Increasing Jointness and Reducing Duplication in DoD Intelligence

Today I’m publishing an important guest-essay, with a brief introduction.  Last month the Wall Street Journal published a 12-part online series about college graduates and their paths to success, featuring surveys and input from job recruiters. One thing caught my eye, at least when blogged by an acquaintance, Prof. Kristan Wheaton of the Mercyhurst College Institute Of Intelligence Studies. The WSJ’s study included a look at recent graduates’ job satisfaction in their new careers, and as Prof. Wheaton strikingly put it in his own blogpost:

Intelligence Analysts are Insanely Happy.” 

I’m pretty sure that’s not really true by and large; Prof. Wheaton seems slightly dubious as well. Many readers of this blog are intelligence analysts themselves, so I’d love to hear from you (in comments or email) about your degree of giddyness….

We all know that the intelligence-analysis field as currently practiced in U.S. agencies bears many burdens weighing heavily on job satisfaction, and unfortunately weighing on successful performance.  Our youngest and our most experienced intelligence analysts have been battling those burdens. 

One analyst has now put constructive thoughts on paper, most immediately in response to a call by Defense Secretary Bob Gates asking DoD military and civilian employees to submit their ideas to save money, avoid cost, reduce cycle time and increase the agility of the department (see more about the challenge here).  

Continue reading

Education for Information Security in a Connected World

Much of what I work on involves technologies which address information security and cyber security. So I have to ask, Who is training our next generation of technologists? And are those educators doing enough to focus on the dynamically changing demands of Information Security?

Those fundamental questions took me to Chicago recently, to take part in a roundtable discussion sponsored by DeVry University, “The Demand for Information Security in a Connected World.”

Continue reading

Click on My Head and You’re Classified 2.0

Fact: According to the latest McKinsey Global Survey report, “Building the Web 2.0 Enterprise,” many companies find themselves actually changing organizationally, both internally and externally, as a result of adopting Web 2.0 tools and practices. 

Continue reading

A-SpaceX, Google, and Virtual Tuesday

Yesterday I had a “virtual world vibe” going.  At 5:30 a.m. when my dog Jack woke me up offering to take me for a walk, the first thing I noticed on my mobile was a series of tweets from Chris Rasmussen, NGA’s social software guru, posted the night before.  Twitter is interesting for a lot of reasons, but one is the ability to snatch asynchronous stream-of-consciousness statements, from strangers and friends alike, as they pass by in the microblogosphere conversation.

Chris went on a tear about Second Life, with several hilarious observations and comments within the space of an hour, so here are several from his public Twitter feed:

Continue reading

Tradecraft in the Long Tail

Fact: Chris Anderson, WIRED editor in chief and author of the Internet-era classic book “The Long Tail,” also runs a couple of Ning social networks focusing on what the intelligence community would call IMINT, or imagery intelligence – specifically DIY Drones, “a site for all things about amateur Unmanned Aerial Vehicles (UAVs): How-to’s, videos, discussion and more,” and PictEarth, “a Social Network used to collect, link and geotag RC, UAV/UAS or Kite derived Earth imagery for use in 3D Globe Programs including Google Earth, Virtual Earth, World Wind and ArcGIS Explorer.”

Analysis:  With these sites, Chris Anderson is promoting what he calls “Crowdsourced Aerial Imagery.”  In the mission statement for DIY Drones, he writes that “Reasons to make your own UAV range from a fun technical challenge, student contests, aerial photography and mapping (what we call “GeoCrawling”), and scientific sensing. We are primarily interested in civilian, not military, UAV uses here.” (Emphasis is in the original.)

Let’s presume that individual DoD or intelligence-agency personnel have an interest in such issues, and maybe even in spending their personal time by keeping current and following the crowd’s interest in such topics, by participating in these new social networks.  One can then assume that others from foreign intelligence might have some interest in tracking those very IC personnel, by observing their activities within social networks (and not just Ning ones).  No spectacular logic needed for that.

The CIA has had some challenges in understanding their field presence within the Long Tail. 

Continue reading

%d bloggers like this: