Creating a Smart Nation: Strategy, Policy, Intelligence ... · Creating a Smart Nation: Strategy,...

17
SPECIAL FEATURES Creating a Smart Nation: Strategy, Policy, Intelligence, and Information Robert David Steele-Vivas* In an age characterized by disributed information, wher e majority of the expertise is in the private sector, the concept of "entral intelligence'is an oxymoron. The greatest threat to both national security an4 national economic competitiveness is ignorance-uninformed dcision making. Inielligence communities are slowly discoverng that they should not send a spy where a schoolchild can go, and that spie ar not harnesing the vat distributed intelligence of the private soctor. Unfortunately, the culture of intelligence in moat countries believes that its uniqu:nes rests on secrets rather than thinking-on producing secrets rather than informing polcy. To survive in the 21st century, every nation must become a smart nation" and engage all of its citlzns-every citizen must be a collector, producer. and consumer of intelligence-and, thus, crate the Virtual Intelligence Community. To .tegrate and make the best use of both open-source intelligence and traditional clisified intelligence, each nation must establish a National Information Strategy wlhich addreasse connectivity, content, coordination, and computational security. This a::icle outlines both the requirement for, and a recomm'ended approach to, the creation of a National. Information Strategy. Despite the fact that we have leaders in both .ae administration and the legislature who understand the critical importance of iafrf nation as the foundation for both national security and national competitiveess at ' dawn of the 21st century, our leadership has failed to articulate a strategy and a lAicy which integrates national intelligence (spies, satellites), government in'.,rnation, and private-sector information objectives and resources. .,Il *D aft corrpondmnc to: Robet Dav Stek..Vhw. 1005 Lation Arms Cor: . O lakto fi 22114.1007. Governmnt lformadoa Quaterly, Voume 13, NuWmbe 2, p"a 15173. All rh of reprodto any form rmmad. IS8N 07444MX. 387

Transcript of Creating a Smart Nation: Strategy, Policy, Intelligence ... · Creating a Smart Nation: Strategy,...

Page 1: Creating a Smart Nation: Strategy, Policy, Intelligence ... · Creating a Smart Nation: Strategy, Policy, Intelligence, and Information Robert David Steele-Vivas* In an age characterized

SPECIAL FEATURES

Creating a Smart Nation:Strategy, Policy, Intelligence, and Information

Robert David Steele-Vivas*

In an age characterized by disributed information, wher e majority of theexpertise is in the private sector, the concept of "entral intelligence'is an oxymoron.The greatest threat to both national security an4 national economic competitivenessis ignorance-uninformed dcision making. Inielligence communities are slowlydiscoverng that they should not send a spy where a schoolchild can go, and thatspie ar not harnesing the vat distributed intelligence of the private soctor.Unfortunately, the culture of intelligence in moat countries believes that itsuniqu:nes rests on secrets rather than thinking-on producing secrets rather thaninforming polcy. To survive in the 21st century, every nation must become a smartnation" and engage all of its citlzns-every citizen must be a collector, producer.and consumer of intelligence-and, thus, crate the Virtual Intelligence Community.To .tegrate and make the best use of both open-source intelligence and traditionalclisified intelligence, each nation must establish a National Information Strategywlhich addreasse connectivity, content, coordination, and computational security.

This a::icle outlines both the requirement for, and a recomm'ended approach to, thecreation of a National. Information Strategy. Despite the fact that we have leaders inboth .ae administration and the legislature who understand the critical importance ofiafrf nation as the foundation for both national security and national competitiveessat ' dawn of the 21st century, our leadership has failed to articulate a strategy anda lAicy which integrates national intelligence (spies, satellites), governmentin'.,rnation, and private-sector information objectives and resources.

.,Il

* D aft corrpondmnc to: Robet Dav Stek..Vhw. 1005 Lation Arms Cor: .O lakto fi22114.1007.

Governmnt lformadoa Quaterly, Voume 13, NuWmbe 2, p"a 15173.All rh of reprodto any form rmmad. IS8N 07444MX.

387

Page 2: Creating a Smart Nation: Strategy, Policy, Intelligence ... · Creating a Smart Nation: Strategy, Policy, Intelligence, and Information Robert David Steele-Vivas* In an age characterized

CGOVERNMENT INFORMATION QUARTERLY Vo. 13/No. 2/1996

In the Age of Information, the absence of a National Information Strategy istantamount to abdication and surrender-the equivalent of having failed to field anarmy in World War n, or having failed to establish a nuclear deterrent in the ColdWar. This article is both an orientation for citizens and bureaucrat and a call to armsfor policymakers and legislators. It is a fundamental premise of this article that in theAge of Information, the most important role of government-at the Federal, state, orlocal level-will be the nurturing of the "information commons."' National securitywill be largely a question of protecting information infrastructure, intellectual property,and the integrity of data. National competitiveness will be completely redefined-corporations and individuals are competitive in a global economy-and it is the roleof nations to be "attracive" to investon. How nations manage their informationcommons will be a critical factor in determining "national attractiveness" for investmentin the 21st century.2 This article address and defines the challenge of change; theinformation commons and information continuum; the theory and practice ofintelligence in the Age of Information: the ethical, ecological, and evolutionaryimplications of this approach; the need to reinvent and integrate national intelligence(spies and satellites) into a larger network of distributed intelligence largely accesibleto citizens; and, finally, the concrete elements which must comprise the NationalInformation Strategy.

THE CHALLENGE OF CHANGE

As we enter the 21st century, we arc faced with several dramatic challenges, confrontedby order-of-magnitude changes that defy resolution under our existing paradigms andorganizational or policy structures.

The most obvious challenge to government as a whole is the changing nature of thethreat. Since th: rise of the nation-tate, with its ctizenship, taxation, and standingarmies, the mc . fundamental national security issue for governments has been thesanctity of its b. rders and the safety of its citizns and property abroad. Physical securitymaintained b- threat of force was easy to understand and easy to implement. Today,we face a wv-rld in which transnational criminal gangs have more money, bettercomputers. 1 :tter information, and vastly more motivation to act and to act ruthlessly,than most tles, Perhaps even more frightening, we face a world in which we areallowing te.. nology and limited policy undersanding to create very significant massesof displss -ed and alienated populations-including sizeable elements within our ownborders; the same time, we are ignoring our government's obligations to providefor homr. eefense, for electronic civil defense, in the private sector.3

There . another important change requiring government diligence, and that is thechange :i the role of information as the "blood" of every enterprise, every endeavor.Three aspects of this change merit enumeration: first, each citizen, whether consciousof this fact or not, is increasingly dependent on accurate and timely information inorder to be fully functional; second, the "information explosion," like a major climaticchange, is making it difficult for citizens accustomed to slower times and simpler toolsto adjust to the requirements of life in the fast lane of the information superhighway;and finally, most citizens, stockholders, and business managers do not realize that wehave national telecommunications, power, and financial networks that have been

388

160

Page 3: Creating a Smart Nation: Strategy, Policy, Intelligence ... · Creating a Smart Nation: Strategy, Policy, Intelligence, and Information Robert David Steele-Vivas* In an age characterized

Ceat/ng a Sman Nation

designed without regard to security or survivability.' It is not safe, today, to work andplay in cyberspace, and we do not even have a body of law that requires communicationsand computing providers to assure their customers that their services and products aresafe and reliable 5s

In brief, we now have an information environment in which every citizen needs tobe a collector, producer, and consumer of "inrlligenoc," or docision-support; and atthe same time, we have an extraordinarily complex and fragile informationinfrastructure which can be destroyed, disrupted, and corrupted by single individualsor small groups now capable of attacking our information infrasructure nodes throughelectronic means or simple physical destruction-and able to do so anonymously.

