Analyst Notebook (De-facto standard product for
    link product development but manual in nature
    Talend Extract, Transform, Load (ETL) is better
    tool) Spire (Visualization application with
    "terrain" map view of data MapInfo (Mapping
    package) ARCView / ArcIMS (Mapping package)
    Propeller (data linages (primarily communications
    focused) Intranet Brain (Web site mapping)
    EnFish Onespace (Indexing engine for analyst pc's

49
Rule 7 Two levels down is the new standard
  • Nation-states are old targeting standard
  • New standard is at the province, company, and
    individual level
  • This is a double order of magnitude increase in
    the difficulty of being adequate

State Targets -- Lots of Assets
Organizational Targets -- Very Few Assets
Individual Targets -- Virtually No Assets
50
Rule 13 Cross-fertilization matters more
  • Old approach consumer to analyst to collector to
    source--the linear paradigm
  • New approach is the diamond paradigm where
    collectors and analysts help consumers talk
    directly to sources

51
Rule 15 Collaborative Work Informal Deals Rise
  • Intelligence collectors and analysts will have
    personal brands
  • Peer to peer networks will form quickly to tackle
    new problems
  • Electronic access more important than physical
    location

52
Rule 18 Collection doctrine more sophisticated
  • FIND the data if you already know it
  • GET the data if it can be gotten free from an
    ally or NATO or the church
  • BUY the data from the private sector
  • TASK organic collectors as a last resort

FIND -- free, internal GET -- free,
allies BUY -- low cost TASK -- expensive
53
Rule 21 Strategic intelligence matters more
  • Estimative intelligence must be restored as one
    of the primary objectives of analysis
  • Intelligence must support preventive action (in
    advance of the threats maturing), and budget
    trade-off decisions

FUTURE
PAST
NOW
OPTIONS
54
Security Risk Assessment
  • Political History, Incidents, UNIFIL Vital
  • Media Local, Regional, International
  • Security Mission, Facilities, Units in Motion,
    Individuals (Vulnerabilities Mitigation)
  • Important Points of Mention
  • Place for anything not fitting template
  • Distinguish between facts and opinions
  • DIME Diplomatic, Information, Military, Economic
    (UN needs pro-active media strategy, media play,
    good bad, vital)

55
SRA Process and Stages
  • Introduction
  • Stage One Programme Assessment
  • Stage Two Threat Assessment
  • A. Situational Awareness
  • B. Determination of Threats
  • Stage Three Vulnerability Assessment
  • A. Vulnerabilities
  • B. Strengths
  • Stage Four Risk Analysis
  • Stage Five Select Options
  • A. General Options
  • B. Improved Minimum Operating Standards (MOSS)
  • Stage Six Make Decisions
  • A. Step One Determine Priorities and Create a
    Timeline
  • B. Step Two Determine Funding and Resource
    Needs
  • Stage Seven Implementation
  • Stage Eight Review and Monitoring

C
B
A
1
2
3
4
1 Mission 2. Facilities 3. Movement 4.
Individuals A Beirut B. North C South
Remember the Threat CHANGES Depending on the
Level of Analysis (e.g. Local versus Provincial
versus National)
56
Amazon Could Be World Brain All Information, All
Languages, All the Time
One-Stop Shop Displaces Intermediaries Triples
Profit
Major Capabilities in India, Singapore, South
Africa, Panama, Roving Collection Teams
57
360 24/7 All Languages. UN Could Monetize Its
Information
58
Become the Earth Intelligence Network Tailored
Decision-Support on Each Topic Collect Produce
Real-Time Raw Information Use Information to
Stabilize Enrich
59
Inputs Twelve Policies Actualized in All Budgets
at All Levels
Brazil
China
European Union
Indonesia
India
Solution Abandon the War Metaphor Secrecy,
Move Directly to Information Peacekeeping
Transparent Reality-Based Budgeting
Outputs Sustainable Solutions for Ten High-Level
Threats
Indonesia
Russia
Real-world Real-time Dollars Sense
USA
Venezuela
Wild Card(s)
60
Political Compromise
  • Implications for safety and security
  • Forget about national analysis
  • Focus on regions, tribes, clans, families.
  • Grasp history as a foundation.
  • Visualize competing equities.
  • Value transparency and integrity.
  • The UN System must always be perceived as moral
    and free of bias.

61
Media Management
  • Media is not just the broadcast main media but
    also the Internet, sermons, and other forms of
    narrowcast.
  • Monitoring the media is an essential aspect of
    situational awareness.
  • Spin is misunderstood as manipulation. The UN
    System must focus on getting its message into all
    forms of media, this is a vital aspect of
    intangible security.

62
Mandate Mission
  • The UN mandates and mission are inherently flawed
    for lack of adequate decision support, inclusive
    of a grasp of history and a nuanced understanding
    of all regional actors.
  • Security comes from accuracy of understanding,
    before and during the mission.

