Top Banner
83

Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

Jan 30, 2018

Download

Documents

vuongtruc
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...
Page 2: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...
Page 3: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

Contents

Schedule....................................................................................................................................................1

Concurrent Breakout Sessions...................................................................................................................2

Breakout Sessions......................................................................................................................................5

1. Teaching Intelligence from a Student’s Perspective.................................................................5

2. Intelligence Instructor Competencies.........................................................................................5

3. Authors’ Roundtable....................................................................................................................5

4. Teaching Intelligence through Discovery...................................................................................6

5. Teaching Intelligence Online.......................................................................................................6

6. Teaching Structured Analytic Techniques................................................................................6

7. Teaching Critical Thinking.........................................................................................................6

8. Teaching Competitive Intelligence..............................................................................................6

9. Teaching Law Enforcement Intelligence....................................................................................7

10. Teaching Intelligence Technologies.........................................................................................7

11. Teaching Military Intelligence.................................................................................................7

12. Teaching Predictive Intelligence.............................................................................................7

13. Core Competencies for Analysts.............................................................................................7

Keynote Speakers......................................................................................................................................9

Speaker/Moderator Biographies..............................................................................................................11

IAFIE Outstanding Teacher Award 2009...............................................................................................21

Essay Contest..........................................................................................................................................23

Professional Category..........................................................................................................................25

Graduate Category...............................................................................................................................35

Undergraduate Category......................................................................................................................41

Conference Center Floor Plan.................................................................................................................49

Page 4: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...
Page 5: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

INTERNATIONAL ASSOCIATION FOR INTELLIGENCE EDUCATION

Fifth Annual Conference-“Teaching Intelligence”May 26 – 28, 2009

University of Maryland University College

Schedule

Tuesday, May 26

3:00 p.m. – 5:00 p.m. IAFIE Board MeetingRoom: 1105

Conference RegistrationRoom: Main Concourse

Wednesday, May 27

7:30 a.m. – 9:00 a.m. Registration Room: Main Concourse

Continental BreakfastRoom: Thai House

Technology ExhibitsRoom: 1105

9:00 a.m. – 10:15 a.m. Conference OpeningRoom: Auditorium

Welcome: IAFIE Chairman Thomas Carr Dr. Susan Aldridge, President, University of Maryland University College

Speaker: Michael “Mike” McConnell, Senior Vice President, Booz Allen Hamilton, former Director of National Intelligence

10:15 a.m. - 10:30 a.m. Break

10:30 a.m. – 11:00 a.m. IAFIE Teaching Award Speaker: Dr. James Holden-Rhodes, Air Force Research Laboratory

Room: Auditorium

11:00 a.m. –12:00 noon Teaching Intelligence CultureRoom: Auditorium

Dr. Mark Lowenthal and Jeff Cooper (author, Curing Analytic Pathologies,2005)

1

Page 6: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

Personnel entering the intelligence field are often drawn by thoughts of spies (or cops and robbers), intrigue and international travel. But there is more to the culture of intelligence than these exciting aspects. This panel will discuss the importance of proper orientation and understanding of the intelligence process and the environment in which it operates as someone enters the field.

12:00 noon – 1:30 p.m. LunchRoom: Chesapeake

Speaker: The Honorable Edwin Meese Presentation to Essay Award Winners: Dr. Edna Reid, Patrick John Reyes Ramos, and Michael Cohen

Concurrent Breakout Sessions (Conference Center floor plan provided on page 49)

1:30 p.m. – 3:00 p.m. 1. Teaching Intelligence from a Student’s PerspectiveRoom: 1123

2. Intelligence Instructor Competencies Room: Auditorium

3. Authors’ RoundtableRoom: 2100

3:00 p.m. – 3:15 p.m. Break

3:15 p.m. – 4:45p.m. 1. Teaching Intelligence through DiscoveryRoom: 1123

2. Teaching Intelligence OnlineRoom: 2100

3. Teaching Structured Techniques Room: Auditorium

4:45 p.m. – 6:15p.m. Business MeetingRoom: Auditorium

7:00 p.m. Dinner hosted by American Military UniversityRoom: Chesapeake

2

Page 7: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

Speaker: Francois Mathieu, Criminal Intelligence Training Director, Royal Canadian Mounted Police

Thursday, May 28

7:30 a.m. – 9:00 a.m. Continental BreakfastRoom: Thai House

9:00 a.m. – 10:30 a.m. 1. Teaching Critical Thinking Room: Auditorium

2. Teaching Competitive IntelligenceRoom: 1123

3. Teaching Law Enforcement IntelligenceRoom: 2100

10:30 a.m. – 10:45 a.m. Break

10:45 a.m. – 12:15p.m. 1. Teaching Structured Techniques (#2)Room: 2100

2. Teaching Intelligence TechnologiesRoom: 1123

3. Teaching Critical Thinking (#2)Room: Auditorium

12:15 p.m. – 1:30 p.m. LunchRoom: Chesapeake

1:30 p.m. – 2:45 p.m. 1. Teaching Law Enforcement Intelligence (#2) Room: 2100

2. Teaching Military IntelligenceRoom: Auditorium

3. Teaching Intelligence Technologies (#2)Room: 1123

2:45 p.m. – 3:00 p.m. Break

3:00 p.m. – 4:30 p.m. 1. Teaching Predictive IntelligenceRoom: Auditorium

2. Core Competencies for AnalystsRoom: 2100

3

Page 8: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

3. Teaching Intelligence Through Discovery (#2)Room: 1123

4:30p.m. – 5:00p.m. Wrap up/Adjournment Room: Auditorium

Note: Exhibits will be open throughout the conference.Snack foods and drinks are available from 7:30 a.m. to 5:30 p.m. each day.

4

Page 9: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

Breakout Sessions

1. Teaching Intelligence from a Student’s PerspectiveWhat do students want and expect from an intelligence program? Students from varied programs will share their candid expectations and responses to the programs in which they are enrolled.

Moderator: Dr. Edna Reid, Clarion University Speakers: Derek Chris, Mercyhurst College; Jordan Moneski, UMUC; Jamie Schork-Morency, American Military University

2. Intelligence Instructor Competencies What makes a great intelligence instructor? How important are presentation skills vs area expertise? What role should continuing education play in educators’ lives? What impact do student evaluations have?

Moderator: Dr. Greg Moore, Notre Dame CollegeSpeakers: Reese Madsen, the Office of the Under Secretary of Defense (Intelligence); Denise Stepanik, Defense Intelligence Agency; Dr. David Gray, Fayetteville State University

3. Authors’ RoundtableAuthors of noted books in the intelligence field will be on hand to allow you to examine their books, ask questions and consider the books’ adoption.

Moderator: William Spracher, National Defense Intelligence College Authors:

Dr. Mark Lowenthal – Intelligence: From Secrets to PolicyDon McDowell – Strategic Intelligence: A Handbook for Practitioners, Managers and

UsersRandy Pherson – Handbook of Analytic Tools and Techniques

Structured Analytic Techniques for Intelligence Analysis (with Richards Heuer, Jr. - forthcoming)

Dr. James Bruce – Analyzing Intelligence Origins, Obstacles and Innovations (with Roger Z. George)

Dr. Robert Clark – Intelligence Analysis: A Target-Centric ApproachTechnical Collection of Intelligence (forthcoming)

Chris Westphal – Data Mining for Intelligence, Fraud, and Criminal DetectionNDIC Press – Finding Leaders: Preparing the Intelligence Community for Succession Management by E.L. Hatfield; Registering the Human Terrain: A Valuation of Cadastre by Douglas E. Batson; Intelligence Strategy: New Challenges and

5

Page 10: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

Opportunities, Proceedings of Conference hosted jointly by NDIC and ODNI, edited by William C. Spracher

4. Teaching Intelligence through DiscoveryAdults learn best through doing; thus several schools have developed hands-on practical exercises and case studies that put the learning in the hands of the students. How effective this is and what pitfalls may occur will be discussed.

Moderator: Robert Heibel, Mercyhurst CollegeSpeakers: James Bruce, Rand Corporation; Thomas Shreeve, Thomas W. Shreeve & Associates; Dr. Thomas LaHann, SAIC

5. Teaching Intelligence OnlineEven brick and mortar schools are putting more of their student interactions online to save classroom space and adapt to the student-preferred medium of the Internet. The particular challenges of teaching intelligence online are explored by this set of experts.

Moderator: Stephen Fowler, CINTT CorporationSpeakers: Dr. William Sondervan, UMUC; David Jimenez, American Military University; Dr. Barry Zulauf, Mercyhurst College

6. Teaching Structured Analytic Techniques Structured analytic techniques are the core methods used in analysis whether it is in law enforcement, international security or competitive intelligence. Teaching these core techniques are discussed by this panel of educators.

Moderator: Kathy Pherson, Pherson AssociatesSpeakers: Randy Dietering, SAIC; Randy Pherson, Pherson Associates; Grey Burkhart, DIA/Booz Allen Hamilton

7. Teaching Critical Thinking Critical thinking has become key to intelligence education as people have realized we must harness the power of our minds while being aware of our biases, mindsets and assumptions. This panel discusses their views of teaching critical thinking.

Moderator: Ken Stringer, Booz Allen HamiltonSpeakers: Dr. Noel Hendrickson, James Madison University; David Moore, NSA; Dr. Tim Walton, Consultant

8. Teaching Competitive IntelligenceCompetitive or Business Intelligence extends beyond the realm of corporate espionage to incorporate the use of data to support strategic edge development and policy. This panel discusses how CI is taught and how it has become key to effective business management.

Moderator: Marco Monsalve, McManis & Monsalve Associates Speakers: Mike Ryan, GWU Law School; LTG James Dubik, US Army; Suki Fuller, Consultant

6

Page 11: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

9. Teaching Law Enforcement IntelligenceLaw enforcement intelligence has been taught since the 1970s, focusing on analysis for case support, often to the exclusion of strategic analysis. Three law enforcement instructors will discuss their preferred teaching methods and topics.

Moderator: Glenn Fueston, Washington/Baltimore HIDTASpeakers: Don McDowell, Intelligence Study Centre (Australia); Mark “Clint” Goodwin; David Grabelski, Mercyhurst College

10. Teaching Intelligence TechnologiesIntelligence tools have become standard in most analysts’ lives, from basic word processing to complex data mining and networking software. How these can be adapted and taught in a variety of settings is explored in this panel.

Moderator: Robert A. Smith, ProtectionMetrics, LLCSpeakers: Chris Westphal, Visual Analytics; Steve Casto, i2; TBD

11. Teaching Military IntelligenceMilitary intelligence is not an oxymoron in today’s environment. Is military intelligence any different from national security intelligence? What special considerations/methods/cultural issues must be taught in the military framework?

Moderator: LCDR Michael Bennett, US Coast Guard AcademySpeakers: Major John Mowchan, US Army War College; LCDR Todd Wiggen, US Coast Guard Intelligence Training Center; Colonel Eric M. Walters, US Marine Corps

12. Teaching Predictive IntelligenceForecasting and warning have always played a role in intelligence, for all aspects of the field. Foreknowledge is a key goal in many situations. How successful are we in predicting and teaching how to predict or warn?

Moderator: Don McDowell, Intelligence Study Centre (Australia)Speakers: John McCreary, Air Force; Dr. Jonathan Lockwood, American Military University; Dr. John Bodnar, SAIC

13. Core Competencies for Analysts

What attributes and skills should intelligence analysts or officers have and how do we encourage them in the education process? Core competencies have been developed in varying areas and these speakers will talk to them.

Moderator: Eileen Hurley, Pherson AssociatesSpeakers: Reese Madsen, the Office of the Under Secretary of Defense (Intelligence); Dr. Michael Collier, Eastern Kentucky State University; Shelagh Dorn, NY State Police/IALEIA

7

Page 12: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

Keynote Speakers

Michael “Mike” McConnell

Mike McConnell is a Senior Vice President, Booz Allen Hamilton and former Director of National Intelligence (2007 - 2009). McConnell has an illustrious record of government service. He previously served as Director of the National Security Agency (1992 - 1996) under Presidents George H.W. Bush and Bill Clinton.  A Vietnam veteran, he served a total of 29 years in the Navy retiring in 1996 as a Vice Admiral. 