DEFINING THE "INFORMATION COMMONS"The "information commons" can be viewed-as the public commons for grazing sheepwas once viewed in old England-as a shared environment where information isavailable for public exploitation to the common good. There are three majorinformation "industries" that must contribute their fair share to the commons if thecommons is to be robust and useful

The first, relatively unknown to most citizens, is the U.S. intelligence community,traditionally associated with spies and satellites. In fat, between 40% and 80% of theraw data going into the final products of the intelligence community comes from "opensources--from public information legally available. 6 Unfortunately, this S25 billion-dollar-a-year community buries its open source acquisitions in the "cement overcoat"of classification, with the result that most of the useful public information acquiredby the intelligence community at taxpayer expense is not, in fact, made available tothe citizen-taxpayer.

The second, well known to most citizens as a massive bureaucracy which generatesregulations and imposes taxation, is the government. The government is nor, however,known for making information available to the public, and this is an extraordinaryfailure, for it turns out that not only is the government acquiring enormous stores ofinformation at taxpayer expense on every imaginable topic, but the government alsoserves as a magnet for vast quantities of information which it receives "free" from othergovernments, from thinktanks, lobbyists, universities, and every other purveyor of aviewpoint desiring to influence the bureaucrats who comprise the government. In theAge of Information, governments must make the transition from the industrial model(vait bureaucracies attempting to deliver goods and services using a hierarchicalstructure to control resources) to the "Ihird Wave" model (small expert nodes nurturingdistributed centers of information excellence). There are some significant capabilitieswithin government intended to address this issue, including the National TechnicalInformation Service (NTIS) in the Department of Commerce and the Defense TechnicalInformation Center (DTIC) in the Department of Defense, but by and large governmentinformation is out of control. If the intelligence community is a S25-billion-a-yearindustry, then the U.S. government can safely be asumed to be at least a $250-billion-a-year industry.

The third "industry" capable of contributing to the information commons is the mostimportant, the most diverse, and the most dynamic-it is the private sector. This has

389

161

Page 4: Creating a Smart Nation: Strategy, Policy, Intelligence ... · Creating a Smart Nation: Strategy, Policy, Intelligence, and Information Robert David Steele-Vivas* In an age characterized

GOVERNMENT INFORMATION QUARTERLY Vo. 13/No. 2/1996

that mostjournalists publish only roughly 10% of what they know. James Baker, formerSecretary of State, notes in his memoirs that "in terms of fine-turning our own work,staying abret of the press commentary was particularly important." 2 Colin Powell,in his book, notes that when he was Military Assistant to thenSecrary of DefenseCuper Weinberger, he preferred the Early Brd with its compendium of newspaperstories" to the "cream of overnight intelligence" which was delivered to the Secretaryof Defense by a Central Intelligence Agency (CIA) courier each morning." In a directand practical example, the U.S. Southern Command, working with the Los AlamosNational Laboratory, was able-at very low cost-to exploit Latin Americaninvestigative reporting such that tactical interdiction missions could be planned andexecuted based primarily on media reporting." This is not to say that media sourcesare superior to classiied intellignce, only that they cannot be discounted and areespecially useful to those in the private sector and in much of government who do nothave authorized access to clauified information.

Finally, we have the government, including state and local governments and theirinformation holdings, the Department of Defense, and the intelligence community.These are not examined in detail here. However, it bears mentioning that in the absenceof a policy supportive of information archiving and public dissemination-and themeans for implementing that policy-vast stores of information reaching the U.S.government, including information collected and processed by contractors to the U.S.government, are being "buried" each day, needlessly depriving the public of significantinformation resources. For those in government who are overwhelmed by their owninternal "information explosion" and at a loss for how to handle their archiving,Freedom of Information Act (FOIA) requests, and the complex issues of copyright,there s a solution: the National Technical Information Service (NTIS). 1"

INTELLIGENCE IN THE AGE OF INFORMATION

Having explored in general terms the elements of the information commons and theinformation continuum, we now must focus on the specifics of intelligence in the Ageof Information." Among the core concepts that government and private sectorinformation managers must adopt and promulgate are:

* Espionage, whether by governments or corporations, is less cost-effective thanintelligent exploitation of open sources. Unfortunately, most intelligenceoommunities are trained, equipped, and organized to do secrets, and they are notwell positioned to collect and integrate open sources-public information-intotheir analysis and production proceses. This needs to be changed and is discussedfurther below.

* The best target for the application of intelligence methods (requirements analysis,collection management, analytical fusion, forecasting and visualization ofinformation) is not a competitor organization but rather the customer and theenvironment.

· Decision-4upport (intelligence) is the ultimate objective of all informationproccsses. One must carefully distinguish between dwa, which i the raw text,signal, or image; iformation, which is collated data of generic interest; and

392

164

Page 5: Creating a Smart Nation: Strategy, Policy, Intelligence ... · Creating a Smart Nation: Strategy, Policy, Intelligence, and Information Robert David Steele-Vivas* In an age characterized

Creatng a Smat Nation

intelligence, which is information that has been tailored to support a specificdecision by a specific penon about a specific question at a specific time and place.Most government information and so-called intelligence products are so genericu to be relatively useless in directing action. Only when information serves asthe foundation for intelligence can its cost be justified.

* Distributed information is more valuable and yet less expensive than centralizedinformation. The art of information governance in the 21st century will focus onharnessing distributed cnters of excellence rather than on creating centralizedrepositories of information.

* "Just in time" information collection and intelligence production is far lessexpensive and far more useful to the consumer of intelligence than 'just in case"collection and archiving.

* The value of information is a combination of its content, the context within whichit is being used, and the timeliness with which it is obtained and exploited. Thismeans that information which has been used by an organization declines in valuewhen taken out of context and after time has passed. This, in turn, means thatthere is every reason for an organization to barter, share, or sell information (e.g.,market research) once its "prime" value point has passed. This is especiallyimportant to an organization u a means of increasing it acquisition of newinformation which-in its own context and time-has greater value than whenit was lying fallow in the information commons.

· The new paradigm for information acquisition is the 'diamond paradigm" inwhich the consumer, analyst, collector, and source are all able to communicatedirectly with one another. The old paradigm, the 'linear paradigm" in which theconsumer went to the analyst who went to the collector who went to the source,and back up the chain it went, is not only too slow but is also unworkable whenyou have a fast-moving topic with many nuances that are difficult to communicate.Today and in the future, the information manager' greatest moment is going tobe when a consumer can be put in direct touch with exactly the right source whocan answer the question directly, at low cost. by creating new knowledge tailoredto the needs of the consumer, at that exact moment.

* The most important information resource is the employee. Every employee mustbe a collector, producer, and consumer of information and intelligence. This iscalled the "corporate hive"" model, and it is the foundation for creating a "smatnation." If every personnel description does not list as task number one: "collectand report information useful to the organization," and if organizations do notprovide a vehicle (e.g., Lotus Notes) and a protocol for sharing information amongemployees, then by definition the organization is "dumb."

* Published knowledge is old knowledge. The ar of intelligence in the 21st centurywill be less concerned with integrating old knowledge and more concerned withusing published knowledge as a path to exactly the right source or sources whocan create new knowledge tailored to a new situation, in real time.'

