The Future of Physical Security

Total Page:16

File Type:pdf, Size:1020Kb

The Future of Physical Security “The convergence between physical and cyber security affects not just our daily lives but also our nation’s security. In their new book, Bill Crowell, Dan Dunkel, Brian Contos, and Colby DeRodeff tap into their wealth of public and private sector experience to explain how we should manage risk in an ever converging world.—Roger Cressey, former Chief of Staff, White House Critical Infrastructure Protection Board, and NBC News terrorism analyst “Take advantage of the years in the government and commercial arenas that the authors have, their knowledge of current and emerging technologies, and their insight on other’s successes and failures. There is no other text available which packs such comprehensive and useful knowledge into a single volume – this book will be on your desk, not your bookshelf.”—Dr. Jim Jones, CISSP,Senior Scientist, SAIC, and Assistant Professor, Ferris State University “In my opinion the authors do an exceptional job explaining the need for more comprehensive approaches to achieving operational risk management within business and governmental organizations. The authors clearly demonstrate why convergence of physical and logical security is a natural evolution with significant advantages to all participants… I believe that the book is a must read for anyone responsible for enabling security solutions in complex organizations.”–Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute “The consistent and persistent message in this book is needed and well presented - Corporate executives must understand and implement converged security or get left behind.This message is presented using a nice balance of historical exam- ples and contemporary business issues and case studies. The authors make their points by presenting information from the public, private, and government per- spectives. Thus, this book is appropriate for any leader in the field of security (physical or IT). It is also an appropriate read for those in the legal, HR, and PR worlds.”—Dr.Terry Gudaitis, Cyber Intelligence Director, Cyveillance i “Physical & Logical Security Convergence takes an in-depth look at how the issue of convergence is impacting enterprise security,particularly from the insider threat perspective. Solutions are commonly a reaction that lag behind evolving threats, be they technology or management focused. In the new world, we need bottom up approaches that converge solutions that keep up with evolution. This book is a primer for convergence in an evolving risk environment.”—Dr. Bruce Gabrielson, NCE,Associate, Booz Allen Hamilton “The convergence of physical and information security is a vital development in the corporate world and a critical success factor for all organizations.The authors do an outstanding job exploring the roots of convergence, as well as the techno- logical, political and logistical issues involved in successfully merging the silos of security.More important, they explore the very real opportunities and advantages that arise from security convergence, and illustrate their concepts and prescrip- tions with practical advice from the real world.This book will be an invaluable guide to anyone involved in guiding security convergence or simply wanting to understand the power and benefits of convergence.”—John Gallant, Editorial Director, Network World “Filled with historical anecdotes and interesting facts, “Physical & Logical Convergence” is a comprehensive definition of converged security threats and considerations. In this day and age, convergence has become a business reality requiring organizations to realign their security and compliance remediation efforts. The authors capture the key aspects of planning for, design and addressing security aspects of this new technology landscape. As expected from an ESM per- spective, also provided is a conceptual overview of addressing compliance audit and monitoring requirements of converged components.”—Mark Fernandes, Senior Manager, Deloitte ii Physical and Logical Security POWERED BY ENTERPRISE SECURITY MANAGEMENT Brian T. Contos CISSP William P. Crowell Former Deputy Director, NSA Colby DeRodeff GCIA, GCNA Dan Dunkel New Era Associates FOREWORD Dr. Eric Cole Technical Editor BY REGIS McKENNA Elsevier, Inc., the author(s), and any person or firm involved in the writing, editing, or production (collec- tively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Elsevier, Inc.“Syngress:The Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Elsevier, Inc. Brands and product names mentioned in this book are trade- marks or service marks of their respective companies. KEY SERIAL NUMBER 001 HJIRTCV764 002 PO9873D5FG 003 829KM8NJH2 004 BPOQ48722D 005 CVPLQ6WQ23 006 VBP965T5T5 007 HJJJ863WD3E 008 2987GVTWMK 009 629MP5SDJT 010 IMWQ295T6T PUBLISHED BY Syngress Publishing, Inc. Elsevier, Inc. 30 Corporate Drive Burlington, MA 01803 Physical and Logical Security Convergence: Powered By Enterprise Security Management Copyright © 2007 by Elsevier, Inc.All rights reserved. Printed in the United States of America. Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written per- mission of the publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication. Printed in the United States of America 1 2 3 4 5 6 7 8 9 0 ISBN: 978-1-59749-122-8 Publisher:Amorette Pedersen Managing Editor:Andrew Williams Production Manager: Brandy Lilly Page Layout and Art: Patricia Lupien Technical Editor: Dr. Eric Cole Copy Editor:Audrey Doyle Cover Designer: Michael Kavish Indexer: Nara Wood For information on rights, translations, and bulk sales, contact Matt Pedersen, Commercial Sales Director and Rights, at Syngress Publishing; email [email protected]. Acknowledgments Brian Contos Dedications To the beautiful women in my life who gave me the inspiration to author yet another book: my amazing wife Monica-Tiffany, our incredible daughters Zoey and Athena, my patient mother Marie and supportive sisters Karrie and Tracy. And to my father Tom who instilled in me commitment and tenacity. Illegitimis nil carborundum Acknowledgements It’s always hard to single people out for thanks when you write a book. Most of my knowledge over the last decade comes from combined experiences with var- ious individuals and organizations. Even the concept of physical and logical con- vergence itself was a culmination of conversations with dozens of brilliant minds in the private and public sector, academia, and the media. Only after conver- gence displayed such obvious and extensive support from these individuals did I finally convince myself that a book had to be written. While I can’t possibly mention everyone, some individuals went well beyond an exchange of ideas in their contribution. Some actually reviewed sundry versions of the manuscript and provided expert insight. For their outstanding commitment I would like to thank all the book reviewers.Their input was invaluable and helped shape this book. I would also like to give special thanks to Dr. Eric Cole for providing world-class feedback, technical analysis, sanity checks and comic relief. To all the individuals at ArcSight that in one way or another helped make this book a reality: Robert Shaw,Tom Reilly, Kevin Mosher, Larry Lunetta, Jill Kyte, Cynthia Hulton, and Dave Anderson.To be fair, the entire ArcSight team throughout the Americas, Europe and Asia Pacific should be thanked. v I would like to give special thanks to ArcSight’s CTO and Executive Vice President of Research and Development Hugh Njemanze. Hugh has not only provided valuable feedback for both of my books to date but has become a mentor and confidant over the years. Finally, I’d be remiss if I didn’t acknowledge my co-authors Bill, Dan and Colby for all their hard work and dedication. William P. Crowell Dedication To my wonderful wife, Judy, who endures all of my endeavors with love and support, and who fills all of my days with fun and the inspiration to do more. Acknowledgements Many people have contributed to the developing knowledge base on the con- vergence of physical and logical security and to my own understanding of where convergence is going and why. In 1998, shortly after being named CEO of Cylink Corp., Regis McKenna, one of Cylink’s Directors began talking to me about the move to IP based video services and the role that TCP/IP would play as the basic infrastructure for moving security information from video cameras to users. He envisioned a whole new way in which retail stores and enterprise facilities would monitor video security services and a way for the cost of secu- rity to be reduced. He had just done a restart of a small streaming video soft- ware company that he had named Broadware Technologies. Regis asked me to join the board of Broadware and my trek into the world of video surveillance and physical security began. Interestingly, the Chairman of Cylink Corporation, Leo Guthart, was the Vice Chairman of Pittway Corporation and President of Ademco as well as having been a Director at Cylink for 18 years.
Recommended publications
  • Leaving Reality Behind Etoy Vs Etoys Com Other Battles to Control Cyberspace By: Adam Wishart Regula Bochsler ISBN: 0066210763 See Detail of This Book on Amazon.Com
    Leaving Reality Behind etoy vs eToys com other battles to control cyberspace By: Adam Wishart Regula Bochsler ISBN: 0066210763 See detail of this book on Amazon.com Book served by AMAZON NOIR (www.amazon-noir.com) project by: PAOLO CIRIO paolocirio.net UBERMORGEN.COM ubermorgen.com ALESSANDRO LUDOVICO neural.it Page 1 discovering a new toy "The new artist protests, he no longer paints." -Dadaist artist Tristan Tzara, Zh, 1916 On the balmy evening of June 1, 1990, fleets of expensive cars pulled up outside the Zurich Opera House. Stepping out and passing through the pillared porticoes was a Who's Who of Swiss society-the head of state, national sports icons, former ministers and army generals-all of whom had come to celebrate the sixty-fifth birthday of Werner Spross, the owner of a huge horticultural business empire. As one of Zurich's wealthiest and best-connected men, it was perhaps fitting that 650 of his "close friends" had been invited to attend the event, a lavish banquet followed by a performance of Romeo and Juliet. Defiantly greeting the guests were 200 demonstrators standing in the square in front of the opera house. Mostly young, wearing scruffy clothes and sporting punky haircuts, they whistled and booed, angry that the opera house had been sold out, allowing itself for the first time to be taken over by a rich patron. They were also chanting slogans about the inequity of Swiss society and the wealth of Spross's guests. The glittering horde did its very best to ignore the disturbance. The protest had the added significance of being held on the tenth anniversary of the first spark of the city's most explosive youth revolt of recent years, The Movement.