Upon his retirement from the Navy, he joined Booz Allen where he attained the position of senior vice president, and departed in 2006 when asked by President George W. Bush to become the Director of National Intelligence. President Obama has asked McConnell to continue to serve by accepting a position on his President’s Intelligence Advisory Board (PIAB), the Board which advises the President on all matters related to intelligence.

During Desert Shield/Storm and the dissolution of the Soviet Union, McConnell worked as the Intelligence Officer (J2) for the Chairman of the Joint Chiefs of Staff and the Secretary of Defense.

He holds a Master's of Public Administration from George Washington University and is a graduate of the National Defense University and the National Defense Intelligence College, and holds a bachelor's degree in economics from Furman University.

Honorable Edwin Meese III

Edwin Meese is a distinguished visiting fellow at the Hoover Institution. He served as the seventy-fifth attorney general of the United States from February 1985 to August 1988.

Meese is an expert on the U.S. legal system, law enforcement and criminal justice, intelligence and national security, and the Reagan presidency. His current research focuses on the criminal justice system, federalism, emergency response management, and terrorism.

Meese is also a distinguished fellow and holder of the Ronald Reagan Chair in Public Policy at the Heritage Foundation; a member of the Board of

8

Page 13: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

Regents of the National College of District Attorney; distinguished senior fellow, Institute for United States Studies, University of London; and a member of the boards of directors of both the Capital Research Center and the Landmark Legal Foundation.

Before serving as U.S. attorney general, he was counselor to the president from 1981 to 1985. In this capacity he functioned as the president's chief policy adviser and had management responsibility for the administration of the cabinet, policy development, and planning and evaluation. During the time he held both these positions, Meese was a member of the president's cabinet and the National Security Council.

Formerly, he served as Governor Reagan's executive assistant and chief of staff in California from 1969 through 1974 and as legal affairs secretary from 1967 through 1968. Before joining Governor Reagans staff in 1967, Meese served as deputy district attorney of Alameda County, California.

From 1977 to 1981, Meese was a professor of law at the University of San Diego, where he was also director of the Center for Criminal Justice Policy and Management.

Meese is a graduate of Yale University (1953) and holds a law degree from the University of California at Berkeley.

Francois Mathieu

Director, Research & Development, Criminal Intelligence, Royal Canadian Mounted Police. Mr. Mathieu has been a civilian member of the RCMP for 20 years. He first worked in Drug Enforcement before transferring to Criminal Intelligence in 1991. In Criminal Intelligence, Mr. Mathieu has focused on various aspects of drug trafficking, money laundering and organized crime related corruption. In 1999, Mr. Mathieu became the officer in charge of the Criminal Analysis Branch in Criminal Intelligence. In 2005, Mr. Mathieu took over the responsibilities of the officer in charge, National Priorities & Special Intelligence Projects. Since late 2008, Mr. Mathieu has been the director of Research & Development in Criminal Intelligence. In his current functions, he oversees the continued development of criminal intelligence in the RCMP, including training for intelligence analysts and officers. Mr. Mathieu obtained a B.A. and an M.A. in history at Laval University.

9

Page 14: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

Speaker/Moderator Biographies

Susan Aldridge (Dr.) - President, University of Maryland University College. In three years at UMUC she has expanded the university’s global outreach and presence, added new academic programs, increased its enrollments, strengthened its infrastructure and streamlined its business operation.

Dr. Aldridge was one of 11 university presidents appointed by the American Association of State Colleges and Universities to study how the United States can improve its system for higher education. She serves on numerous national boards and committees, including the Microsoft Advisory Council for Education Products. She received her doctorate and master’s degrees from the University of Colorado and her bachelor’s degree from Colorado Women’s College.

Thomas Carr - Director of the Washington/Baltimore High Intensity Drug Trafficking Area (HIDTA) Program since 1994. He is the Executive Director of the University of Maryland’s Public Safety Training and Technical Assistance Program. Formerly, he served as Chief (Lt. Colonel) of the Maryland State Police Bureau of Drug Enforcement and Commander of the Criminal Investigations Division. He is the principal investigator on an annual grant of approximately $4.5 million from the State of Maryland, Department of Public Safety and Correctional Services that focuses on the conversion of mainframe technology to distributed databases and a $13.5 million grant that funds the Washington/Baltimore High Intensity Drug Trafficking Area program. In addition, Mr. Carr develops antiterrorism curriculum and provides training for the Department of State, Office of Antiterrorism Assistance. He has taught antiterrorism courses in Macedonia, Peru, Thailand, Hungary, St. Kitts, and El Salvador. In 2007, Mr. Carr was elected vice-chair of the International Association for Intelligence Education he became chairman of IAFIE for 2008-2009.

Mr. Carr has a degree in History from Towson State University and attended the Maryland State Police Academy, the FBI National Academy, the DEA Drug Commander’s School and the Federal Executive Institute.

Michael Bennett (LCDR) - is currently Director and Assistant Professor of Strategic Intelligence Studies at the United States Coast Guard Academy in New London, CT where he teaches courses in Strategic Intelligence, National Security Policy, Terrorism, and Analysis. He is a 1998 graduate of Webster University in St. Louis, MO where he earned a Bachelor of Arts Degree in Political Science and Environmental Science, and a 2003 graduate of the Joint Military Intelligence College where he was awarded the Master of Science in Strategic Intelligence (MSSI). He was recently selected as the 2009-2010 Director’s Fellow at the National Security Agency and was accepted into the Doctoral Program at Virginia Tech’s School for Public and International Affairs beginning in the Fall of 2009.

John Bodnar (Dr.) - is a biological warfare analyst for SAIC. A 1970 Naval Academy graduate, he served first on nuclear submarines then in the reservesas an S&T analyst and war-game umpire until retiring as a Captain. As a PhDmolecular biologist with twenty years experience studying viruses and developing bioinformatics methodologies, he has spent the last eight years has supported several government agencies on

10

Page 15: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

biological warfare projects and development of new analytical methodologies. He is the author of Warning Analysis in the Information Age (JMIC).James Bruce (Dr.) - is a Senior Political Scientist at the RAND Corporation. Both an intelligence practitioner and teacher, he retired from CIA after nearly 24 years. He served in the National Intelligence Council, CIA’s Directorate of Intelligence, the Sherman Kent School for Intelligence Analysis, and was Chief of Training at the Counterintelligence Center. He is presently an adjunct professor at Georgetown and Columbia Universities where he has taught four different graduate courses.

Grey Burkhart - program manager for intelligence training and an intelligence analysis instructor at the Joint Military Intelligence Training Center. He served as a Navy intelligence officer, the chief executive of a consulting engineering firm, and as the Chief Operating Officer of two media companies. As a career intelligence officer, Burkhart's 30 years of professional experience and has contributed to a broad range of intelligence-related activities since he joined Booz Allen Hamilton in 2001. He is an authority on the global proliferation of information and communications technologies (ICT). His most recent book, co-authored with Susan Older, is The Information Revolution in the Middle East and North Africa. Burkhart holds a B.S. degree from Illinois Institute of Technology and a master's degree from the University of Southern California.

Steve Casto - Assistant Vice President, i2 Inc. Previously served for over 30 years with the U.S. Department of Justice, Drug Enforcement Administration (DEA). At the time of his retirement, he served as the Chief of Investigative Intelligence at the Special Operations Division. Some of the other Intelligence positions held by Mr. Casto include serving as the Chief of International Investigative Intelligence at DEA Headquarters; leading DEA’s Intelligence Response Team to Southwest Asia after 9/11; an assignment as an Inspector in the Office of Inspections; and six years as an Intelligence Group Supervisor in the Washington-Baltimore HIDTA where he worked closely with HIDTA Director and IAFIE Chair Thomas Carr. He also served three years in the U.S. Army, Military Intelligence, including a tour of duty in Vietnam. He holds a Bachelor of Science degree in Criminal Justice from the University of Maryland – University College.

Derek Chris - Master’s Student, Mercyhurst College. Intelligence Specialist, US Navy Reserves, Office of Naval Intelligence (2005-2008); Ballistics Specialist / Test Engineer – University of Alabama in Huntsville (2004-2007). Won the 2006 Harry S. Truman Foundation Scholarship. Awarded the Armed Forces Expeditionary Medal for military service in the Persian Gulf. B.A. Political Science, University of Alabama in Huntsville, 2007.

Robert Clark (Dr.) - former CIA Analyst and current consultant and author. Wrote Estimates and Prediction and Intelligence Analysis: A Target-Centric Approach (now in 2nd edition). Forthcoming book is Technical Collection for Intelligence. Retired as a Lt. Col. From the Air Force; flew in Vietnam. Has a S.B. from Massachusetts Institute of Technology, a Ph.D. in Engineering from the University of Illinois and a J.D. from George Washington University.

11

Page 16: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

Michael Collier (Dr.) - teaches Homeland Security and Intelligence Studies in the Eastern Kentucky University College of Justice and Safety.  He holds a Ph.D. in International Relations from Florida International University (2000), an M.S. in Strategic Intelligence from the Defense Intelligence College (1986), and a B.S. from the U.S. Coast Guard Academy (1974).  In a 22-year U.S. Coast Guard career, he was a specialist in deepwater cutter operations and a sub-specialist in law enforcement and military intelligence.

Jeffrey Cooper - Vice President for Technology, SAIC Technical Fellow, and Chief Innovation Officer in the Intelligence, Security and Technology Group at Science Applications International Corporation (SAIC). He received his undergraduate and graduate education at The Johns Hopkins University. Mr. Cooper‘s recent focus has been largely on intelligence matters, with particular emphasis on analytic failures and methods to improve all-source analysis capabilities. He wrote “Curing Analytic Pathologies” published by CIA’s Center for the Study of Intelligence in December 2005.

Randy Dietering - Lead Instructor for the DNI “Analysis 101” course. He served more than three decades as a national security and intelligence professional, with half of his career on the White House staff. Mr. Deitering served four consecutive Presidents during his 15 years with the President’s Foreign Intelligence Advisory Board (PFIAB), The White House (1987-2003). He received his White House Commission (Presidential appointment) as PFIAB Executive Director in 1998, having served as Acting Executive Director since 1995. He also was Deputy Executive Director and an Assistant Director of the Board. Mr. Deitering retired from CIA as a SIS-4 in 2006, after serving as Senior Officer-in-Residence, University of South Carolina Honors College. He has an MA in politics from New York University.

Shelagh Dorn - Senior Supervising Intelligence Analyst, New York State Intelligence Center, six years and the last sixteen years working in/with law enforcement. She studied Sociology at Cornell University (BA) and Criminal Justice at the University at Albany (MA; PhD in progress). A member of IALEIA’s Foundations of Intelligence Analysis Training (FIAT) Coordinating Committee and a FIAT instructor, she frequently participates in designing and revising state and national intelligence training curricula.

James M. Dubik (Lieutenant General) - Commanding General, Multi National Security Transition Command – Iraq. Previously, LTG Dubik was the Commanding General of I Corps and Ft. Lewis. He commanded US and Multi-national forces in northern Haiti during Operation Uphold Democracy. He served as Assistant Division Commander for Multinational Division (North) Operation Joint Forge, Bosnia-Herzegovina; Deputy Commanding General for Transformation, U.S. Army Training and Doctrine Command, Fort Lewis, Washington, and Commanding General of the 25th Infantry Division (Light), Schofield Barracks, Hawaii from 2000 to 2002. LTG Dubik has attended United States Army Command and General Staff College and Senior Service College Fellowship. He completed the Advanced Operations Studies Fellowship, Fort Leavenworth and Harvard University’s John F. Kennedy School of Government’s executive program for national and international security. He holds a Bachelor’s of Arts degree in Philosophy from Gannon University, a Master’s of Arts degree in Philosophy from Johns Hopkins University and a Master of Military Arts and Sciences Degree from the United States Army Command and General Staff College. His awards include the Distinguished

12

Page 17: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

Service Medal, Defense Superior Service Medal, four awards of the Legion of Merit, five awards of the Meritorious Service Medal, and numerous Army Commendation and Achievement Medals.

Stephen Fowler - served 20 years in the US Army in various strategic, operational and tactical intelligence assignments and deployments in Korea, Japan, Haiti, Honduras, Malaysia, Philippines, and the United States. He has a Masters of International Management from the Thunderbird School of Global Management in Glendale, Arizona and BA in Economics from the University of California at Berkeley. For the past eight years he has taught undergraduate distance learning courses on intelligence subjects for the American Military University.  He is currently the Director of Education and Training for CINTT Corp. where he designed an intelligence analyst development program

Glenn Fueston - assumed leadership of the Investigative Support Center (ISC) at the Washington/Baltimore HIDTA in March of 2005.  The ISC has four core intelligence functions:  deconfliction, analytical case support, issuing threat assessments, development and dissemination of special assessments, bulletins, and alerts.  He earned two B.A. degrees from Salisbury University and an MS from Towson University. 