* The threat (or the answer) changes depending on the level of analysis. The mostfundamental flaw in both intelligence and information today is the failure toestablish, for each question, the desired level of analysis. There are four levelsof analysis: strategic, operational, tactical, and technical. These, in turn, are

393

165

Page 6: Creating a Smart Nation: Strategy, Policy, Intelligence ... · Creating a Smart Nation: Strategy, Policy, Intelligence, and Information Robert David Steele-Vivas* In an age characterized

GOVERNMENT INFORMATION QUARTERLY VoL 13/No. 2/1996

influenced by the three major contexts of inquiry: civil, military, and geographic.,A simple example from the military sphere will illustrate the importance of thisissue. Examining the capability of a specific Middle Eastern country in the missionarea of tank warfare, it was found that while the initial threat assesment (bysomeone unfamiliar with the levels-of-analysis approach) was very high becausethis country had a great many modem tanks, in fact the threat varied ignificantlydepending on the level of analyis. Only at the technical level (lethality) was thethreat high. At the tactical level (reliability), the threat was, in fact, very lowbecause the crews were not trained and had poor morale, and the tanks weregenerally in storage and not being mainined. At the operational level(availability), the threat increased to medium because there were large numbersof tanks widely scattered over the country. At the strategic level (sustainability),the threat dropped again to low because it would be almost impossible for thiscountry to carry out extended tank warfare operations, even on its own terrain.This approach can and should be applied to every question for which intelligenc-tailored information-is to be provided.

ETHICS, ECOLOGY, AND EVOLUTION

Our "Indusrial Age" concept of intelligence and information has relied heavily on acentralized, top-down "command and control" model in which the question virtuallydetermined the answer, and the compartmentation of knowledge-its restriction to anelite few-has been a dominant feature of information operations. This article suggeststhat the true value of "intelligencc" lies in its informative value, a value which increaseswith dissemination. The emphasis within our government, therefore, should be onoptimizing our exploitation of open sources, increasing the exchange of informationamong the intelligence community, the rest of government, and the private sector, andproducing unclassified intelligence. This could be called the "open books" approachto national intelligence."

As we prepare to enter the 21gt century, we must ask ourselves some fundamentalquestions. How do we define national security? Who is the customer for nationalintelligence? What is our objective? There appears to be every reason to discard oldcocepts of national security and national intelligence and to focus on developingindmrated nationwide information and intelligence networks which recognize thatnational security depends on a solid economy and a stable environment; that the centerof gravity for progress in the future is the citizen, not the bureaucrat; and that ourobjective must be to enable informed governance and informed citizenship, not simplyto monitor conventional and nuclear threats.

I am convinced that the "ethics" of national intelligence requires a dramatic reductionin government secrecy as well as corporate secrecy. After 20 year s an intelligenceprofessional, I am certain that secrets are inherently pathological, undermining reasonedjudgement and open discussion. Secrets are also abused, used to protect bureaucraticinterests rather than genuine equities. Consider the following statement by Rodley B.McDaniel, then Executive Secretary of the National Security Council:

394

166

Page 7: Creating a Smart Nation: Strategy, Policy, Intelligence ... · Creating a Smart Nation: Strategy, Policy, Intelligence, and Information Robert David Steele-Vivas* In an age characterized

Creatng a Smw Nation

Everybody who's a real practitioner, and I'm sure youre not all naive in this rgard,realizes that there are two uss to which ecurity clauifLcation is put: the legitimatedesire to protect screts, and protection of bureaucratic turf. As a practitioner ofthe real world, it's about 90% buraucratic turf and 10% legitimate protecion ofsecrets a far as I'm ooncerned.

A wise man once said: "A nation's best defense is an educated citizenry." I firmlybelieve that in the Age of Information, national intelligence-unclausified nationalintelligence-must be embedded in every decision, every process, and everyorganization. The "ethics" of openness needs to apply to the private sector as well asto the government. Universities should not be allowed to hold copyrights or patentsif they are not able or willing to disseminate knowledge or commercialize technology.Corporations should not be allowed to monopolize patents solely to protect archaicproduction processes.

The environment in which we live, in which we hope to prosper and secure thecommon defense, is our most important intelligence target and our mott neglectedintelligence target. Our traditional intelligence community and our more conventionalgovernment information community both appear reluctant to take on the hard issuesof honestly evaluating the larger context within which we export munitions, keep theprice of gasoline under two dollars a gallon, permit unfettered gang warfare andexploitation within our immigrant communities, and so on. At what point are we goingto establish an architecture for integrating Federal, state, and local data about thenatural environment and for producing useful strategic analyses about specific political,economic, and cultural issues? The following paraphrased observation by EllenSeidman, Special Assistant to the President on the National Economic Council, isinstructive:

CIA reports only focus on foreign economic conditions. They don't do domesticeconomic conditions and so I cannot get a straegic nalyi that compares andcontrasts trengths and wcaknsses of the industries I am responsible for. On theother hand, Treasury, Commerce, and the Fed are terrible at the business ofintelligence-they don't know how to produce intelligence.2

Taken in combination, what we do out of ignorance to our environment each daythrough our existing energy, trade, defense, housing, transportation, and educationpolicies is far worse than a whole series of Chernobylh.

Finally, if the nation is to evolve, if it is to "harness the distributed intelligence ofthe Nation," as Vice President Al Gore has taken to saying in his many speeches onthe National Information Infrastructure, then we must come to grips with the fact thatwe are "losing our mind" as a nation and that education isthe "boot camp" for nationalintelligence. We must revitalize our educational system, including corporate trainingand continuing education programs, and realize that openness is a powerful catalystfor bringing to bear the combined intelligence of every citizen and resident. Insteadof "National Intelligence" (spies and satellites) bearing the burden for informing policy,we should rely upon "national intelligence" (smart people) and use our distributednetwork of educated scholars, workers, information brokers, journalists, civil servants,

395

167

Page 8: Creating a Smart Nation: Strategy, Policy, Intelligence ... · Creating a Smart Nation: Strategy, Policy, Intelligence, and Information Robert David Steele-Vivas* In an age characterized

GOVERNMENT INFORMATION QUARTERLY Vol 13/No. 2/1996

security in the information age, require a depth and breadth of commitment toinformation as a commodity; to information au a substitute for time, space, capital,and labor. Information-applied information-is vital to both our defense and ourprosperity.

Connectivity is but one of the four major elements of what must soon become aNational Irformation Strategy. For those counseling the incremental approach,"connectivity today, content tomorrow," one must say: it will be too late. The fragilityof our position in the world, in terms of brain drain," budget deficit, and electronicsecurity, all require that we establish a four-point integrated program, as outlined below,immediately.

* Connectivity. Such a strategy should build upon the Nl as its technicalfoundation, but provide for three additional elements:

* Content. Existing government programs, under the auspices of a NationalInformation Foundation within the White House, should provide incentives forall elements of the information continuum (K-12, universities, libraries, business,information brokers, media, government, defense, and intelligence) to put contentonline; only in this way can we establish a robust national "information commons"and give Robert Reich's symbolic analysts something other than a starvation dietIt is vital that we establish a means of nurturing distributed centers of excellencethroughout our nation in all topical areas, providing all sectors with incentivesto place encyclopedic information into the 'information commons" and, thus,stimulating productivity. Just S billion a year invested in this program could yieldenormous productivity and competitiveness gains across our entire private sector.Within government, we should dramatically acclerate NTIS involvement instructuring and digitizing information now in the possession of the governmentbut not .-vailable to the public.