    [Show full text]
  • The Task Force Report
    THE MARKLE FOUNDATION TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE Chairmen John Gage Participating Experts Sun Microsystems, Inc. (Non-government) Zoë Baird Markle Foundation Slade Gorton Bruce Berkowitz Preston Gates & Ellis RAND Corporation James L. Barksdale The Barksdale Group Morton H. Halperin Robert Clerman Open Society Institute Mitretek Executive Director Margaret A. Hamburg Mary DeRosa Philip Zelikow Nuclear Threat Initiative Center for Strategic and International Miller Center of Public Affairs Studies University of Virginia John J. Hamre Center for Strategic and International Lauren Hall Members Studies Microsoft Alexander Aleinikoff Eric Holder James Lewis Georgetown University Law Center Covington & Burling Center for Strategic and International Studies Robert D. Atkinson Arnold Kanter Progressive Policy Institute The Scowcroft Group Gilman Louie In-Q-Tel Stewart A. Baker Robert Kimmitt Steptoe & Johnson AOL Time Warner, Inc. Douglas McDonald Abt Associates Eric Benhamou Michael O. Leavitt 3Com Corp. and Palm, Inc. Governor of Utah Daniel Ortiz University of Virginia Jerry Berman Tara Lemmey School of Law Center for Democracy and Project LENS Technology Michael Vatis Judith A. Miller Institute for Security and Technology Robert M. Bryant Williams & Connolly Studies National Insurance Crime Bureau Dartmouth College James H. Morris Ashton Carter Carnegie Mellon University Task Force Staff Harvard University Craig Mundie Mary McKinley Wesley Clark Microsoft Associate Director Stephens Group, Inc. Jeffrey H. Smith Ryan Coonerty Wayne Clough Arnold & Porter Government Affairs Counsel Georgia Institute of Technology Abraham D. Sofaer Peter Kerr William P. Crowell Hoover Institution Markle Foundation Cylink Corporation Stanford University Laura Rozen Sidney D. Drell James B. Steinberg Senior Associate Stanford University The Brookings Institution Tara Sonenshine Esther Dyson Paul Schott Stevens Advisor EDventure Holdings Dechert Stefaan Verhulst Amitai Etzioni Rick White Markle Foundation The George Washington University TechNet David J.
    [Show full text]
  • 9/11 Report”), July 2, 2004, Pp
    Final FM.1pp 7/17/04 5:25 PM Page i THE 9/11 COMMISSION REPORT Final FM.1pp 7/17/04 5:25 PM Page v CONTENTS List of Illustrations and Tables ix Member List xi Staff List xiii–xiv Preface xv 1. “WE HAVE SOME PLANES” 1 1.1 Inside the Four Flights 1 1.2 Improvising a Homeland Defense 14 1.3 National Crisis Management 35 2. THE FOUNDATION OF THE NEW TERRORISM 47 2.1 A Declaration of War 47 2.2 Bin Ladin’s Appeal in the Islamic World 48 2.3 The Rise of Bin Ladin and al Qaeda (1988–1992) 55 2.4 Building an Organization, Declaring War on the United States (1992–1996) 59 2.5 Al Qaeda’s Renewal in Afghanistan (1996–1998) 63 3. COUNTERTERRORISM EVOLVES 71 3.1 From the Old Terrorism to the New: The First World Trade Center Bombing 71 3.2 Adaptation—and Nonadaptation— ...in the Law Enforcement Community 73 3.3 . and in the Federal Aviation Administration 82 3.4 . and in the Intelligence Community 86 v Final FM.1pp 7/17/04 5:25 PM Page vi 3.5 . and in the State Department and the Defense Department 93 3.6 . and in the White House 98 3.7 . and in the Congress 102 4. RESPONSES TO AL QAEDA’S INITIAL ASSAULTS 108 4.1 Before the Bombings in Kenya and Tanzania 108 4.2 Crisis:August 1998 115 4.3 Diplomacy 121 4.4 Covert Action 126 4.5 Searching for Fresh Options 134 5.