Suki Fuller - a competitive intelligence consultant located in Northern New Jersey. She has been an active Society of Competitive Intelligence Professionals (SCIP) member since 2002 and currently serves as Chair of the Membership Advisory Committee and is a member of the 2009 Conference Planning Committee. She holds a BA in Intelligence Studies from Mercyhurst College, an MBA from Centenary College, and is pursuing an MGIS from Penn State. Her most recent "linear" position was as a full-time research analyst at a pharmaceutical consulting company, in New Jersey's pharma alley. Today Suki is teaching various companies to understand how social media tools can improve their ability to gather information and produce actionable intelligence. Her CI specialties include social network analysis, geographic analysis, and human intelligence collection. Her micro-blog can be found at: http://twitter.com/SukiFuller

David Grabelski - Under Graduate Program Director of the Mercyhurst College’s Department of Intelligence Studies and as an Assistant Professor. He holds a B.S. from Pennsylvania State University and a M.A. from Pepperdine University. He specializes in law enforcement intelligence and is a former instructor with the US Department of Justice / National Drug Intelligence Center. He has also served with the Los Angeles Police Department as a Senior Homicide Detective and Gang Unit Supervisor.

David Gray (Dr.) - associate professor at Fayetteville State University, specializes in U.S. and international security and strategic studies.

Mark “Clint” Goodwin - intelligence professional with over 31 years experience supporting intelligence collection, analysis, production, and liaison tasking for several U.S. Intelligence Community members. He supported the National Security Agency and National Center for Medical Intelligence as an imagery analyst. While at the Defense Intelligence Agency he served as a senior intelligence analyst. He was assigned to the Federal Bureau of Investigation as a Liaison Officer supporting the FBI’s National Joint Terrorism Task Force and Counterterrorism Watch during 2003-2004. Towards the later part of his military career, Mr. Goodwin instructed, coached, and mentored mid-level intelligence professionals enrolled in the National Defense Intelligence College (NDIC) Post Graduate Intelligence Program-Reserves (PGIP-R). Mr. Goodwin has accrued over 8000 hours of

13

Page 18: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

experience instructing leadership, technical, and operational subjects to both government and civilian persons. He is an expert training programs manager.

Robert Heibel - a twenty-five year veteran of the FBI who served as its deputy chief of counter-terrorism. He holds a Masters Degree from Georgetown University and is Executive Director of the Mercyhurst College Institute for Intelligence Studies and the developer of its Research/Intelligence Analyst Program (R/IAP). Heibel also directs the institute’s Center for Information Research, Analysis and Training (CIRAT), a nonprofit organization. Heibel has served on the board of directors of several national intelligence associations and is a founder and chairman emeritus of the International Association for Intelligence Education. In 2001 the Society of Competitive Intelligence Professionals presented him with its highest recognition, the Meritorious Award, and in 2006 he received a lifetime achievement award for his work in open-source intelligence.

Noel Hendrickson (Dr.) - Director of the Institute for National Security Analysis INSA) and Assistant Professor of Information Analysis at James Madison University. He teaches courses in “Hypothesis Testing,” “Causal Analysis,” “Counterfactual Reasoning” and “Strategy Assessment”. He has a Ph.D. in Philosphy from the University of Wisconsin and is co-author of Rowan and Littlefield’s Handbook of Critical Thinking, 208; and authored Counterfactual Reasoning: A Basic Guide for Analysts, Strategists, and Decision-Makers, Army War College, 2008.

Eileen Hurley - retired as a Supervisory Intelligence Research Specialist with the Bureau of Alcohol, Tobacco, Firearms & Explosives. She has extensive experience in intelligence collection, analysis, and production, with concentration on intelligence applications for law enforcement.   She is an expert in nexus between national security intelligence and law enforcement.  Ms. Hurley held responsible positions in counterintelligence, anti-smuggling, drug trafficking intelligence, strategic trade and arms control, commercial fraud, counter terrorism, illegal immigration and human smuggling.  She is an accomplished practitioner in interagency coordination, horizontal integration, and international cooperation.  Ms. Hurley received a MS in Internal Audit and a MBA from Marymount University.  

David Jimenez - faculty member with American Military University and a Senior Intelligence Research Specialist for Immigration & Customs Enforcement, focusing on Southwest Border Violence and weapons smuggling. He is past Director of Training, Education, and Career Development for the International Association of Law Enforcement Intelligence Analysts (IALEIA), and is a USAF retiree. He has a B.S. in Management and Human Resources from Park College, and an M.A. in Human Resource Development from Webster University.

James LaHann (Dr.) - lead instructor and co-developer of the ODNI’s Analysis 101 course. He earned his Ph.D. in Pharmacology and Toxicology and is board certified in General Toxicology. An employee of SAIC, he continues to work within the Intelligence Community in the areas of emerging biological and chemical threat agents. Dr. LaHann has over 30 years of professional experience, including twenty years as a tenured member of the Pharmacy and Graduate faculty at Idaho State University and Washington State University. He has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry.

Jonathan Lockwood (Dr.) - received his BA in History and Psychology from the University of Tampa in 1997, and the MA and PHD in International Affairs (Russian Area studies) from the University of Miami in 1978 and 1980 respectively. Active service as a 1LT in US Army Military Intelligence Corps in September 1980, and retired as a Colonel from the US Army Reserve in May

14

Page 19: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

2007. He was selected as a 1992-93 Fellow in the Director of Central Intelligence (DCI) Exceptional Intelligence Analyst Program, during which he invented a predictive methodology now known as the Lockwood Analytical Method for Prediction (LAMP) (website at www.lamp-method.com). Following the completion of his DCI project in April 1993, Dr. Lockwood transferred to the USAR, where he served for nearly 12 years as a professor on the Reserve Faculty of the JMIC to teach the PGIP to Reserve Officers.  Dr Lockwood was named Outstanding Faculty Member at the JMIC for both the 1996 and 1997 Summer Quarters, and was a finalist for the annual Robert Beland Memorial Award for Excellence in Teaching for three consecutive years from 1996-1998.  He was appointed in July 2007 by Charlie Allen, (former Chief of Intelligence for DHS) to be the first DHS Faculty Chair at the National War College for a one-year detail. He has been a professor of Graduate Intelligence Studies with American Military University since 1995, and recently assumed duties as their Program Director for Graduate Intelligence and National Security Studies.

Mark Lowenthal (Dr.) - President/CEO of the Intelligence & Security Academy, a national security education/consulting company.  He has been the Assistant Director of Central Intelligence for Analysis and Production, Vice Chairman on the National Intelligence Council, staff director of the House Permanent Select Committee on Intelligence (104th Congress), and Deputy Assistant Secretary of State for intelligence.  His book, Intelligence: From Secrets to Policy (CQ Press, 4th ed., 2009), is the standard college/graduate school textbook on the subject.

Reese Madsen, Jr., - Chief Learning Officer, Office of the Under Secretary of Defense for Intelligence. Responsible for development of policy, plans, programs and oversight of personnel, training, education and career development of civilian and military defense intelligence positions within the Department of Defense and its components and services. He is Chairman of the Intelligence Training and Education Board for the Intelligence Community which includes 30 schoolhouses, one college, and one Distributed Learning Program. Mr. Madsen was active duty military for 20 years; in his last position on duty he was Intelligence Workforce Manager for the U.S. Coast Guard. He has a Masters in Science in Management from the University of Maryland (University College) and has received numerous joint awards, DoD awards and Coast Guard awards including the Legion of Merit.

John F. McCreary, Esq. - the Highly Qualified Subject Matter Expert for Analysis Transformation for the United States Air Force Intelligence Analysis Agency, he is a 38 year veteran of defense intelligence. He is the author of the internationally acclaimed, nightly news commentary, NightWatch™. He has taught strategic analysis and warning to the intelligence staffs of 32 countries. He created and taught the U.S. National Warning Course from 1983 to 1992. He has received dozens of commendations, citations, medals and awards from the Intelligence Community, the CIA and the DIA. In 2004 he received a Presidential Rank Award for Meritorious Service; the only DIA analyst to ever have received this award. His publications include The Latest Intelligence Crisis, with Richard A Posner, in Intelligence and National Security, Volume,23, Issue 3, 2008; Intelligence as Evidence, J2 monograph,1996; Analysis of Political Instability, J2 monograph, 1995; Warning Cycles, Studies in Intelligence, 1983.

Don McDowell - consulting instructor. Don’s professional career in intelligence spans 45 years. He started his career with active military intelligence service abroad before moving into national security and government analytical fields. For more than two decades he has worked mainly in enforcement intelligence, specializing in strategic analysis, publishing widely and winning awards for this work. Don’s consulting work continues today taking him around the globe providing specialized intelligence training. Don was the founder of AIPIO (Australian Institute for Professional Intelligence Officers) and is a lifetime CCA (Certified Criminal Analyst).

15

Page 20: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

John Mowchan (Maj. P) - career Military Intelligence officer in the United States Army. Over the last 18 years, he has served in various tactical, operational, and strategic-level assignments. In 2008, he was assigned as a faculty member to the Center for Strategic Leadership, U.S. Army War College. He holds a Bachelor of Science Degree in Business-Mathematics from Albright College and a Master of Science Degree in Strategic Intelligence from the National Defense Intelligence College.

Jordan Moneski - senior at UMUC, planning to complete an undergraduate degree in Finance with a minor in Homeland Security. HMLS and Criminal Justice classes have dealt with the Intelligence field, including such topics as Counter-Terrorism, Critical Infrastructure Protection, Intelligence Analysis Software, and Intelligence Reform. This summer, working as an Intern for the Washington/ Baltimore HIDTA (High Intensity Drug Trafficking Area). After graduating at the end of this summer, goal is to pursue an Intelligence Studies degree in Graduate School. Recently became a student member of IAFIE.

Marco Monsalve - Chief Executive Officer of McManis & Monsalve Associates is a senior business and public administration professional with more than 30 years of experience. His areas of expertise include Intelligence Led Management™, strategic planning, business process reengineering, and change management. His experience has been both in the private sector and the Federal government, where he has held high-level executive positions including government wide duties at the Office of Management and Budget.

David Moore - career senior intelligence analyst and educator deployed form the National Security Agency to the School of Leadership and Professional Development at the National Geospatial-Intelligence Agency. Formerly he served as a technical director at the National Security Agency where he advocated for, and mentored best practices in intelligence analysis. He is an adjunct faculty member of the National Cryptologic School; has taught at the National Defense Intelligence College (formerly the Joint Military Intelligence College), Washington, DC; at Trinity University, Washington, DC; and lectures at the National Defense University. Mr. Moore holds a B.A. in sociology from Washington and Lee University and a Master of Science of Strategic Intelligence from the National Defense Intelligence.

Gregory Moore (Dr.) - Director of the Center for Intelligence Studies as well as the Chairperson of the Department of History and Political Science at Notre Dame College in Cleveland, Ohio. He holds a doctorate in American Diplomatic History from Kent State University. He currently serves on the IAFIE Executive Board as chair of the association’s Educational Practices Committee. Dr. Moore is the editor-in-chief of the Encyclopedia of U.S. Intelligence, scheduled for publication in 2010 by Taylor & Francis Publishing.

Kathy Pherson - teaches and facilitates the application of critical thinking and analytic techniques across the Intelligence and Homeland Security communities. She retired from the Central Intelligence Agency (CIA) in 2000, after a 27-year career in intelligence and security analysis and resource management, as head of the DCI's Center for Security Evaluation. Ms. Pherson received her A.B. in Hispanic Studies from Vassar College, an M.A. in Spanish Linguistics and Latin American Studies from the University of Illinois, and an M.A. in Communications from the University of Oklahoma. She is a recipient of the CIA's Distinguished Career Intelligence Medal and the Intelligence Community's National Distinguished Service Medal.

Randolph H. Pherson - President of Pherson Associates, teaches advanced analytic tools and techniques to analysts throughout the Intelligence Community and the private sector. He collaborated

16

Page 21: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

with Richards J. Heuer, Jr. in launching the Analysis of Competing Hypotheses software tool; they are drafting a new book, Structured Analytic Techniques for Intelligence Analysis. Mr. Pherson completed a 28-year career with the Intelligence Community in 2000, last serving as NIO for Latin America. He received his A.B. from Dartmouth College and M.A. from Yale University.

Edna Reid (Dr.) - Dr. Reid is an Associate Professor, Clarion University, Pennsylvania. Formerly, she was a Senior Research Scientist and Adjunct Lecturer at the University of Arizona and a team leader on the AI Lab’s Dark Web project. She has worked at the CIA, MITRE Corporation, San Jose State University, and Nanyang Technological University, Singapore. Her publications include journal articles such as Mapping the contemporary terrorism research domain, Internet-savvy U.S. and Middle Eastern extremist groups, Analysis of jihadi extremist groups’ videos, and a book Terrorism Informatics: Knowledge Management and Data Mining for Homeland Security. She has a doctorate from the University of Southern California, a MLS from the University of Maryland, a graduate certificate in Management Information Systems (MIS) from the American University, and a B.S. from the D.C. Teachers College, Washington, D.C.

Michael P. Ryan (Dr.) - Dr. Ryan is director of the Creative and Innovative Economy Center at the George Washington University Law School, where he is coordinating and participating in a variety of research projects regarding the political economy, business, law, diplomacy, and ethics of creativity, innovation, and economic development in Africa, Asia, Latin America, and the Middle East.  He is presently writing two books, Knowledge Development: Creativity, Innovation, and the International Political Economy of Intellectual Property and Knowledge Ethics: Responsibility, Innovation, Governance, and AIDS in Africa and he is the author of Knowledge Diplomacy: Global Competition and the Politics of Intellectual Property and Playing by the Rules: American Trade Power and Diplomacy in the Pacific.  Dr. Ryan lectures frequently in Geneva to members of the diplomatic community and has lectured and conducted research in many developing countries.  He has served on the faculties of the Georgetown University School of Foreign Service and School of Business and the University of Michigan Business School; has been a guest scholar at the Brookings Institution and a guest lecturer at China University of Law and Political Science; holds a PhD from the University of Michigan and an MA from The Ohio State University.

Jamie Schork-Morency - undergraduate senior in American Military University's Intelligence Studies program, and a 2009 National Military Intelligence Foundation scholarship recipient. Prior to attending AMU, she studied at San Diego State University’s International Security and Conflict Resolution program, completing an undergraduate thesis on Russian organized crime. A native of Oak Harbor, Washington, she currently lives in Yokosuka, Japan, teaching English and cooking to Japanese students.

Thomas W. Shreeve - joined the Central Intelligence Agency in 1984 and established the CIA Case Method Program in 1990 as a way to capture the value of the Agency’s experience and spread that value throughout the organization. In late 1998, he retired from the CIA to establish a consulting practice focused on the application of the case method to education and training in intelligence, national security, law enforcement, and private industry. Mr. Shreeve is an adjunct instructor at the Centre for Counterintelligence and Security Studies and the Marine Corps Command and Staff College. From 2005 to 2007, he served as Chairman of the International Association for Intelligence Education (IAFIE). He graduated cum laude from Middlebury College in 1969 and received an MBA from the Harvard Business School in 1983.

17

Page 22: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

Robert A. Smith - is President and CEO of ProtectionMetrics, LLC, an education, training, and consulting firm that provides adjunct instruction for Mercyhurst College and Anne Arundel Community College Intelligence Studies Programs. Bob Smith has been an IAFIE member since 2005 and currently serves as the ad hoc Liaison Committee Chairman. He has over 37 years law enforcement, intelligence, and protective operations experience with the United States Secret Service and the Federal Law Enforcement Training Center (FLETC). Bob retired in 2001 from the Secret Service as Special Agent in Charge of the Office of Protective Operations, after 25 years service. He then became the Deputy Assistant Director at the FLETC Office of Cheltenham Operations. Bob obtained his Master of Science in Strategic Intelligence from the Joint Military Intelligence College.

William Sondervan (Dr.) - Professor and Director of Criminal Justice, Investigative Forensics and Legal Studies at the University of Maryland University College (UMUC). Previously served as the Director of Professional Development at the American Correctional Association (ACA). Dr. Sondervan served as Commissioner of the Maryland Division of Correction (MD DOC) and held positions of Deputy and Assistant Commissioner. His earlier employment includes twenty- two years of progressive criminal justice leadership experience from second lieutenant to lieutenant colonel in the United States Army Military Police Corps from 1972 to 1994. Dr. Sondervan earned a BS from the College of New Jersey, an Ed.M from Boston University, a M.P.A. from Jacksonville State University and an Ed.D. from Virginia Polytechnic Institution and State University.

William Spracher - Editor, Center for Strategic Intelligence Research, NDIC. A retired Army COL, he was Army Attaché to Peru, Defense Attaché to Colombia, and Military Professor/XO at NDU’s Center for Hemispheric Defense Studies. He was Asst Professor, USMA Dept of Social Sciences, adjunct at American University’s School of International Studies, and an adjunct at NDIC. He has a BS from West Point (1970), MA in international relations from Yale (1979), MMAS in pol-mil studies from Army CGSC (1983), and is an EdD candidate in George Washington University’s Higher Ed Admin program. His dissertation focuses on intelligence education in U.S. colleges and universities. He is an IAFIE charter member and serves on its Educational Practices Committee. He also is Vice Chair of the Washington Area Chapter.

Denise Stepanik - brings 22 years of multi-functional HR expertise to DIA as its Competency Specialist. Besides DIA, worked HR with Air Force, Defense Commissary Agency, and private sector. Expertise includes federal classification, staffing, recruitment, management evaluations, labor and employee relations.

Served on the special DIA team designated to prepare for a pay-for-performance system. Examined work for pay comparability among all positions. Wrote, edited, and classified hundreds of job descriptions and competencies covering several fields to include instruction.

Kenneth Stringer (Dr.) - Senior Associate who joined Booz Allen Hamilton in 2004 after 20 years of service with the Central Intelligence Agency. Has served as Program Manager supporting the Iran Mission Manager (IMM) as the Analytic Supervisor on a major contract in support of the National Counterterrorism Center (NCTC). and teaching advanced analysis and critical thinking at the National Geospatial-Intelligence Agency (NGA) and the Department of Homeland Security (DHS). He was in charge of South Asia Issue Group at the time of the 9/11 terrorist attacks. He supervised and directed analytic support to CIA officers and the US military in the field throughout Operation Enduring Freedom and during subsequent developments crucial to US policy interests in South Asia. He is a recipient of the Distinguished Career Intelligence Medal, the Director’s Award, and the Intelligence Commendation Medal.

18

Page 23: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

Eric Walters (Col.) - served as a Senior Intelligence Officer for the past nine years at the Marine Aircraft Wing, Marine Division, Marine Expeditionary Force, and Marine service component level.  He led intelligence operations supporting Marine combat aviation in the 2003 invasion of Iraq and was the Joint Task Force Director of Intelligence performing humanitarian assistance after the Indian Ocean Tsunami in 2005.  He is an online university professor, published author, television commentator, and Small Wars Journal staff blogger.

Timothy Walton (Dr.) - has a B.A. from the College of William and Mary, and a Ph.D. from the University of Virginia. After serving in the Navy, he was an analyst at the CIA for 24 years. Since retiring, he has taught analysis at the Sherman Kent School, Mercyhurst College’s program in the Washington, D.C. area, and the Director of National Intelligence’s Analysis 101. He is the author of the forthcoming textbook, Fundamentals of Intelligence Analysis.

Chris Westphal - co-founder and CEO of Visual Analytics Inc. (VAI), a provider of visualization software, information sharing systems, and advanced analytical training. His clients include federal and state/local law enforcement including fusion centers, all major intelligence agencies, the U.S. Department of Defense, and international Financial Intelligence Units (FIUs). Mr. Westphal has authored numerous publications and several books including Data Mining for Intelligence, Fraud & Criminal Detection: Advanced Analytics & Information Sharing Technologies (Westphal, CRC Press, 2008); Data Mining Solutions: Methods and Tools for Solving Real World Problems (Westphal/Blaxton, Wiley, 1998); and Readings in Knowledge Acquisition: Current Practices and Trends (McGraw/Westphal, Ellis Horwood Limited, 1990). He also authored the “Analyzing Intelligence Data: Next Generation Technologies for Connecting the Dots” chapter in Net-Centric Approaches to Intelligence and National Security (Ladner/ Petry, Springer 2005).

Todd C. Wiggen (LCDR) - US Coast Guard officer currently assigned to the Coast Guard Training Center in Yorktown, Virginia. During his time with the Coast Guard, LCDR Wiggen has extensive experience in law enforcement intelligence, force protection and counter-drug operations. He has also served as the District Intelligence Officer for Coast Guard District 13 in Seattle, WA, where he was responsible for the implementation of two Field Intelligence Support Teams. LCDR Wiggen holds a Masters Degree in Strategic Intelligence with a concentration in Human Resources Intelligence from the National Defense Intelligence College, a Masters Degree in Interdisciplinary Studies focused on Counseling and Education and undergraduate degrees in Government and Speech Communications from Eastern Washington University. He is currently pursuing a Doctorate in Homeland Security.

Barry Zulauf (Dr.) - Deputy Chief of the DEA Office of National Security Intelligence, the 16th member of the Intelligence Community.  His was the Executive Assistant to the DEA Chief of Intelligence and from February to July 2006 the first Chief the Office of National Security Intelligence.  He is Adjunct Professor of Intelligence with Mercyhurst College, the Distinguished DEA Chair at the National Defense Intelligence College, and Adjunct Professor of Criminal Justice, Michigan State University.

19

Page 24: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

IAFIE Outstanding Teacher Award 2009

The IAFIE Outstanding Teacher Award recognizes and honors the distinguished effort and achievements by college, university, and other post-secondary school intelligence instructors; military training personnel; and law enforcement training officials. The award recognizes the recipient’s contributions to the intelligence discipline and profession. This year’s Outstanding Teacher Award is presented to James Holden-Rhodes, Ph.D.

Dr. J.F. Holden-Rhodes

Presently a full-time Technical Consultant, for Universal Technology Corporation at Space Countermeasures Hands-On Program [SpaceCHOP], Air Force Research Laboratory. There, he has been involved in asymmetric [simulating rogue nations/terrorist groups] vulnerability assessments dealing with Space Tracking and Surveillance System (STSS), Global Nuclear Energy Partnership (GNEP), GPS, UAS Chemical/Biological Attacks; and serves as a key Mentor in the Kirtland Air Force Base Junior Force Council TIgER program; and, the AFRL Commander’s Cup Challenge. In the latter, the KAFB Teams have won the CCC for the past three years by developing and field testing in competition with Wright-Patterson Air Force base, rapid prototype projects: vehicle stopper, long endurance UAS, and, Tagging and Tracking of humans and vehicles.

Dr. Holden-Rhodes brings 20+ years of seasoned experience in Intelligence, Intelligence Operations, and operations issues to the national security arena. A combat-tested USMC Infantry/Reconnaissance Officer thrice decorated for actions under fire, he has applied his military experiences and learning from advanced graduate work to the difficult issues facing the nation. As the first non-traditional Post Doctoral Fellow at Los Alamos National Laboratory he worked on unconventional nuclear issues, terrorism/counterterrorism, special operations, and force projection.

Involved in the world of terrorism/counter-terrorism long before terror was recognized as a primary threat to this country, he served as the Team Chief, Latin America, 9001st Military Intelligence Detachment [Terrorism Counteraction]. [It was this group that coined the term “narco-terrorism”]. This experience led to a “boots on the ground” assignment as the Counter Drug Intelligence Team Leader for LANL/US Southern Command and the identification and tracking of coca growing and cocaine production sites, and, transshipment routes to the United States.

A pioneer in the development of and applied application of Open Source Intelligence [OSINT] he is the author of the award-winning book, Sharing the Secrets-Open Source Intelligence and the War on Drugs. An accomplished, frequently published writer/author he also wrote and co-edited, Intelligence in Terrorism Counteraction for the US Army Intelligence Center and School.