· Coordi, ation. Using a body similar to those now orchestrating Nil technicalissues. focus on resource management across government and private sectorboundaries in both technical and nontechnical (content) arenas. There is no goodreason why hundreds of major organizations should be wasting approximatelyS2 billion a year creating hundreds of variations of a basic multimedia analysisworkstation. There is no good reason why hundreds of corporations and otherorganizations should be wasting enormous sums collecting and processing thesame encyclopedic information about foreign countries, companies, andcapabilities. Presidential leadership would make a difference and save the nationbillions of dollars annually, not only within government but across the privatesector.

* Communications and Computer Security, We have a house built. over ainkcholel The vulnerabilities of our national telecommunications infratructure

to interruption of services as well as destruction, degradation, and theft of dataae such that experts feel comfortable in predicting that-unless we are able toestablish a major Presidential program in this arena-we will see a series ofenormously costly electronic attacks on our major financial and industrialorganizations, generally undertaken by individuals who stand to benefit financiallyfrom degraded or interrupted performance. The current generation of systems

398

170

Page 9: Creating a Smart Nation: Strategy, Policy, Intelligence ... · Creating a Smart Nation: Strategy, Policy, Intelligence, and Information Robert David Steele-Vivas* In an age characterized

C/taUng a Smun Nuion

engineers was not raised in an environment where security was a necessary elementof design. At every level, through every node, we are wide open-and in anetworked environment, one open house contaminates the next.

Such an integrated program could be establijhed using exiting resources. The costsavings from the elimination of redundant and counterproductive investments ininformation collection and information technology acros government departments andinto the private sector would also make a substantive difference against the defcit.2

CONCLUSIONWe are a smart people today, but a dumb nation Our national security and our nationalattractiveness as a site for international investment which permiu our citizens to prosperarc both at risk. We have no alternative but to completely redefine the role ofgovernment to emphasize its responsibility for the nurturing of our national informationcommons, and to redefine national intelligence so as to create a Virtual IntelligenceCommunity in which every citizen is a collector, producer, and consumer of intelligence.To do this, we must have a National Information Strategy.

NOTES AND REFERENCES

1. Lee Felentein of the Interval Resarch Corporation is the oriinator of the term informationcommons." He can be reched at (415) 34-0857 or <3mcintervLcom>.

L2 I am indebted Lo M. Katrina Swuon, PhL of Lurd University. who brough: to my atention thework on 'National Security & National Compedtiven: Open Source Sohtionr" Int' ti g , herviews are consisent with thoe of Secrtay of Labor Roben Reich, who define= "U.S. companie'u those that employ U.S. citzen and pay U.S. tax. See Ln Oxelheim, "Foreign Dirct Invertnentand the Liberalltion of Capital Movements in the Global Rie for Foreign Direat i mnm,' inProspctsfor the Fute, edied by Lan OxeIheim (Berin: Springler-Veri, 1993).

3. 'HEcken are not the thrat. As [ have noted on many ocaiown, hacken au a national reourO becauethy et forcing us to aeknowledge that "he emperor i naked.' Sherry Turkice in 7> Second SFeoComnpues and the Hwman Spht (New York: Simon & Schuster, 1984) xmines the oriiim of hcn"t MIT and demonrate conchusivy tha the backer etic i identical to 'te riFht suf sociatd with

the early autronaut-both push the edg of the envelope trivin for exfllne The aaul "thret' toour nationl information infratuctu beg with bad engineering and culmnt primly in wthorddmn doing unauthazr thin%. David loove, lei Sep, and Wiliam Vo Storh note in ConpusCrm' A Crimwfgth' Hndbook (ebaopol, CA: O'teiy A Afoci& t, 1995) that eomic lo1.uodated with oomputers a atributed u followm: S% to human error aad 20% to physica dptidonsuch as natuna diuaem or power fauel (one could ay, poor computer degn), 10% to dkIhomnemployee; 9% to dfatuled employee; 4% to virus; and only 1-39 to outsider auiaI.

4. Tbe seinal work in th area is Winn Schwarau, fonrmatlon Werfare: Chao on the 5actrontSuprhghway (New York: Thunder Mouth Pru. 1994). Thoughtful papers on the vulnrability ofspefic networks include Maj Gerald R Rust, Taking Down Teloommunicationa (School ofAdvanced Airpower Studies, 1993); Msj Thomas E. Oriffith Jr., *Straei Attack of National ElotrcalSyftema" (School of Advanced Airpower Studie, October 1994); and H.D. Arnold, J. Hyuki, J.Keeney. and A Cameron, Tarpting Financial Systems a Cente of Gravity: 'Low inenmiy' to 'NoIntmenty' Conflict," Dfmn AWlyjis, 10(2, 1994).

S. One maor U.S. government agency, extrmelycompetent in computinintercpted all eommunicaionand computing hardwar and softwar re hing iu loading docks for a period of one yr. It found500 sparate vinues contained in ahrink.wrapped product coming straight from the factory.

399

171

Page 10: Creating a Smart Nation: Strategy, Policy, Intelligence ... · Creating a Smart Nation: Strategy, Policy, Intelligence, and Information Robert David Steele-Vivas* In an age characterized

GOVERNMENT INFORMAT1ON QUARTERLY Vol. 13/N 2/1996

6, The Director of the Canadia Seurfy Wd Ielinec Svice, Ward Eloeck ha. ned publicl tht80W of the input for fnished intllgxence products oom from open sourou; the Candn rvicoe alsomakes it a point to publish unclasidf iwntUIgte report. Although the U.S. intalliaoe communnyoaly aknowlodge 4096 a the offkia contibWion of open sourcs, the former Drector for Sadeo& Technoloy hs nated publicly thu the i e is actally 709% h i pouible be mispoke.

7. Although everal unaon, including PNe Druncei, hav addremd rdnventon and rwngieeringimperativu in reltion to the bformaion a none have done more to help public uIderandi thanAlvin and Heidi Tofer with their books APowSh: X.owwieg, Wealt h, "d Vkne a t the *dof the 21n CiNury (New York: Buanam 1990) and War ad Ann. f': Survivea the ewn ofthe2In Conn y (Boston MA: Little Brown, 1993).

8. Poinu of coanta a , repectively, Critopher Fit u (408) 647-4193, Robet Heibcl at (814) 8L22117,Mad Gooffrey Fox t (315) 443-1722

9. Poinu of contt ut, mpectivrb', Brenda Biley a (303) 758-030, D vid Bender at (202) 234700,and Churl Baley, Jr.. u (713) 743.9t4.

10. During annua conferene of middkeged hacker, popularly know us the Lake Tahoe Confence,there was a discuion of what return on iawtcn:e one recdved from volunteering information intothe Iontnt. The geners conuens wsu tha for every piece of nformaion that one conribued tothe ommons, 100 pioc were recivd in rtrn, of which 10 were atually weful. Ten-ao-w returon inve<.t--t hiiu lrtnruive.

11. Poins of cowt ae forOxford Anaycla. Robin Porteu t (44 86) 261600; for FIhN'/SVPJoepbCoritore u (212) 64-4500; for Kroll Aociat, Tom Fedorek a (212) 593-1000; for Burwel Enwrprws,Joane Piolino u (713) 46-3500 ext. 2353; for LEX1S-NEXIS, Jcfrwy Kratttnmmker a (513) 865177; a for ISt Frank Spieker t (21S) 3860100, extrion 1374.

12. Jame A. Baker, III, The PoIrtcs of Dplomacy: Revowfon, War & Pce. 199-1992 (New York:O.P. Putnam's Sow, 1995), p. 154.