    [Show full text]
  • Prosecuting Terrorism: the Legal Challenge
    Issue No. 7 / April 2006 THE NYU REVIEW OF LAW AND SECURITY A PUBLICATION OF THE CENTER ON LAW AND SECURITY AT NYU SCHOOL OF LAW Prosecuting Terrorism: The Legal Challenge committed to examining the legal dimensions of counterterrorism and national security in the age of terror Newsletter_NYU 3/29/06 7:00 AM Page 2 CENTER FACULTY AND STAFF The NYU Review of Law and Security Executive Director Issue No. 7 / April 2006 Karen J. Greenberg Table of Editor Faculty Co-Directors Contents Karen J. Greenberg Noah Feldman David M. Golove Associate Editor Stephen Holmes Prosecuting Terrorism: Kristin Henderson Richard H. Pildes The Legal Challenge Assistant Editor Administrative Director Jennifer Buntman Heidi Lubov From the Editor: A Season of Reassessment Researchers Director of Programs and Page 3 Jonathan Voegele Publications Andrew Peterson Kristin Henderson Transparency and the Courts Eric Feder Page 4 Communications and Proofreader Development Associate Thwarted Terrorist Attacks Katie Sticklor Colleen Larkin Page 16 Design Director of Fellowships and Wendy Bedenbaugh Prosecuting Terrorism: Special Programs The National Challenge Jennifer Buntman Page 22 ABOUT THE CENTER The Center on Law and Security at 2005 – 2006 FELLOWS Terrorist Trial Updates NYU School of Law is a non-partisan Sidney Blumenthal research and policy institute estab- Page 30 lished for the purpose of examining Amos Elon the legal dimensions of national secu- Baltasar Garzón From the Student’s Corner: rity in the post 9/11 era. The Center Tara McKelvey Material Support
    [Show full text]
  • Creating a Trusted Information Network for Homeland Security Second Report of the Markle Foundation Task Force
    Creating a Trusted Network for Homeland Security Second Report of the Markle Foundation Task Force zoë baird, james barksdale chairmen michael a. vatis executive director Copyright © 2003 Markle Foundation All rights reserved. ISBN 0-9747809-0-1 markle foundation task force on national security in the information age Chairmen Slade Gorton James Dempsey Preston, Gates & Ellis Center for Democracy and Technology Zoë Baird Markle Foundation Morton H. Halperin Mary DeRosa Open Society Institute Center for Strategic and International James L. Barksdale Studies The Barksdale Group Margaret A. Hamburg Nuclear Threat Initiative Lara Flint Executive Director Center for Democracy and Technology John J. Hamre Michael A. Vatis Center for Strategic and International Lauren Hall Markle Foundation Studies Microsoft Members Eric Holder Jeff Jonas Covington & Burling Systems Research & Development Alexander Aleinikoff Georgetown University Law Center Arnold Kanter James Lewis The Scowcroft Group Center for Strategic and International Robert D. Atkinson Studies Progressive Policy Institute Michael O. Leavitt Governor of Utah Terrill D. Maynard Stewart Baker Steptoe & Johnson Tara Lemmey Mary McCarthy Project LENS Center for Strategic and International Eric Benhamou Studies 3Com Corporation Gilman Louie In-Q-Tel Patrick J. Sullivan, Jr. Jerry Berman Cherry Creek Schools Center for Democracy and Technology Judith A. Miller Williams & Connolly Winston Wiley Robert M. Bryant Booz Allen Hamilton National Insurance Crime Bureau James Morris Carnegie Mellon University Associate Director Ashton Carter Harvard University Craig Mundie Mary McKinley Microsoft Markle Foundation Wesley P. Clark Wesley P. Clark & Associates Jeffrey H. Smith Task Force Staff Arnold & Porter Wayne Clough Nancy Boursiquot Georgia Institute of Technology Abraham D.