20

Page 25: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

He has lectured and taught at the National Drug Intelligence Center, National Security Agency, Central Intelligence Agency, Western European Union [Paris], University of New Mexico, New Mexico Highlands University, and New Mexico State University. He created and served as the Director, Intelligence Studies, NMSU. There, students were trained at the undergraduate and graduate level in analytical techniques prior to joining the US Intelligence Community. He is now Adjunct Associate Professor of Intelligence Studies at Embry-Riddle Aeronautical University [Albuquerque Center] where he leads the Certificate and Minor in Intelligence Studies and Security programs.

He recently led contractual work as a Project Manager for US Army Intelligence and Security Command [INSCOM] dealing with the monitoring, collection, and analysis/synthesis of OSINT production dealing with the policies and actions of nine Middle Eastern countries vis-à-vis their responses to United States operations in Iraq. He is also the Senior OSINT Analyst for the Food and Drug Administration/New Mexico State University project for food safety and bio-terrorism issues.

21

Page 26: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

Essay Contest

IAFIE held its 2009 Essay Competition to promote IAFIE’s goal of providing a forum for the communication and exchange of ideas and information for those interested in and concerned with intelligence education.

One of the following four questions was answered in each essay:

1. What impact have major events of this decade had on the role of the intelligence professional in national security, law enforcement or competitive intelligence? (Select major events based upon your choice of field.)

2. Intelligence-led policing is in practice in several countries on several continents. Using real-world examples, what, in your opinion, are the strengths and weaknesses of intelligence-led policing?

3. What do you think are the most important challenges facing the intelligence community over the next 10 years?

4. What advantages do strategic analysis and futures thinking hold for the future of the intelligence professional and how can they be incorporated into the intelligence professional’s skill sets?

A panel of intelligence professionals judged all entries and selected the winners for each category (Professional, Graduate Student, and Undergraduate Student). Essays were evaluated on their relevance to the question, creativity, strength of argument, and writing quality.

Category winners:

Professional Category“Events that Impact Intelligence Analysts: A Revised Bloom’s Taxonomy Perspective”by Edna Reid, Ph.D.Clarion University

Graduate Student Category“Information is to Intelligence as Cell is to Human”by Patrick John Reyes RamosUniversity of Tokyo

Undergraduate Student Category“The Threat from Cyberspace”

22

Page 27: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

by Michael CohenCornell University

23

Page 28: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

24

Page 29: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

Professional Category – Dr. Edna Reid

Events that Impact Intelligence Analysts: a Revised Bloom’s Taxonomy Perspective

Introduction

During this post-9/11 era of reforms in the intelligence community (IC), terrorist groups’ increased

sophistication in using the Internet, and establishment of an Open Source1 Center (OSC), it is time to

further demystify and enhance the visibility of an under-the-radar career: intelligence analyst2. With

the increase in the size, complexities, and mission-critical tasks of the U.S. intelligence community, it

is experiencing a critical shortage of intelligence analysts that doesn’t seem to be going away!

Accordingly, analysts are needed in many of the 16 intelligence community agencies (e.g., FBI, CIA,

DIA, NSA) particularly in the departments and agencies created since 9/11 (Shrader, 2004; Losey,

2007). For instance despite the current bleak economic environment, the FBI announced it wants to

fill over 3,000 positions including intelligence analysts, language specialists, heathcare analysts, and

records management professionals (Frieden, 2009).

Although the U.S. intelligence community has poured millions of dollars into educational programs

(e.g., certificate in intelligence analysis, summer camp for high school students) during the last decade,

the number of educational programs in intelligence analysis remains insufficient (Willing, 2006).

Given the tainted reputation of the IC, some educators shy away from discussions and implementations

of intelligence programs. Others ask what an intelligence analyst is and how intelligence analysis fit

within the broader academic context. Some seek to frame the concept of an intelligence analyst so that

the public (e.g., students, high school counselors, parents, and academic advisors) can better

understand the career demands, challenges, competencies, and opportunities associated with it.

1 Open source is unclassified information such as news articles, books, and foreign language reports.2 An intelligence analyst is responsible for using available information to analyze ambiguous mission-critical questions, identify plausible solutions, and provide recommendations. He generates reports and briefs senior management officials as necessary in regard to specific findings. The discipline of intelligence analysis has historically been located within political science, history, and international studies departments.

25

Page 30: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

The remainder of this essay describes major events of this decade and their impacts on the intelligence

profession, especially the intelligence analyst. The key events include 9/11 attacks, post-9/11

intelligence community reforms, terrorist groups’ sophisticated use of the Internet, and establishment

of an Open Source Center (OSC) for the IC. The essay also includes a discussion of how the events

impinge upon the incremental competencies and capabilities necessary for today’s intelligence analyst.

The analysts need to be equipped with higher-level cognitive skills such as the ability to analyze

national security scenarios, share information with other analysts and agencies, synthesize plausible

outcomes of events, and create intelligence reports. Such skills are described using the Revised

Bloom’s Taxonomy of learning outcomes. The framework in this taxonomy maybe useful for

providing a common language that facilitates communication to a wider community including

educators, counselors, parents, and students who are unfamiliar with the intelligence community

domain.

Impact of 9/11 Attacks and IC Reforms

According to Zegart (2006, p.44), a specialist in intelligence reforms, as early as in the 1990s there

were intelligence warnings, reports, and high level presidential briefings about the dangers and threats

of terrorist attacks within the U.S. by radical Islamic groups. Nonetheless, the intelligence warnings

‘failed’ to be translated into actionable plans. In many bipartisan commissions (e.g., Hart-Rudman

Commission, Bremer Commission), policymakers shared the concerns, identified major deficiencies,

and provided recommendations for improvement in the intelligence community to meet the national

security challenges of the 21st century.

Improvements were needed in areas such as integration and coordination of the intelligence

community, enhancement of information sharing across the community, amplification of human

intelligence (spying) capabilities to combat terrorism, recruitment of more personnel with necessary

skills to confront rising post-Cold War threats such as terrorism, and more robust analysis of

asymmetric threats (Zegart, p. 48). Asymmetric threats, such as the 9/11 attacks of the World Trade

Center and the Pentagon, are unusual and unconventional threats that are devastating and highly

disruptive.

Investigations after the 9/11 attacks (e.g., 9/11 Commission, Congressional Joint Inquiry) showed that

the deficiencies resulted in the inability of the intelligence community to prevent or disrupt attacks by

26

Page 31: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

al Qaeda (Zegart, p.56). The results of the investigations led to reform legislations such as the

Intelligence Reform and Terrorism Prevention Act. This Act created a Director of National

Intelligence (DNI) who has authority over the intelligence community in matters such as creating the

intelligence community budget and establishing guidelines for timely and effective intelligence

requirements, collection requirements, intelligence analysis, and dissemination.

The Act represents a major effort to start reforming the intelligence community which has remained

dormant for the last fifty years. Other reforms include the establishment of a new department of

homeland security (Homeland Security Act) and the enhancement of domestic security against

terrorism.

Impact of Terrorist Groups’ Internet Sophistication

Intelligence community reforms emphasize changes that are needed so that the community can

proactively predict, monitor, and respond to current and emerging 21st century national security threats

such as terrorist groups that plan and execute their attacks using creative approaches and diverse

technologies. The threats from these non-state actors are further complicated by the explosive growth

and sophisticated use of the Internet that have enhanced global connectivity, communication,

uncertainties, and the use of Web 2.0 social networking applications (e.g., online discussion forum,

wiki, blog, YouTube) for all users.

According to Internet World Stats (2009), the worldwide Internet usage growth from 2000-2008 has

been 305%. From a geographical perspective, Internet penetration rate is the highest in North America

(74%) and the lowest in Africa (5%). The increased use of the Internet by terrorists and other

extremist groups’3, who use it for social networking as well as a tool for communications,

radicalization, psychological warfare, global expansion, and training, serve to heighten and escalate the

conflicts and tensions in the name of what some call the holy struggle.

U.S. domestic and international terrorists use the Internet-based computer-mediated communication

(CMC) tools (such as websites, discussion forums, blogs, and chat session) to create their own news,

provide real-time interpretations of the local and international press, and communicate publicly and

3 Extremist groups are anti-government social movement organizations that are not on the formal lists of recognized terrorist groups such as the U.S. designated Foreign Terrorist Organizations (FTOs).

27

Page 32: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

privately with millions of people worldwide including members, supporters, sympathizers, and

enemies near and far (Jenkins, 2004; Reid & Chen, 2007). This allows the groups to bypass traditional

communication channels, information gatekeepers, and law enforcement agents.

According to estimates, the groups have created thousands of websites, listservs, chat sessions, videos,

and discussion forums that range from a few pages to sophisticated sites with password protected

discussion forums and extensive digital libraries of reports, multimedia resources, and e-commerce

merchandise (Weimann, 2004; Reid & Chen, p.178). In Bunt’s (2003) analysis of online contents’

influences on Muslims, he reports that the content exposed Muslims to new interpretations and diverse

Islamic thinking and perspectives. Another type of influence is the enhanced confidence in their

technical online proficiency and its potential for waging an e-jihad (online jihad4 holy war).

Establishment of an Open Source Center (OSC)

In response, the Director of National Intelligence (DNI) has followed up with a recommendation from

the Weapons of Mass Destruction Commission and established an Open Source Center (OSC) within

the CIA. OSC is designed to enhance the capability of the intelligence community to maximize the use

of publicly available domestic and foreign news, television, radio and Internet information (Bean,

2007).

The terrorist groups’ increased use of Web 2.0 social networking applications to support collaboration,

training, radicalization, and recruitment have led to a burgeoning volume of digitized cultural artifacts

(also known as open source information) that can shed light on groups’ operations, levels of

coordination, viewpoints, potential threats, and shifts in tactic and operations. As a result, the

intelligence community is overwhelmed with an abundance of open source information in various

languages that emanate from terrorist groups’ websites, wikis, online forums, and videos.

To support the diffusion and usage of the open source information5, the DNI has implemented

aggressive approaches to reposition open source as a valuable intelligence resource that should be

4 “In Islam the term ‘jihad’ has a dual meaning. The ‘big jihad’ refers to the continuous inner struggle to live as a good Muslim; the ‘small jihad’ refers to the armed struggle in the defense of Islam (and the country of Islam)” (Ministry, 2006, p.11). In this essay, the term jihad is used in the latter sense.5 In the intelligence community, the identification, acquisition, and processing of open source information is called open source intelligence (OSINT)

28

Page 33: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

utilized across the IC such as in the President’s Daily Brief.6 Approaches for repositioning open

source information include a diversity of activities such as an annual IC open source conference that

provides a venue for bringing together intelligence professionals from around the world and

throughout the IC.

The Open Source Center (OSC) and the DNI Open Source Conference are examples of programs

designed to help upgrade intelligence professionals’ competencies in exploiting Internet resources and

analyzing open source information. These competencies are critical because in order for analysts to

meet the national security challenges of the 21st century then they must be familiar with the technology

(e.g., iphone, Wii) and social networking tools (e.g., Facebook, Intellipedia7). By using the tools,

analysts will be better prepared to harness them in their analysis and synthesis of specific intelligence

questions as well as to identify trends, patterns, gaps, blind spots, and potential threats associated with

nontraditional local and foreign enemies.

A Broader Perspective of Intelligence Analyst

As previously described major events have led to an increased demand for intelligence analysts who

have cutting edge expertise and for a broader understanding outside of the intelligence community, of

the characteristics of an intelligence analyst. To enhance the understanding and facilitate discussion

among intelligence professors and other educators, the cognitive processes and knowledge associated

with the intelligence analyst discipline are described using Bloom’s taxonomy.

Marshall’s (2005, p.9) and Johnston’s (2005) intelligence analysis studies mention the relevancy of

Bloom’s taxonomy to understanding the work of intelligence analysts. The Revised Bloom’s

Taxonomy8 provides two dimensions with both a cognitive process dimension and a knowledge

dimension. The cognitive process dimension allows for the identification of six cognitive levels:

remember, understand, apply, analyze, evaluate, and create (Krathwohl, 2002). The higher cognitive

levels (e.g., apply, analyze, etc.) require the lower-level skills and abilities and are viewed as critical

thinking skills because they require students to go beyond what they know, analyze unfamiliar 6 President’s Daily Brief is a top secret document that is used to brief the President on a daily basis about sensitive situations. The Director of National Intelligence is responsible for the President’s Daily Brief.7 Intellipedia is a Wikipedia-type application that is being used by intelligence community to share information across the agencies and discuss opinions on intelligence topics8 See Krathwohl’s or Pickard’s articles for description of the original taxonomy.