13. Colin Powet, My Amerten Journy (Random House, S19), p. 293.14. Thir excidtn story, by the princpal invtiptor at Lo Alamo N?'ionaJ Lbontory. is containd in

Jtme Holdn-Rhode, Sharng the Sccreu Open Sowur InswUltc and trh Wo on Drus(Albuquerque: Univenity of New Mexico Pre, 1994). The vrious laboatories of the Depatmrneof Eoery are, in fac, the ation' most important open sourc Lntellieoe aust, and very importaneumpl of why we can no longer afford to compartmen claified intll-gee apanr from reat ofpovtrnmtat information.

15. NTIS u a self-4utainlng rpnization under the overdiht of the Deprtment of Commece which playsa ignfLc-, t role in helping the Pederal governant incr the dieminatlon of unclauiioformtion to the privere sctor. The ening and euUy scalable global muti-sedic dis minutirncapability, including an innovative parothip with Kinko'l, i the Efn ntep in briansi 21itceaturyttandards of ocountabilty xnd aoelbily to governmnt recordi creatd t taxpayer expene. NTSi a criticl plyer in helping 1 element of the Federal government, on volutary bu, emublthaccesmabb acd coutable electronic reroon; embed bibliop!phic ructur in their record; etabliha online presce through PedWord; uad dnmuiclly imarese public at to useul iformation.

16. My keyote speech to the Asocition for Global Srtic Iaformation (AOSI) oomauid many ofthese opertionl cocepts and bu been reprinted u "Aoe Th:e Theheory and Prctic of CompetitorlatcUlien" wJowurl of GSf(Ju1y 1994). My mont developed work in ths m, funded by the Prefch

ovenument, i my white paper, "'Aom: Theory and Prctic of Intelligece ia te Age of Information"(October 26, 993).

17. Paul Evan Peters, Executive Ditor of the Coalition for Nworked Information, is the oridnaorof ths co ptept. He can be reaeod at (202) 296S5098.

18. Kevin Klly, CO of ControL te K aof fNeo.3old CivfMrtfon (Readin, MA Addson-W ,ey1994), provide a brilliant epotiton of why, in a vry complx global systm driven by information,organic wrlfbealing and relativly autonomou elementu must be accepted ad rtud-it I impossibleto control complexity in a centraied preplanned ftdhon. Th oo aonered about the frailty of owriWorma'on lafutructure would do well to red Kelyl work, u well u one predating him by 10 yer.ChUee Pwrowl Normal A cciddnts: L*M A with lfh-RIsk TechndoloW(New York: Baei Books, 1984).Simple tsytem have inge points of failure ey to dia4noe. Complex ynsem have muiple poinuof failure dr'tSlc to diarpoe. Today we have a onrtellaion of very complex information ystet.

400

17;

Page 11: Creating a Smart Nation: Strategy, Policy, Intelligence ... · Creating a Smart Nation: Strategy, Policy, Intelligence, and Information Robert David Steele-Vivas* In an age characterized

Creating a Smat NtWon

19. We kesp forgeting that booh were .caily wrien ua disertations or ared roughly 10 ywas beoreially appearing in print article Ire pgenlly 10 mormi or so old; and een newpaper storimest let a day if not 3-10 days okLi Withi auademc cid , it b wll-known that if ot ms 1 reodving

thb drafts of works in propes aad the preprn, it is simply not pouibbe to be a rious oampeitorin the rld.

20. At the itrategic level, cvil llies. pogrphic location, and military tainabllity am critical At theopational evel civil intabity, VoVrphkc mourm, and mity Albilitr y aety porant. At thetcal lcvl, civil psychology, pognph c trran and miltary relability datrnine outcome s At thetochnical level, vil infratruafure, pographic atmophere, and military lihUllty a the foudmtonfor planninn and employment. This 1I an oriiul analysi model developed by the author while rvinga the Deputy Dirtor and Oeior civiHan u the new Maine Corps Inteipecem Center in Quatico,Virginia At the tie, examinin al producs from the Ccnral Intclligenc Apncy and the DeeneInteliraoce Apncy then in hand, the author ditcovrd tha none of the products upported a pecif&detoion and tha none of the produc wu related to any speck level of analyti. Everything wa

eneric, topickL a *"lpeshot,' virtually usmlen to a pohcymrkw or coanader.21. Tha sction dnra on a fuU-lenth ticle, E3i: Ehi Ecology, Evolution, Lad Intellne,'ptblisb

In the hok Earth Review (FPaI 1992).22. Althoug Alvin and Heidi Toffler h called me "the Vrear enemy of secrecy' n the United Sta.e

(in their book Wia ad Ai- War), that s not quite corrt. I am an enemy of unnmuca y merecybecause it corsu a reat deal-not only in dolla but also n trm of oppomurtun s. My complet viewsarc s forth in my "Tetimony and Commenu on Executn Order 12356, 'Ntional SecuritylnformAlon.'" provided by invittion to th Preaddatil Inter-Agency Tak Forc on Ntional SecurtyInformation, Department of Jusice, June 9, 1993. believe that we hould all be trong advocatsof "no claiication without jutlctiroa."

23. He wu spekdng in 1990 to a poup of govenent employa selected for increeed reponibility andatending a Hrvard Executive Program Cited in Thomr P. Coaklcy (d.), C'I: Isuea of Commandaad Control (National Defense Universty, 1991), p. 68.

24. Seidman wau spekia to the Open Sowe Lunch Club on January 1, 1994. Her obeevation ersubeequently rported in OSS hoticu 94001 dated February 21, 1994.

25. Amon my many peches and publicatios in thi area, the followia are especially pertinet: "NationlIatellnoe Stnregy-Neded lnitiatves," speech to the Naional Deense Univenity PoundationlNatonal Industrial Security Assodtion Symposium on The Global Informaton Exploion A Thto National Security, May 16, 199S (with AMn Toffler, Bo Cutter, Emett Paip, Robert Johnson,and Bill Studenn); lNatlonl Intellipoe--The Community Tomorrow?.," speech to the SecaityAfairs Support Aodtion Spring Symposium, National Seurity Apncy, April 20, 1995; PrivateEnterprise Intelliec: lu Potential Contrbution to National Security." paper proeeted to theCanadian Intellignce Community Conference on Inteullnce Analsi and Asaument, October 29,1994; and "A Critical Evaluation of U.S. National Intelligce Capailitie" Inhnational Journal Qfhuallwc ond CoMwrintetwh n (Sumer 1993). I have also provided invited tstimony to theCommision on Intefllpne an the House Permnmt Select Committe on atellignce.

26. One authority, Paul Strassmann, etimate tht in information housekepin coU alone S22 bflioncould be saved over seven yten. This I apart from policy vintp derived from improved intelliiencetuppot. Strusmann ha been Director of Defena Informuion and Chief nformation Offer of theXerox Corporation and other major companies. Hi books, including Th PoUler of h/rorwtioManatement. Te Bwinru Value of Computr, and Information PayQff, arc all exceptionl.

401

173

Page 12: Creating a Smart Nation: Strategy, Policy, Intelligence ... · Creating a Smart Nation: Strategy, Policy, Intelligence, and Information Robert David Steele-Vivas* In an age characterized

e- « w ' ' E "'- ¢ . j= 3 . . S UK£

Z ° C -° *.uC o C U - 0 . UE _ = 3 - - ^ X E ' ̂ ' E-E Ej

C 5 ' - O ?3n 3 _ 3 = 3 D > · , -| o - u ^ g - _ r D*

E*^*S E Vs )s

(5-^ E > ^1 c f r^ Se *.S-S 3 3' = =.=-G c' 8. ,.O. _ ^M - U F ~ - c ; >.3),,2' -~, i -.Sg , - >' - _

y > »0 g =-_ v g =s ._ _ ._ >i.= ~ ° _A c-=s

_E _ z _ c __jy i-lilQ=- u__._ ur -- l . ?<|'--~> u ~ ,_) O ?'-- ~ .. u :3 ~ ;;.= ~ , .