63
Posture Perception
  • Posture defines perception. A lack of clear
    communication to every actor of relevance to the
    UN System is a death wish.
  • Posture is a message.
  • Perception is the mission.
  • Every action the UN System takes to communicate
    its goodness, its good works, is one less bullet,
    one less bomb.

64
Information Management
  • The UN System is operating at less than 20 of
    capacity for two simple reasons
  • Lack of 100MB Internet access for every UN
    employee at work and at rest.
  • Lack of access to the 80 of the open source
    information needed to be effective at the
    strategic, operational (regional), tactical, and
    technical levels.
  • Information is security. Information is
    efficiency. Information will define the UN
    System of the future.

65
Operational Procedures
  • The threat to the UN System is as follows
  • Internal bureaucracy and big egos/small minds
  • Lack of full access to all relevant information
  • Recalcitrant Member Nations
  • Organized opposition groups
  • Internal espionage from Member Nations
  • Lack of employee training and situational
    awareness
  • Lack of focus by managers at all levels
  • Lack of funding or influence over external funds
  • Information management can resolve all of these
    deficiencies.

66
Physical Security
  • Physical security of fixed installation is the
    most tangible mission of DSS, and also the least
    important.
  • Virtual security is much more important and
    demands total situational awareness and total
    efficiency.
  • Morality, and the perception of the UN System as
    unbiased and totally for the good of the
    community being served, is the ultimate security.

67
Technical Security
  • Defensive surveillance detection, and especially
    alert human intelligence able to observe and
    detect hostile surveillance of UN System sites
    and individuals, is the single most essential
    function of DSS.
  • Technical surveillance detection requires both
    constant audio-visual coverage, and constant
    human and technical review of the captured images
    and sounds.

68
Human Intelligence
  • DSS is best served by having the most
    intelligent, dedicated, and intuitive humans on
    the planet.
  • There is no higher moral duty than to serve the
    UN System by protecting its missions, facilities,
    movements, and individuals.
  • Security is not about guns.
  • Security is about minds in constant action.

69
Information Peacekeeping 1 Changing What Nations
Spend Money On, While Focusing 1T in Charitable
Funding for Ten Threats Twelve Action Areas
  • Public intelligence can change public spending
    priorities
  • Less on military, more on everything else
  • Global intelligence can create global security
    forces and funds for sustaining Earth and Peace

70
Information Peacekeeping 2 Changing When How
We Intervene
  • Public warning can change public policy
  • More Prevention
  • More Peacekeeping
  • More Education
  • More Long-Term Aid
  • Less Corruption
  • Less Censorship
  • We have a sacred duty.

Inconvenient Warning Warning Fatigue Are
Obstacles.
71
Information Peacekeeping 3 Changing Who Does the
Thinking the Deciding on Public Budgets
  • Public, not elites, must be the final judge of
    global security values
  • Public intelligence will enable public
    understanding/action
  • Berto Jongmans map is Reference A--we must all
    support him.

72
Information Peacekeeping 4 Changing How the
World Views Intelligence
73
Information Peacekeeping 5 Changing the
Strategic Focus
  • Connectivity everywhere
  • Content is digitized
  • Coordination of standards and investments
  • C4 Security across all eight tribes--public
    safety at same level as safety of secrets

74
Information Peacekeeping 6 Creating Infinite
Wealth for the Five Billion at the Bottom of the
Pyramid
  • Representative Books
  • End of Poverty
  • Fortune at the Bottom of the Pyramid (Prahalad)
  • Revolutionary Wealth
  • Infinite Wealth
  • Wealth of Knowledge
  • Wealth of Networks
  • How to Change the World
  • Major Lecture
  • Open Everything at http//www.oss.net/GNOME
  • Todays economy
  • Seven Trillion/Year
  • Focused on 1B Rich
  • Two Trillion Illicit
  • Tomorrows economy
  • Ten Trillion/Year
  • Focused on 5B Poor
  • Transparent Budgets Eliminate Corruption
  • Green Capitalism
  • True Cost Known
  • Cradle to Cradle
  • Re-Use Not Re-Cycle

75
Recommendations for Mission
  • 100MB Internet access for every employee, at work
    and at home, is vital to both security
    efficiency.
  • Budget for outsourcing commercial
    decision-support
  • Establish a 24/7 Watch Center with a
    widely-publicized email address and telephone
    number with language skills always on duty even
    if from home.

76
Recommendation for UN
  • The Coalition Coordination Center, 70 nations,
    teams of 3-6 military analysts, is immediately
    available as the worlds first multinational
    information sharing and analytic support center.

77
United Nations Early Warning, Multinational
Information Sharing, Decision Support
  • Brahimi Report applies
  • Secretary General needs global decision support
    network instead of 77 libraries isolated data
    bases
  • Information can prevent conflict, create
    stabilizing wealth and possibly fund all future
    UN operations through monetization of information.
About PowerShow.com