29

Page 34: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

situations, and create new ideas. They are essential skills that intelligence analysts need. Table 1

summarizes the higher cognitive levels and provides examples from the Defense Intelligence College

(DIC).

Table 1: Critical Thinking Levels of the Revised Bloom’s Taxonomy and Intelligence Analysis

Higher Cognitive Levels

Descriptions (Wilson, 2006) Intelligence Analysis Examples (Marshall, 2005; Analysis, 2008)

1. Apply (the lowest)

Select and use appropriate theories or procedures to solve new or unfamiliar situations.

Students at the DIC worked on an assignment about when Iraq threatened to invade Kuwait again in October 1994.

They decided to use Richard Heuer’s analytical methodology (Analysis of Competing Hypotheses or ACH) for evaluating multiple hypotheses.

2. Analyze Dissect the problem into parts to determine how they relate to one another or to an overall structure or purpose.

Combine the parts into a new integrated whole.

They identified all potential hypotheses such as Iraq was training troops to conduct a demonstration.

They listed evidence and arguments for and against each hypothesis.

They designed a matrix containing each alternative hypothesis in an attempt to disprove as many as possible.

3. Evaluate Make judgment about the value based on criteria and standards through checking and critiquing.

They rated the evidence as consistent, inconsistent, or not related.

They reviewed the findings and evaluated them to identify gaps and need for additional evidence.

4. Create (highest level)

Construct a report that provides your findings, recommendations, and value judgments.

Prepare an oral presentation

They questioned their analysis and tried to draw conclusions about the likelihood of each hypothesis.

They identified consistency or inconsistency of assumptions and generated a report that includes findings and summary of all alternatives and reasons for rejections.

They provided recommendations and milestones as indicators for future analysis.

Table 1 uses examples of a structured analytical technique called Analysis of Competing Hypothesis

(ACH) to describe higher order cognitive levels from an intelligence analyst’s perspective. ACH is a

hypothesis testing methodology that uses a matrix for rudimentary visualization (Van Gedler, 2006).

Intelligence analysts also resort to statistical hypothesis testing. Oftentimes though, the data are

incomplete and have limited usefulness.

In addition to the cognitive processing dimension, the Revised Bloom’s Taxonomy identifies the

knowledge dimension that includes four levels of knowledge: factual, conceptual, procedural, and 30

Page 35: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

metacognitive (Pickard, 2007, p.48). Intelligence analysts also need different types of knowledge to

accomplish the tasks of providing mission-critical analysis to decision-makers. Table 2 describes the

levels of knowledge and maps them to examples from intelligence analysis.

Table 2: Knowledge Dimension of the Revised Bloom’s Taxonomy and Intelligence Analysis

Types of Knowledge (Wilson, 2006) Intelligence Analysis Examples (Marshall, 2005)1. Factual knowledge

basic to specific disciplines essential facts, terminology, or history that

students must know in order to understand the discipline or solve a problem

History of the intelligence community Different kinds of evidence: people

(HUMINT), imagery (IMINT), technical signals (SIGINT), open source (OSINT), physical science (MASINT)

2. Conceptual knowledge classification, principles, categories models, theories, structures

Pillars of the profession: sources and methods. Sources refer to collection and methods refer to analysis

Structural analytical methodologies and associated evidence

Historical research theories3. Procedural knowledge

subject-specific skills, techniques specific methodologies, methods of inquiry criteria for knowing when to use specific

methods, techniques

Steps in structured methodologies (e.g., ACH, Situational Logic) to break down problems into pieces and put pieces back together

Process of writing brief intelligence reports that start with conclusions

Giving an intelligence briefing to a decision-maker who has limited time

4. Metacognitive knowledge strategic or reflective knowledge knowledge of one’s own self and cognitive

processes

Approaches for effectively presenting an intelligence brief to a decision-maker who has limited knowledge of the topic

Self-assessment as the analyst analyzes the adversaries in the present and makes judgments about the future while trying to be culturally-neutral, bias-free, and creative

In Table 2, examples of the different levels of knowledge in intelligence analysis illustrate the skills,

challenges, and commitments required of intelligence analysts.

Conclusion

The 9/11 attacks, post-9/11 intelligence reforms, terrorist groups’ sophisticated use of the Internet, and

the establishment of the OSC have major impacts on challenges, competencies, and career

opportunities associated with the intelligence analyst. The events highlight the need for other

educators (e.g., healthcare, information science, digital media) to join the debate and curriculum design

teams so they can further discussions with intelligence professors about designing interdisciplinary

intelligence-focused curricula that meet the demands of a customer-driven intelligence community that

is dealing with increasingly complex cultural, technological, and global problems.

31

Page 36: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

Given the ubiquity and ever increasing power of information and communication, technology (ICT),

notwithstanding the lifelong-learning audacity of highly motivated and committed individuals – like

the terrorists – today’s intelligence analysts should be fully equipped with the right skills, knowledge,

competencies and continuous learning cycles just to match their real and virtual adversaries’ arsenals

for their terror campaign. Terrorists have been very adept in tapping the wealth and advantages of

constituting a very rich and diverse collectivity of members in their social movement. On the

educational side, there is need to do the same thing – tap into other disciplines – that are not normally

affiliated with intelligence analysis. Use frameworks such as the Bloom’s taxonomy to support the

sharing of ideas about educational partnerships, interdisciplinary apprenticeship programs, and other

approaches that can be part of lifelong learning strategies for enhancing the visibility, creativity, and

availability of intelligence analysts.

References

Analysis of competing hypothesis. (2008). Wikipedia. Retrieved January 3, 2009 from

http://en.wikipedia.org/wiki/Analysis_of_Competing_Hypotheses

Bean, H. (2007). DNI’s Open Source Center: an Organizational Communication

Perspective. International Journal of Intelligence and CounterIntelligence, 20(2),

240-257.

Bunt, G.R. (2003). Islam in the Digital Age E-Jihad, Online Fatwas and Cyber Islamic

Environments. London: Pluto Press.

DNI Open Source Conference. (2008). Retrieved January 7, 2009 from

http://www.dniopensource.org/

Frieden, T. (2009, January 5). FBI filling nearly 3,000 job openings. Retrieved January 6,

2009 from http://money.aol.com/news/articles/

Internet World Stats. (2009). Internet Growth Statistics: Global Village Online.

32

Page 37: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

Retrieved January 7, 2009 from http://www.internetworldstats.com/

Jenkins, B.M. (2004). World becomes the Hostage of media-Savvy Terrorists:

Commentary. USA Today. Retrieved August 22, 2004 from http://www.rand.org

Johnston, R. (2005). Analytic Culture in the US intelligence Community: An

Ethnographic Study. Center for the Study of Intelligence. Retrieved December 28,

2008 from http://www.fas.org/irp/cia/product/analytic.pdf

Krathwohl, D.R. (2002). A revision of Bloom’s Taxonomy: An overview. Theory Into

Practice, 41(4), Autum, 212-218.

Losey, S. (2007, May 7). Rebuilding the intel analyst work force. Federaltimes.com.

Retrieved January 3, 2009 from http://www.federaltimes.com

Marshall, M.G. (2005). Teaching intelligence research. Defense Intelligence Journal,

14(2), 1-34. Retrieved on December 24, 2008 from http://www.allacademic.com

Ministry of the Interior and Kingdom Relations. (2006). Violent Jihad in the Netherlands:

Current trends in the Islamist terrorist threat. General Intelligence and Security

Services (AIVD) of the Netherlands. Retrieved November 19, 2008 from

http://www.fas.org/irp/world/netherlands/violent.pdf

Pickard, M.J. (2007). New Bloom’s Taxonomy: An overview for family and consumer

sciences. Journal of Family and Consumer Sciences Education, 25(1),

Spring/Summer 45-55.

Reid, E., Chen, H. (2007). Internet savvy U.S. and Middle Eastern extremist groups.

Mobilization: an International Quarterly Review, 12(2), 177-192. Retrieved

Jananuary 7, 2009 from

http://ai.arizona.edu/go/intranet/papers/Internet%20Savvy...etc.pdf

33

Page 38: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

Shrader, K.P. (2004, December 30). Analysts are in great demand: Intelligence agencies

scramble for talent. Washington Post. Retrieved January 3, 2009 from

http://www.washingtonpost.com

Van Geder, T. (2006). Rational Thinking.

http://rtnl.wordpress.com/2008/12/15/future-trend-hypothesis-mapping- displacing-ach/

Weimann, G. (2004). “www.terrorism.net: How Modern Terrorism Uses the Internet.

Special Report 116, U.S. Institute of Peace. Retrieved January 13, 2004 from

http://usip.org/pubs/

Willing, R. (2006, November 28). Intelligence agencies invest in college education. USA

Today. Retrieved September 5, 2007 from http://usatoday.com

Wilson, L.O. (2006). Leslie Owen Wilson’s Curriculum Pages. Beyond Bloom – A new

version of the cognitive taxonomy. Retrieved December 24, 2008 from

http://www.uwsp.edu/education/lwilson/curric/newtaxonomy.htm

Zegart, A.B. (2006). An empirical analysis of failed intelligence reforms before

September 11. Political Science Quarterly, 121(1), 33-60.

34

Page 39: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

Graduate Category-Patrick John Reyes Ramos

Information is to Intelligence as Cell is to Human

Introduction

A vast literature on the subject of intelligence have come up with the simple but precise formula that

intelligence equals information plus analysis. While it is true that analysis spells out the major

difference between an intelligence product and merely raw information, the latter still constitutes a

critical half of the intelligence equation. Apparently, as cells are the basic building blocks of the human

body, information are the fundamental elements of intelligence. Therefore, the intelligence field

requires an effective strategy for identifying, gathering, collecting and organizing data and basic

information. Against a background of rapid technological progress around the globe, the intelligence

community surely encounters boundless possibilities and significant opportunities in the ambit of

information sourcing and data collection. But at the same time, it is confronted with a number of

important problems and growing concerns. Firstly, how can the intelligence community deal with the

massive influx of data in this era of the internet and highly-advanced information and communications

technologies? In particular, what prospects and barriers exist for the intelligence professional in

carrying out a successful intelligence task in this time when huge information are easily accessible to

almost anyone, anytime and anywhere? Secondly, which sources, tools, software and techniques can

lead to the most reliable and efficient data gathering and collection methodology? Apart from these,

what other skills and instruments can better equip and enhance the intelligence professional in

fruitfully identifying good sources of data and information? Lastly, who can lend support and

assistance in furthering the intelligence field in this period of unprecedented information and

technological advance? More importantly, how can the intelligence community tap their resources and

expertise to develop better ways of finding and gathering appropriate and useful information that will

ultimately result to exceptional and valuable intelligence products? Consequently, this essay provides a

brief discussion on the above vital challenges facing the intelligence community at present and over the

next decade or so and likewise offers a number of ideas and suggestions on how to address and tackle

some of these issues.

35

Page 40: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

Intelligence and Intelligence Professionals in an Information and Technology Era

Indisputably, our world currently lives in an information age. With the proliferation of the internet and

the unparalleled advancement of information and communications technologies, various data and

information are truly within the fingertips of anybody with the sufficient means and resources. Of

course, this translates to positive developments for the intelligence field given that information

constitutes the necessary starting point of any intelligence-related endeavor. Unfortunately, not all

information, whether publicly- or privately-sourced, can be reliable and useful to the intelligence

community and in some instances may even be deceptive, burdensome and misleading. Moreover,

whilst the accessibility of tons of data and superior technologies nowadays has considerable benefits to

intelligence professionals, it also poses some danger and negative aspects including the availability of

the same information and devices to the public and other organizations (which lessens the tactical

advantage of the intelligence community) and more problematically, the possibility that such

information and tools can be intercepted or fall into the wrong hands which can then be utilized for

unlawful purposes that in the end would only instigate catastrophic and ill results. Thus, the

intelligence community, aside from exploiting the benefits of prevalent information and technological

breakthroughs, should also strive to find even more advanced ways and techniques of collecting and

assessing the reliability of data and their sources, intensify the security, preserve the exclusivity and

enhance the manner in which information are transferred within its networks as well as continue to

discover and introduce much sophisticated technologies for data gathering and collection in order to

maintain the organization’s intelligence and counterintelligence edges.