.,~ - E 'FI - .u* 5

J:3') CIiS C - = '= ''3ri£ ^ *? = *^'5sC C-

l E l" =-- u3 -.. i

vgE

.

V'oC:,. - -«j

~gE '

c

I.=

c C

, * .

e n£

T

cn _

-~_

, c

D .

;- >s> _

'.~ rs

-

_ _

CY

_ C^

- C5

A. _

7c,o

=

rao C

=,

-. 'J

Cs -

| C

g Ec.

* a

,o U< p£:2to >;UJ'

CIaa

a )

CL &-

-E > P V,C, 5 E 0 cj O.2 M 9 I- O u

co «* ^.bC

A- U- 3 ea a o. c .

C2 = m T >»-ca T 'vy

<Ul

<

Ca 2 ec c -, f '7

'I -5 a 11 t-

ccm 0Z

. aQ t-i|fflu cc>M i 0o0 WlL

'S

. aiL.

M Mcm EQ OEC :e iE

4n In Q aO En CM rI

a 8 § S |,. ~~~~~~:=P z |8 g §,' e e ;&= =

,. C - . ,to^- OeSm

.. '~ - :st o g a' .= ,oS, ti°1 II sip^~~~~~~',

I i srlP9 i

402

402

Page 13: Creating a Smart Nation: Strategy, Policy, Intelligence ... · Creating a Smart Nation: Strategy, Policy, Intelligence, and Information Robert David Steele-Vivas* In an age characterized

u u')'*

P. „~ ~ . = oE'G-^ =c ' . u 03 1 ' ,s .! ' ('-·d a 2 § 8la.^5 IZ Ei u

U M ~~~~~~O P)Do ~ uu»|i^^-giil~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ S. = lt:r.jSil-r

~· ~3 n 3~~~ C > C E E (v, E' C E U n5 " Y I aJ -sg c~ g S-y-sy c -E

0 ~~~~~~~~- S0i Cal-^i g^ ^~ ~ llE rOa, OEOE E 0 I 0 2 7p OnV5 X V l o s oo E uZ )

3 g *'3 @ o~ c -aS 4u"' u:^ o- - ^ i~ ws U ls E °^ S js^0'e t §^ *?s ^ -- E^.2.1^

, - ~ ~ g , = ,. - .-- N a -5 · E 41 ) u .o · c - -u > ; u C

O ~8'-- .-. - 'c CZ CZ E = = -u U

.~ c . c ' _ o 'o - - ..

__ - =1 Cooc 'o =0' ~ , -r - ''- n-E~ ~ CIO E or' ,u .;- c . . . . ~

~~~~ ~~~a E E S E0 0 -u Uo u C C4 ep

.0 2En E>.=O '15 c 3 U= =.

ft ~ ~ ~ ~ ~ ~ . = lo co _ co.=u u a ~ =~c-ncE . L, E > Jo; :

I.- ,. E E 'O =_u. .

·* '"a- , '' ~ ' >' 1i;: -uO 78 , ' u: 0,~ .~ u _¢~~ _ .

uS, cc ~

~_ ~ ~~~~ -1 a L- = -. = -,, -"IE .=.'

_= = C'S Pi 3 V , 3C E Eeo j

- = 'Z a T=

C

a

t

a

un

<a

r-

b.a

w 3U

UAZ

cc

3

5ccfSu

5rJ.C

'~ c 5~ c~ = 1 M § 1 ; -E; = .= '= - = Z -= -- = v'= = °A E U·f S En~

'=c?^*g§S*5

SS*5e- .-- ^ ^S -; w~.^ 5- ^C[ -2i..-.:. 2 ,-;-.^ ..:3 S> u .- - £

. 7. .- =-~~Ulnvl ~ ~ ~ ~ ~ - - =o r.;....J-,-~u E u ·li-s ^iui-Fii E itH?~i-rmihaU.E

C Oe E -ys, . 'S S c- s="s!3^ = C =-E ->Z

?=-'._ ~. s >,.= _ r.

sn2 . a .i C. i

e ~ ~~~~~~~~~~~~~ ~ ~~~~~~~~ E Z Z E tu~C · U~a Z m u~

.3 UOC 3~~~~~~~~~~~~~~~~~~~~~~eCJ ~~~~~~~~3or C 3 sn or E~~~~~~~~~~~~~~~~M U 1u Uy~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~t3CO E1 o ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~I.-' a C a 'J a ~~~~~~~~~~~~~~~~~~iD-iiU ·3 ~ ~ ~ ~ ~ ~ ~ ~ t

u~=~~~U U e> = C e e U _ U

?

.~ '; : - -» " 'c S

o> a~ c c c£ ^^i~~~~S f X) c<s

_ _ 0 3 o ^ _ £ <

a ', *0 33 i-- O

u 0 -

._E "u. E u.; "

W ~~~~~~._.-'u ii ' ^ -' -

'- 'A .

Co E.*s-^^5 ^ g 6-. ' .-

'o '^^sa"Euto ^A

us C -.. - =~c. -9 2Sg gE.- t:- '~

= i-- .' C '5 -1 .-.

22 s 11W l |S l

i ~rj~ g*.S°§ 'sS,..';.2B« B.S S'~ .-

-t c .S ; ~ ~ {~' -= = -= = -' ._ ; = ^' 1 ^

t: S o -='= -~E "':=:=a ~_.> u c.~ . 3 " >, -

-=

--

6~~ ~~ .i... i-III

C. c t = " - a -

P_~~~~~~~~~~c es,-.= u

I. ':i.-, E'-o :C v ,uj | Wi <|Lo|

. .: ?sl.s^ ;.S H S2

c_ u .. ' u -- u --.E r- E t; .a'j 3 FS

£ w E|| p 7 :|E^llsl-jisi> ^

li-ll >S C l

" n .e° o c ,- u 3 u o 3 >

i ^3 50~ -Loe s ?c403

403

Page 14: Creating a Smart Nation: Strategy, Policy, Intelligence ... · Creating a Smart Nation: Strategy, Policy, Intelligence, and Information Robert David Steele-Vivas* In an age characterized

:.0 u ..,

f. ·= r- IB2 a)E*?J

·- .LI u :

C c

" > 2 a=c

. >, -

,- c: E

U' ° -u o o ,

0 LI.

?. -0.--

ICLI

6. L Ur

U' -5 c*.,.

C . .-- C-

3; - o L

5 "* 2 "'.2. 4 .I

U 0 InL

CCZ

0In

iail

-£*^0r> c.

c - .- LI

- LI- - -0 O .0 -

C U~ .11 I>*.

*3 LI 0 ^

'- U In.

0.. -

~._ c ===.c U" .

U l-- I

U 00

C l

'r- LI 0

» u- .g2

. , '-

C j

LIC%

5 gIn

.r -

>.'

-..uco,. > <c; .r- U

R

CC

0>9

CU2CULI

W

5

c

LI

U.5

0

LI

V

03

uI.

U

C75

0

'A

-11E.

oU

5r

6._= ._0 '=>,' o >

ej j .. 5 " i . Z ,..3 ,

C C

.E~ ~ . 2, C;

I I >- i -t

Uz 0 cLI.23

0aOCC3 0.0

* *C .0z

" C C* C CjC ^ %LI 5 05

>' E

. C' s " o > C

i U LQ

*I I 2 a

2..S 0.0=r~c2

In- .0 o

5.1I Ei C *L/' *-0. s

3'

C3 JS£ <In0

LI

4U

.58

u

.:0J=E

C%C15

.215

.0

COo.

u

U

0p

U

eu o

LI ~ .--

U - v

.=_=-

.'-;U

C- U 00

u

an0 '-J=

*>._ =, ~

£f.j c.,e,

'~=u

o >o 2

U .-: =

i.2 FS

6.H. 0 L

Inn

CI2E . *

InOLI

IJc

C'E

CE

U

.0

.0

U0

0

VI

s..0

(3

C0

LI

C.,

0C'3

.0

C

rL

0

mE

...

u

ci

J=

U

C

0

tj

-r->9

u

C

.0

i .5' 00. 't>C &*

G r

02 :ti:zQ

I;.

LI

.0.

0,0."E- .

&i

U

0A;UuC1II.C

>1

7j

'.3

c.

LI0

*~>C.U

0UI*0C;

t, C

- .0

'o

- -

0 oC

C IU =lc 0

~ 0

LI

'3 -

..

C LI

0 ^0

n &-J

^2

U 0. U

CU 0 *

._:3 i:

I In

C0 3

000^

- Cj.!CU2

^ -U5- .0 £i

0.20=CLI

LI 6.

U an

o 0 - -

· c- u - c-

0' 0 - 0

c...~ c _ *'^.

2 "= - . --3 0000 *

_: LI :L.--.=

-.£0 3~ 2-

2L 2 In 0

C.2 c i

" .1 S 2

" g >; 2 .

3 .2U .2 -

c1 0 . - o0? So In£

an 1'.^ ^

o U -c.

In -; -=

C .f3- 01 =O OLI U =.

0

C

L

C

. ._ z r- >~. =r -' j- r' ---

E : -U" co~G.E -U ,.0

E t 0 o :

I2o_ o..- U.;. C.- C .

Jl .«- 5 ^ ;

. u= . 0LI ==

C :

- 00

_ C- .

r - oa-§ - e' 30 .0-L

C'

U C-5 ,i,- I,, W ( J

_- .5 -o 3

* C UXI In ,.s0 C

CZ.

C C

C In 2 E L 0c

E 2- pus

25~~~~~-CLILI

§ ULIC"

a .2 0 0 .0>

0esI y >

c § ^ !=

3i

I1%UC

0

E50U

ei

e-

U

£

oC

LI

0a

U

VCe

0

0

U0

In

u

:_ -' LI

LI E

LE c,:u LI0 i> S an

.-- 5. =

e a S. .,=

U: -w

L5I

. C C

· -

toE 'A

!=00=_

E - , -

U..

.. - an.u

ULI- V.5

.2- .00

LI .-5 U LIj N In 0 I1

.- | SLS

-J ^|. ILI a-nLu u

U;u

U '4

C*3

t3E"s

c '-

- LI

0.5 -

0 e0

3 2C-

«0 '0

I

C L=

U U0

.2l

-L .oa

0 o=

05 8 t

o,4c 8~ o

='g_~

~.-O

Et.£ 0*a .s .!

LI u .95 a

In ^ 0

~ .^ I

0*: i*- C

CCCi

0^11

111

0 5.

000rIn .

C 0- 2~ In

co

E = _'0.c

-- E

.1_

0 -

0..C.0

U.0

4is

. _ ='»

- gCCE

U I . w

..~.. £ o

*< an .2°

;~ 0

~ '-'---E3 LI a'^2 .0S

ea oC*

Cl LI^

~~ ~ ~ ~ ~ Uo o ' *;- e . .fJ

C .. -- '-U

:U -A Uu .~i .u20 U. 5 .0°-5 *

- - - -6 . 42~ .- C - C '.J

6. -§ * .CS Ir.: J E '

. ~I< ~.'

= 5 £ .-- "~ =- 2- " s - -

v LI v

= . . ... "= .c

,, 'A =

'A I0 ,0

L . ' .S" 6- In L -

oI- U 0. . L

= u 2 I3 - _- -.-

'" --- t.. U- 0

· .~ '. 2 .

2~ 5 w r; °-- "~~~il

2 '"- ' C °

a a - --~' ~ , .. L 0 ,

853 ^^*-U i E~"

1CO£ O" ^

6. CSIn0 L.^ - <

C.o E -.£ 0o . C>g LI LI £ .0 0 I0

a- >5~ '.? ,Vg : o- '0._ .~ 0.00.U. U I n0 ^3-

Ei -; :.o

C a UU.

I' E ° L C)

c - c=U

Co u2 c .02 .EU ^1U.U esto

CZf.

V1 U Uis

0 - ~ ~ ~ I

~: ~W~ 2 .,t0IC

>. 0

0- slIOgE...

L ZU vL I o

o 9 .E e~ g5 E S Z0ja L. - L U- 1

"2 b.u In 6. LI--. -_

C'C --- .2 -u~

.0 - LI. U .

00 .6..5 '

2i, >0In E^

404

CO0

So~

,U

() 00

LI .0

>>§

..

0f ant

·- C

C

C0

C o

.0j

Zi .23

*5.52

0 LI

U .0C

s

LI'.,UJ3L

LI 6.

rtII 0

21 b

c /o.

<u

U.3

0

u IU 0.^ 0=

U t,

§. .0

In 0

6. U0*-»*

.0 U

In .0

aC-4