Clearly, intelligence professionals need to keep up with the colossal technological developments of the

modern times. They must always be at the forefront of recent innovations in the information and

communications fields and using these complex technical means, amass and utilize all necessary data

from all probable sources (and if possible retain control of both data and their sources) before such

information can even get to the public and other interested parties. This obviously adds a lot of

pressure to the intelligence community as it requires considerable time, effort and money. Moreover, it

necessitates improved methods of verification, evaluation and interception of data especially those

secured from the internet, different electronics and communications gadgets as well as other

secondhand sources. Other than these amplified tasks, intelligence professionals even need to sustain

36

Page 41: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

and boost their skills in traditional forms of data collection such as physical surveillance, engagement

of confidential informants and undercover operators, and investigation of public records, among

others. Above all, they must always hang on to their imagination and free-thinking spirit throughout

the entire information gathering process and never rely solely on technical or mechanized means since

some of the best intelligence products can only be derived from sheer human intelligence. As it

appears, creative thinking, personal judgments and scholarly intuitions may comprise the only

remaining advantage of the intelligence community in this era when data and information are simply

available to just about anyone, anytime and anywhere. Hence, one pitfall of a greatly industrialized

society that the intelligence community must learn to circumvent involves the overdependence on

automated systems and simulated information databases. Nevertheless, it is still imperative that

intelligence professionals be knowledgeable about recent technologies to be able to maximize the

advent of many superior and practical information and communication devices. This will in turn

facilitate them during data gathering and accumulation which remains to be the most labor-intensive

aspect and an essential, if not the most important, phase of the intelligence process.

Information Sources, Tools and Other Instruments for a Productive Intelligence Task

Definitely, the intelligence community is at a better position now more than ever to undertake its task.

The availability of various information sources, tools and software packages opens up a myriad of

possibilities for synthesizing valuable intelligence products. The challenge then lies in the

identification, selection, optimum utilization and upgrading of these modern instruments in order to

arrive at the most reliable data and information. For instance, geographic information systems (GIS)

can offer large and relevant data which may be utilized in a wide variety of applications. The

intelligence community must therefore master GIS to the fullest extent possible and likewise augment

existing imagery systems with more high-level and specially designed features which can further

contribute to better information gathering and processing. Similarly, electronic tools and various

computer software packages provide other useful facilities not only for data sourcing and collection but

also for the organization, sharing, safekeeping and analysis of information. Traffic and transportation

modeling software packages, for instance, can simulate spatial movements and mobility scenarios

according to specific changes or disturbances in a particular system (e.g., road and expressway

blockage, terrorist bombings of certain buildings and structures, mass departure during natural

disasters, etc.) which might proved invaluable to intelligence-related tasks like police entrapment

activities, counterterrorism measures as well as disaster relief and mitigation. The internet, of course,

37

Page 42: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

affords another extensive resource of expedient, albeit not always reliable, information and scholarly

articles which can facilitate the intelligence community in carrying out its function. However, caution

must always be exercised whenever data and information are derived from this type of sources and

verification and assessment should always form part of the whole data collection process. Evidently,

information can now emanate from several sources and can likewise come in various forms and

structures. Therefore, the intelligence community must always be adept, vigilant and conscientious in

identifying, gathering and using existing data and their sources and at the same time continue exploring

undiscovered and groundbreaking technical resources and methods.

Indeed, advanced technologies make it easier and more convenient to obtain substantial data for

perusal by the intelligence community but some information still require more than complex

automated systems and electronic implements to be properly collected and effectively utilized by

intelligence analysts and professionals. Language expertise and cross-cultural knowledge are some

examples of peculiar instruments that can better equip the intelligence community to access and better

understand other raw data and information. With rising globalization, the world is truly becoming

smaller and more connected resulting to simpler, faster and cheaper exchanges and transfers not only

of technologies, trade products, people and other resources but also of information and intelligence.

Thus, the intelligence community must cope up with this situation and being familiar with other

foreign languages, cultures and customs can certainly be an asset in understanding additional data and

information and more importantly in preparing against threats and pressures that can now stem from

almost any part of the world. At any rate, the intelligence community must begin to recognize the

multifaceted character of the information gathering process and should attempt to expand its scope and

proficiency to cover not only purely scientific and technical fields but also social, economic, political

and environmental spheres and taking into account both domestic and international settings.

Crucial Partners for Enhanced Information Gathering and Analysis

While it is commonly accepted that security, confidentiality and exclusivity are essential pillars of the

intelligence field, some degree of openness and receptiveness can actually benefit the intelligence

community. Realistically, not every skill and ability can be secured internally within intelligence

agencies. The number of times that outside experts from academic circles, businesses and scientific

communities have been called upon to provide opinions and recommendations during intelligence

operations plainly supports this argument. Hence, the intelligence community should encourage much

38

Page 43: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

wider participation of other specialists to assist in enhancing the institution’s data collection and

organization procedures. Such skills as creative and critical thinking, ingenuity and innovativeness that

many scientists, researchers, engineers and other practitioners share with most intelligence analysts and

professionals can absolutely facilitate in the identification, gathering and organization of more reliable

and accurate information. Strong ties and collaborations with these outside individuals would thereby

fortify the capacity of the intelligence community and bring in fresh and modern ideas, technologies

and supplementary resources. Joint researches and projects with academic institutions and commercial

enterprises, forums, conferences and training workshops on multidisciplinary subjects and related areas

as well as direct hiring or recruitment of scientific, technical and other relevant personnel are some of

the ways through which the intelligence community can draw upon the expertise of these future crucial

partners in the intelligence field. Obviously, prudence and strictness must always be observed in

dealing with the above proposed encounters so as to preserve the integrity of the intelligence

community but a certain amount of transparency and confidence should also be allowed in order to

fully optimize the benefits from such cooperation and alliances.

Conclusion

There are some issues and concerns arising with regard to the collection and organization of data and

information for the purpose of intelligence during this period of rapid technological growth. Against a

background of too many accessible but not necessarily dependable physical and electronic sources,

highly-sophisticated information tools and varied communication methods, this essay identifies three

important challenges facing the intelligence community now and in the years to come, namely: (1) how

to carefully identify, choose, access, evaluate and utilize reliable and accurate information and their

sources, (2) how to further improve data sourcing, collection, sharing and storage techniques, and (3)

how to explore new resources and tap outside specialists to help in developing more and more intricate

systems of information gathering, interpretation and safekeeping. To respond to such challenges, the

intelligence community should at the outset be experienced and well-versed on recent innovations in

the information and communications fields as well as in other scientific and engineering disciplines. It

must adequately build its capacity and competence in utilizing new developments in these areas to

continuously enhance its data sourcing and collection processes. At the same time, it should maintain

its resourcefulness, imaginativeness and creative nature to also gather and find information via other

non-mechanized and unconventional ways. Next, the intelligence community must exploit the

capabilities of modern technical instruments like highly-developed imagery systems, electronic and

39

Page 44: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

communication apparatuses, computerized tools and software packages and the ever evolving internet

to improve and expand its data gathering activities. On the other hand, it should also develop its know-

how in other subjects such as regional languages, global political systems and world cultures to

encompass a broader resource of raw data and basic information. Finally, the intelligence community

should reach out to experts in the scientific and other specialized domains to become more responsive

and well-prepared for the latest advancements in the field of information collection and organization.

Accordingly, it must foster strong ties and partnerships with businesses, industries and academic

institutions which can undoubtedly provide ample support, guidance, resources as well as new

perspectives and direction. By imbibing some of the foregoing suggestions, the intelligence community

can most likely fulfill its mandate much effectively and successfully and likewise be able to nourish its

competitiveness and ascendancy in this current era of information and technological revolution.

As a final point, while this paper strongly focuses on the importance of the data sourcing and gathering

aspect of the intelligence process, it does not in any way discount the relevance of its analysis

component. Of course, analysis remains to be a critical part of the entire intelligence cycle and may

even be the defining factor for the efficiency and usefulness of any intelligence product. Nonetheless, it

is still worth emphasizing the significance of the information collection process since no effective

intelligence output (no matter how thorough and brilliant the analysis procedure is) can ensue in the

absence of any adequate and reliable information. After all, information is to intelligence as what cell

is to human. And as good and strong cells result to a healthy person, only proper and coherent

information can lead to a sound and viable intelligence product.

Bibliography

1. Bureau of Justice Assistance, Office of Justice Programs, U.S. Department of Justice. Intelligence-

Led Policing: The New Intelligence Architecture. September 2005.

http://www.ncjrs.gov/pdffiles1/bja/210681.pdf (last accessed on January 5, 2009).

2. New Jersey State Police; Center for Policing Terrorism at the Manhattan Institute; Harbinger.

Practical Guide to Intelligence-Led Policing. September 2006.

http://www.cpt-mi.org/pdf/NJPoliceGuide.pdf (last accessed on January 5, 2009).

3. Robert Hutchings, National Intelligence Council. Strategic Choices, Intelligence Challenges

(Speech delivered at the Woodrow Wilson School, Princeton University). December 1, 2003.

http://www.dni.gov/nic/speeches_choices_challenges.htm (last accessed on January 5, 2009).

40

Page 45: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

Undergraduate Category-Michael Cohen

The Threat From Cyberspace

In a tragically ironic turn of history, a remnant of perhaps the greatest struggle of the 20 th

century helped spark what threatens to be the defining challenge of the 21st. On April 27, 2007, the

Estonian government relocated the Bronze Soldier of Tallinn, a memorial to the millions of Red Army

soldiers who died fighting Nazi Germany. The move stirred simmering ethnic rivalry and, in response,

a group of rogue actors moved to exact revenge upon the Estonian government. Ten years ago, such a

response would have likely involved bombs and bullets and burning buildings. However, this attack

came through a very 21st century medium: the Internet.

A carefully orchestrated denial-of-service campaign employed a massive network of hijacked

computers to flood websites critical to Estonian infrastructure. An Estonian government spokesman

confirmed that websites normally receiving 1,000 visits each day were being inundated with 2,000

visits every second.9 Sites belonging to Estonia’s government, political parties, media outlets, and

leading businesses were all forced to shut down. The infrastructure of an entire society grinded to a

halt; a sovereign nation was, albeit temporarily, toppled without a single shot fired.

Intelligence agencies the world over must treat the Estonian cyberattack as a wakeup call; as a

grave signal that the age of cyberwarfare and cyberterrorism is here and, perhaps, has just begun. The

increasingly interconnected world of the 21st century has ushered in an era of new personal luxuries

and technological innovations that have truly transformed human society. Yet, this era’s greatest

strength – the proliferation of information technology that has connected and empowered so many –

may also be its greatest weakness. Threats from cyberspace – from warfare to espionage, from

organized crime to terrorism – will constitute the intelligence community’s greatest challenge as it

confronts the difficult and dangerous decade to come.

The Estonian cyberattack stands out as a particularly ominous example of how a nation can fall

prey to an online offensive, but it is neither the first nor even the greatest strike of its kind. For years,

hackers on the Indian subcontinent have been engaged in a cyberconflict, with scores of denial-of-

service attacks exchanged over the Pakistan-India border. After the disqualification of South Korean

9 Christopher Rhoads, “Cyber Attack Vexes Estonia, Poses Debate,” The Wall Street

Journal, May 18, 2007, p. A6. 41

Page 46: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

speed skater Kim Dong-sun effectively awarded a gold medal to American rival Apollo Ohno at the

2002 Winter Olympics in Salt Lake City, outrage in South Korea manifested itself in a massive denial-

of-service attack that brought down several large American servers. Perhaps the largest and most

damaging cyberattack to date was a series of China-based hacks on United States government

computers that the FBI has codenamed Titan Rain, though Titan Rain stands out from this list because

it was not a denial-of-service attack.

Denial-of-service attacks are often launched using bot networks, or botnets. Responsible for

both the Estonian and Olympic cyberattacks, botnets are constellations of computers that have been

compromised and infected with a malicious code. The code allows them to be remotely controlled by a

hacker (known as the botmaster) over the Internet. Remotely controlling thousands (sometimes

hundreds of thousands) of computers enables the botmaster to flood and disable websites, potentially

wreaking havoc on any electronic system. How can a threat to computer systems, in the age of

seemingly greater threats including nuclear proliferation and Islamic extremism, comprise the most

important challenge to the intelligence community? The problem is that computer systems now control

nearly every facet of military and civilian life. Joel Brenner, the National Counterintelligence

Executive put it this way:

Our water and sewer systems, electricity grids, financial markets, payroll systems, air and

ground traffic control systems ... are all electronically controlled, electronically dependent, and

subject to sophisticated attacks by both state-sponsored and freelance terrorists.10

Clearly, the threat of a botnet attack transcends the inconvenience and monetary toll of mere

website failure. The fact that a botnet attack on the United States civilian or military infrastructure has

not yet inflicted significant and lasting damage, experts agree, does not mean that America is safe. In

fact, the threat appears to be growing as cybercriminals in general and botmasters in particular have

grown dramatically more adept and powerful in recent years. One reason for identifying the threat

from cyberspace as the most important challenge facing the intelligence community over the next 10

years is to examine what has happened on this front over the past 10 years. A decade ago, cybercrime

was a blip on the radar of intelligence agencies. Today, according to the FBI, it costs American

industry alone almost half a trillion dollars per year.11 Dr. James Lewis, Director of the Technology

10 Jeanne Meserve, “Official: International Hackers Going After U.S. Networks,” CNN.com,

October 19, 2007, [http://www.cnn.com/2007/US/10/19/cyber.threats/index.html]11 Clay Wilson, “Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress,” Congressional Research Service, January 29, 2008, at [http://www.fas.org/sgp/crs/terror/RL32114.pdf]

42

Page 47: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

and Public Policy Program at the Center for Strategic and International Studies in Washington, D.C.

explains:

Ten years ago, they were amateurs; now they are professionals who stay on top of their game.

Cyber crime is a risk… and we’re having a hard time getting a handle on it.12

Botnets in particular seem to be evolving in two major ways. First, the mechanism of infection

is changing. Botnets used to be transmitted by hiding in software and programs that people open from

their email or download from the Internet. A well-informed individual could largely avoid botnets by

not downloading pirated software, not following malicious links, and not opening spam email.

Unfortunately, those days are long gone. Avoiding such risky online practices is no longer sufficient

because bots are increasingly transmitted through “drive-by downloads” from legitimate websites.13

This means that bots can spread simply through the viewing of innocent websites (no conscious

download is required), and such transmission can occur without the knowledge of either website owner

or viewer. Since bots are often very good at hiding their presence, the owners of infected computers

generally do not know they are carriers of the botnet… and one does not need to be a practicing

physician to know that it is very hard to cure an illness when the patient has no symptoms at all.

The second major aspect of the deeply troubling botnet evolution involves the flattening of the

botnet organizational hierarchy. Until 2004, all botnets operated in basically the same fashion: As the

network grew, the botmaster communicated with its herd using an Internet Relay Chat (IRC) server.14

Under this system, every bot has a direct link to the botmaster. If the authorities could successfully

locate a bot and track the IRC address of the computer on the other end of the botnet communication,

then the authorities had successfully found the botmaster. From there, arresting the botmaster and

disabling the botnet was relatively easy work.

Then, in 2004, the first P2P botnets began to terrorize the web. P2P botnets, or peer-to-peer bot

networks, operate much as they sound: The bots communicate as peers, so a direct IRC connection no

12 Susan MacLean, “Report warns of Organized Cyber Crime,” ItWorldCanada, August 26,

2005, [http://www.itworldcanada.com/a/IT-Focus/39c78aa4-df47-4231-a083-ddd1ab8985

fb.html]13 Jeff Hecht, “Web Browsers Are New Frontline in Internet War,” NewScientistTech, May

5, 2007, [http://www.newscientisttech.com/article.ns?id=mg19426026.000&print=true]14 Jeff Hecht, “Web Browsers Are New Frontline in Internet War,” NewScientistTech, May

5, 2007, [http://www.newscientisttech.com/article.ns?id=mg19426026.000&print=true]43

Page 48: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

longer links each bot to its master. Since trapping a bot does not easily lead authorities to the

ringleader, the proliferation of these advanced botnets are even harder to stop.

The case of Jeanson Ancheta is a rare example of a major botmaster who was tracked down and

convicted in federal court. Ancheta alone, a 21-year-old California hacker and member of a group

known as “Botmaster Underground,” had taken over more than 400,000 computers.15 These advanced

botnets are staggeringly – almost incomprehensibly – vast and potent threats. In 2006, the prominent

Internet security firm Symantec announced that it had detected over 6 million bot-infested computers.16

It is critical that intelligence agents understand the way in which this new type of cybercrime

fits into the existing criminal and terrorist framework. Ancheta reportedly earned over $100,000 from

Internet advertising companies for permission to access the botnet, and may have rented out the botnet

as well.17 The Estonia attack was also carried out via a rented botnet, or more likely, several rented

botnets. The attack finally subsided on May 10th, not because Estonian authorities had defeated the

hackers and cracked their malicious code, but because the time for which the botnets were rented

simply ran out.

Thus, organized crime is an integral component of the cyber threat. Botnets are commonly

owned and operated by online gangs like “Botmaster Underground” and turf wars and bot-based

extortion are all too common. Intelligence professionals are well aware of the fact that, wherever

organized crime runs rampant, the terrorist link is not far away. That many nations, largely in the

Middle East and Southeast Asia, are quickly becoming world leaders in both information technology

and anti-American ideology, presents a pressing concern. One fear is that cyberweapons might fall into

the hands of terrorists. This scenario should not sound like science fiction. In fact, terrorists have long

used cybercrime to plan and fund their objectives. It is clear that advanced technology is playing an

increasingly critical role in Al-Qaeda operations:

Ramzi Yousef, who was sentenced to life imprisonment for the previous bombing of the World Trade

Center, had trained as an electrical engineer, and had planned to use sophisticated electronics to

detonate bombs on 12 U.S. airliners departing from Asia for the United States. He also used

sophisticated encryption to protect his data and to prevent law enforcement from reading his plans

should he be captured.18

15 Clay Wilson, “Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress,” Congressional Research Service, January 29, 2008, at [http://www.fas.org/sgp/crs/terror/RL32114.pdf]16 Ibid.17 Clay Wilson, “Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress,” Congressional Research Service, January 29, 2008, at [http://www.fas.org/sgp/crs/terror/RL32114.pdf]18 Ibid.

44

Page 49: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

It seems only a matter of time before those who harbor extreme anti-American sentiment and

computer mastery find a way to combine those two passions on an unprecedented scale… especially

given the vulnerabilities that exist in American military and civilian infrastructure. For example,

federal authorities were forced to deal with gaping holes in the Supervisory Control And Data

Acquisition (SCADA) system and the Simple Network Management Protocol (SNMP) in recent years,

both of which control critical components of American infrastructure. The Congressional Research

Service report on Botnets, Cybercrime, and Cyberterrorism explains:

Some experts believe that the importance of SCADA systems for controlling the

critical infrastructure may make them an attractive target for terrorists. Many

SCADA systems also now operate using Commercial-Off-The-Shelf (COTS)

software, which some observers believe are inadequately protected against a cyberattack… In August

2003, the “Slammer” Internet computer worm was able to corrupt for five hours the computer control

systems at the Davis-Besse nuclear power plant located in Ohio (fortunately, the power plant was

closed and off-line when the cyberattack occurred).19

In 2002, a major vulnerability was discovered in switching equipment software that threatened

the infrastructure for major portions of the Internet. A flaw in the Simple Network Management

Protocol (SNMP) would have enabled attackers to take over Internet routers and cripple network

telecommunications equipment globally… the security flaw could have been exploited to cause many

serious problems, such as bringing down widespread telephone networks and also halting control

information exchanged between ground and aircraft flight control systems.20

The terrorist fascination with aircraft is clearly nothing new. In this day and age, though, the

intelligence community must focus as much on securing the information technology that controls air

travel as on securing aircraft themselves. America and the world can ill afford a vulnerability in

SCADA or SNMP to be discovered and exploited by terrorists before it is found and fixed by federal

intelligence authorities. This Congressional Research Service report captures another critical part of the

cyber threat, the interconnection between military and civilian infrastructure and software. The

presence of commercial-off-the-shelf (COTS) software in government infrastructure is troubling

because cybercriminals and terrorists have access to very similar if not identical programs. The fact

that about 85% of American infrastructure is privately owned also presents grave security challenges,

as private firms often prefer to spend shareholder funds on profit-maximizing innovations instead of 19 Clay Wilson, “Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress,” Congressional Research Service, January 29, 2008, at [http://www.fas.org/sgp/crs/terror/RL32114.pdf]20 Ibid.

45

Page 50: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

costly security measures that may only seem important when it is too late.21

Another worry is that cyberciminals might sell botnets and other cyberweapons to terrorist

organizations. This is perhaps a more likely scenario, as most cybecriminals are more interested in

making a buck than making jihad against America and its allies. The anonymity that characterizes the

black markets in which these sorts of cyber secrets are exchanged could easily place botnets or

cyberweapons in hostile hands.

Perhaps the greatest threat of all, however, is that of a coordinated attack. Some experts have

expressed the opinion that a massive cyberattack does not fit the Al-Qaeda modus operandi because

Al-Qaeda tends to prefer more spectacular attacks that cause real-life bloodshed, thus sending a clearer

message to the world. However, a cyberattack would be an ideal way to supplement a conventional

attack – perhaps a nuclear, biological, or chemical strike – and amplify its effects by hindering the

response effort. Ronald Dick, director of the FBI’s National Infrastructure Protection Center,

elaborated on this threat:

The event I fear most is a physical attack in conjunction with a successful cyber-attack on the

responders' 911 system or on the power grid… [One in which] the first responders couldn't get

there . . . and water didn't flow, hospitals didn't have power. Is that an unreasonable scenario?

Not in this world. And that keeps me awake at night.22

Espionage, as experienced during Titan Rain, represents another serious danger in cyberspace.

The threat of nations or corporations hacking into government computer systems and retrieving

classified data is certainly a leading challenge for the intelligence community, as is the growing

possibility of an insider stealing vast amounts of data on a flash-drive or other tiny media device that

can easily be hidden and smuggled past security checkpoints.

However, in this era of globalization, cyberattacks designed to cripple major transportation or

financial infrastructure are more likely to come not from a nation state (China, for example, is almost

as dependent on the American financial system as is the United States) but from a rogue group that

rejects the world economy altogether.23 The global network of extremists that the United States is

21 Larry Greenemeier, “The Impact of Cyberwarfare,’”Information Week, June 2, 2007, at [http://www.informationweek.com/news/security/cybercrime/showArticle.jhtml?articleID=199800131]

22 Barton Gellman, “Cyber-Attacks by Al Qaeda Feared,” Washington Post, June 27, 2002,

p. A0123 Clay Wilson, “Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress,” Congressional Research Service, January 29, 2008, at [http://www.fas.org/sgp/crs/terror/RL32114.pdf]

46

Page 51: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

currently confronting in the War on Terror fits that description to a downright chilling extent.

Testifying before the House Committee on Homeland Security, former NSA Director’s Fellow O.

Sami Saydjari described what the aftermath of a massive cyberattack might look like. His poignant

description is as frightening as it is critical to 21st century intelligence:

As another day turns to night, looting starts, and the traffic jams get worse. Word begins to spread that

the US has been attacked—not by a conventional weapon, but by a cyber weapon. As a result, our

national power grid, telecommunications, and financial systems have been disrupted—worse yet, they

won’t be back in a few hours or days, but in months. The airports and train stations have closed. Food

production has ceased. The water supply is rapidly deteriorating. Banks are closed so people’s life

savings are out of reach and worthless. The only things of value now are gasoline, food and water, and

firewood traded on the black market. We’ve gone from being a superpower to a third-world nation

practically overnight… We are a nation unprepared to properly defend ourselves and recover from a

strategic cyber attack.24

Working to ensure that that day never materializes is truly the greatest challenge facing the

intelligence community in the coming decade and beyond.

24 O. Sami Saydjaru, “Addressing the Nation’s Cyber Security Challenges: Reducing Vulnerabilities Requires Strategic Investment and Immediate Action,” April 27, 2008 at [http://homeland.house.gov/SiteDocuments/20070425145307-82503.pdf]

47

Page 52: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

48

Page 53: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

48

Page 54: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...

49

Conference Center Floor Plan

Page 55: Schedule - c.ymcdn.com Web viewHe has worked as a Science and Technology analyst and managed drug development projects in the pharmaceutical industry. Jonathan Lockwood (Dr.) - ...