C

C

C

ICc

.0U

p

U

U

7>9aW

.2

0

-C

U

LIr

U

E3

S!

0In

U

a3

-3

E&>

u

U3ULI)

u

.0.

C5

c

,ULI

u

EV3

L-,>>u>9

u

II

IUCP

U.

0

.0U

0

In

In

LI/

U

0r-E

0

(3

0E

C.

0C

u

'0C

In

'E

. -_R^ E

Lo

C3.

- U

.C_ U

C C

00 -

.. r*

o I

C3

0 S0 LI00'C

*CO(0f C

.2 0InC

W.-

.0 LI

u n

o20

00

e-C

E 'A3 E 6.P 0

au

.20

u 3._I

_- uL

.. '-.0

o9; ; "', a/

I0 0

--

"C C

LI

00

C,~

0

C 2A

o

*l. 5

.o.2 ^.C 0'

oo«- jc

U| In

00-

6. *"*^ *

U.0 - In^ C LI

.0 . 6.E

75 5 0,

Sa"

<>9

.0

;e0

c;

0-1.0

i;

0

L-L5

F

Uto

0's>

UC

v

WU

iCa

3 c

Page 15: Creating a Smart Nation: Strategy, Policy, Intelligence ... · Creating a Smart Nation: Strategy, Policy, Intelligence, and Information Robert David Steele-Vivas* In an age characterized

a o: 0 ' C C .u .2 S> ." I .- '

^1H I~.I6'- - ='-0 'C

'-U

0 *5. " "

g ^ o t- .0

Ai

Li -^ 5J 5

*g^ c t ,C%

*U 5- *^ -H i

(ta-

i-s ---V

^fp m~0L

A ? *~( 0 ac

^g

rU 0%

u 4 - to -2 i*G .: (^ ( * - U§

(A 0 -S"g

C 0 9- co> k

0- -; u 0 .-= 2lO3 0 -= - - *

.y " - CJ -

= 2 < .j 0

0 :":^ = '-

5 ->S

*S~ - 0S«,* 2 ^

c1

_u .

U C

'A

co

r VS

'-

U.-

02u~ 0

Li(A

>c

ai0li~

S 0

"0 0.

._ u~Li 0

u0 -

? 00. '"'

S"ocJ =

(U

0

.S0

C0

00

Aa

.0

C

0

-0

Lies

(U

E

I

7U

0

0

L)

Li

c.

u

Li

(3

0.0

ELi

0

0

a

>»0n

(U0

u

0EV0

(U

U.0V

0.

.0r

g

ZiL30

*u

U, S

uR

L,

.0V

(3>4

E

00><.0.0

C,

Li

i;

uci0,J

C

cu

'I-

U

00

U)

O

L..

cc

OCZ

UU

uW

La

0

CU)

0bLi

Z

C0mG.0

.,q

0

£

7(U

?.

L/i

ZQ6

0

-3

0

LiUi.5

M

0

00

E

V.

E

ILi

cLi

£i

C

0 0

c 0

° U

CeC

-(Ui

C C-

0 L

_=E.5

0----'

(U (U

0. U -

2 G

.0 'E

g s^

Li 0. Li

(U *

e 0

'-11

2 .0o._

0i-.o ,

o..0 Ci

C Su

SLi

0 »^

i^

0. 0

o

¢

0

"IruLi

C

VE

0

0

?_

¢J

.*9U3

0

0.0

.0r

0

0

.Z;

11(U

C

C50

2.!O

0

0(U

i>

0.

2

L5

CCi0

U3>Z

o.0 (

.~ ._. _~

0 *"

-. 0'0

£ ,- Li

Li 0

0~ c

,- ( .-

0iSVI'

Li J

*0 - ?

*li

.00.

0*3t

CZi

s ;E : E.-

0-~~~~~~~

4 Co C

._~ i .~ ~ .¢.

E S E

E~? : ,.£.'

.-- " Fo

.0 h2 U1

*c2E oo ^ -

E'. =:- ~

~ C- ra C -.--

.. _i oc. BOUai r(a 0

» 0 CU -

>. 2 8a S -°

0. u

§ o.

'-( A -5 ' '

E Li Li Li"

£i >" 0.0 >

0 I O §- §0 0o - X0 =

C-- L0 i -3

_.r° I J

o .E .0

.9 -0

- to>

ooL

0 : 0 .Li ' , 3.-

eC Si _:Li

, .0E

0 I2>'e c.

c-I . *, .§ C =o

*CV3

E0

vP.

Uv-W

(0

ILi

0>4

.1

I>4

a

.0'EIZ0S

C(U Li

.30_

'- ' .

.c u;u

u4;

ci

. .0

(A (3..

._ 8u. .3 Li

.0 3 J0

'& > .0

2.02

2 "a

Co* tu Li

0 o-

00i~

>.C 0 C 3 .0( >4

I 5 *o t- -- 0

0 . " '-- 0 ~S '

:2 E 3§

'G=- ? = . u ^1

w_ c > = c n ; u*

n ~ _ c O L, *

- L i

C,, ,~.~.~- -

Li~~~t

L= = _-._ L.--(U

* V V " 0

_ ~ u -- .^ > o-

.= C o o0 3 -

~..2 ~~_ ~~.. L. "'; 0 ""

~u ... U U1 - 0 '~ -- ,-

.0 . O.i

.o ui -* ~ - -L#

V & A 10W , -. ( Li 0.0a 0;

o2 e »7

O ..0(U..d^;.Ji U li.0

% 03 .0 U (AtO 2(A (A4.0 0.0t<f

405

00

coU

>1

S1E10-0

.0

.0

0E(U

.0

<-Z

.0

LiU(U

.0

fn w2 -co

2.U

OU

0b E-C) «

U - >0*-(°) S.0

(U

?S itl

0-'

0 w-

li>

U-c

Li Co

U0 0

- (A

it.0 0

- Li

.0

0 >4

CU

C

.0'50.

.03

0

(-U

E

0.

Eco

v>

U

C*(3

2

-E

V

(U

U

.0C

EiI.0

Li

Z0

2C

Z(

I

U

.200.

0uConV0

c0.(w'i,

L30,

(Uu(ULi

co3

"0

C60

<0

0(U

U

Co.U

-E

.0

LI0

(A

r2

Li

0G

Li

.0

$3U0L30COLi

WV

rco0U

.0E

Zi

(U

Li.0Lu

L5

.09

U

I?(U

.5

Co

0Ue

.0

(3

>';

0E>'4

0

00

w.0.U

CZ0

0Li

(U

2?r3

ci

0

0

(U,i

0

0

o-C,

66C.U

0

00

.0.2

Li

U

JC

W.C

.a0

0

0x

uLicUU

Li

Li

.cU'E

(3

0

'ii0.

0E.

C.

C C3

- ?

CO

~90

4O C.0 Li

Li --

U -J

0._=

00

0

Li> (U

2U LC.

Li.E

.2(U

54.2*-0j0-

0 74

50 0

W 0L..

.1

0 i^

0 *0

Li0

0

Li

0.0

0

00

.00(ULiLi

.� Us-i Co

=

0

�-5�.0

-(U00....

00.�Li

'J(U0...0(40

92

LiS...0

uLi

Ui

ICu0

CM

-Z

>4

u

0

C,1.

0

00.0

E

Li

Li

U1.0-

Li

ELi

0

UL2Z

0

X?

Li

00

(UI

4-o

0e4-

4

(U

Li

0

aI-U

(U

Li

.0-Li

(U'Sv

L1

L3(U(U

00

(.

Li0.

i;

Li

Z^.

(U

(C>4.(U0(U

4.2

0

100

ro -

Li UU

^ a co.0

- >

F._.

---*, fj

to 5Z

3

0 00.0. ---E;

Li Li<

^' 00& S .

.05

C.0. - ^

.0) >

0 u.0

.5 -2J

0 00

i'(A§ Li- 00 0-

000;.0. Li

.0 -0(3

.0 0

.0Li (UOS..

�Li'.0.-0

0.0

U -

3..0

(AU

4.. -00

Li(U

00(UU �U0.0 �

0(U- S..

U>Li

Li0

ULi.0.0 -

.0>4. 0-(U

00

_ ___ C �

Page 16: Creating a Smart Nation: Strategy, Policy, Intelligence ... · Creating a Smart Nation: Strategy, Policy, Intelligence, and Information Robert David Steele-Vivas* In an age characterized

0% i. .!00

EC

_ C

0-

- I. i-

2 aCl) w

C

U3

Q:CEi

CO-o

1.

.Koo °

m- U

-* . U4S<, S

4.5o cS _ ._

c C *GK

_ . _

C C .,.

-o a.

C

c

_c

E

c

Q) -

_ -

_5 _

°I3 0

-C

.5 .e

i

O n0 _-o

CCC C

E C_ -c

a) n

_ 2

_ C

4,

C

cO

) E ~

o

408

'Cc5

0

a,.

CUw4,

4

c

t

ISV

I

5

Page 17: Creating a Smart Nation: Strategy, Policy, Intelligence ... · Creating a Smart Nation: Strategy, Policy, Intelligence, and Information Robert David Steele-Vivas* In an age characterized

OSS '96: THE CONFERENCE Proceedings, 1996 Volume II, Fifth Internatinal

Symposium Global Security & Global Competitiveess: Open - Link PagePrevious Mr. Robert D. Steele, Open Sources and the Virtual Intelligence Community, Invited Presentation to the Annual

Meeting of the U.S. Intelligence Community's Advanced Information Processing and Analysis Steering Group, March1996

Return to Electronic Index Page