    [Show full text]
  • Azer Bestavros Biographical Sketch
    Azer Bestavros Biographical Sketch Azer Bestavros is Warren Distinguished Professor of Computer Science and Founding Director of the Hariri Institute for Comput- ing at Boston University (BU), which was set up in 2011 as an incu- bator for high-risk, high-reward multidisciplinary collaborations. Notable efforts that he incubated at the Institute, which matured into multi-million-dollar projects, include the $25M+ Mass Open Cloud, $10M NSF Cloud Security Frontier project, $5M Red Hat Collaboratory for open-source innovation, and the $1M+ SCOPE cloud platform for smart-city applications. Under his leadership, the Institute served as an anchor for a number of university pro- grams, including the Data Science Initiative (DSI), the Digital Health Initiative, the Digital Learning Initiative (DLI), the AI Research Initiative (AIR), the Cyber Security, Law, and Society Alliance, the Software & Application Innovation Lab (SAIL), and BU Spark! for student-driven innovation. Prior to his inaugural role at the Hariri Institute, Professor Bestavros chaired the BU Computer Science Department from 2000 to 2007, having joined it in 1991 after completing his PhD in Computer Science at Harvard University. He holds affiliated appointments in the Department of Electrical & Computer Engineering, the Division of Systems Engineering, and a number of research centers at BU. He held visiting professorships at Harvard University, Institut Eur´ecomin France, KTH Royal Institute of Technology in Sweden, and the American University in Cairo. A distinguished educator and scholar, Professor Bestavros teaches and pursues research in networking, distributed computing, cybersecurity, and high-assurance systems. His semi- nal contributions include pioneering studies of web push caching through content distribution networks, self-similar Internet traffic characterization, game-theoretic cloud resource manage- ment, and safety certification of networked systems and software.
    [Show full text]
  • Unisys/EMC Global Security Summit
    Unisys/EMC Global Security Summit “Evolution of Security – What will concern us in 2015” A Best Practices Thought Leadership Seminar PROGRAMME 24 June 2010 Unisys International Management Centre - UIMC Saint-Paul-de-Vence, France Programme for “Unisys/EMC Global Security Summit” Seminar Summary The converging threats facing enterprises today come in all forms, from physical and cyber attacks to personal false identification and data fraud. Business leaders in this increasingly connected world are being challenged like never before to find innovative ways to cut operational costs while simultaneously delivering higher ROI on investments that protect their employees, customers, infrastructure, networks, data and other critical assets. The purpose of this one-day event is to enable and facilitate the sharing of proven “best practices” for integrated security solution strategies and implementations. In a beautiful world-class conference center, this seminar will bring together approximately 50 C-level executives from global public and private sector organizations that depend on Unisys and/or EMC as their security technology partners. The ten speakers will be customers providing real-world case studies and industry thought leaders providing insights into the future of security technology. All in all, a highly-interactive educational forum that you will not want to miss. Integrated Security Solutions for Today and Tomorrow You are only as secure as your weakest link and getting security right has become increasingly complex. In this complex world of accelerating change getting it right and cutting costs has to be about taking a holistic approach that pulls together all the elements of physical, employee, customer and IT security into a tightly integrated and managed process.
    [Show full text]
  • Markle Foundation
    Implementing a Trusted Information Sharing Environment Using Immutable Audit Logs to Increase Security, Trust, and Accountability A PAPER BY THE MARKLE TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE zoë baird, james barksdale chairmen M A R K L E F O U N D A T I O N TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE MEMBERS AND ASSOCIATES, 2006 Chairmen Eric H. Holder, Jr. Richard Falkenrath Covington & Burling The Brookings Institution Zoë Baird Markle Foundation Jeff Jonas David Gunter IBM Microsoft Corporation Jim Barksdale Barksdale Management Corporation Arnold Kanter Drew Ladner The Scowcroft Group JBoss, Inc. Members Tara Lemmey Randolph D. Moss Robert D. Atkinson LENS Ventures Wilmer Cutler Pickering LLP Progressive Policy Institute Gilman Louie Bill Neugent Eric Benhamou Alsop Louie Partners MITRE 3Com Corporation, Palm, Inc., Benhamou Global Ventures, LLC John O. Marsh, Jr. Daniel Prieto Marsh Institute for Government and Public Kennedy School of Government, Harvard Jerry Berman Policy, Shenandoah University University Center for Democracy & Technology Judith A. Miller Clay Shirky Robert M. Bryant Bechtel Group, Inc. Writer and Consultant National Insurance Crime Bureau James H. Morris Peter Swire Ashton B. Carter Carnegie Mellon University Moritz College of Law, The Ohio State University Kennedy School of Government, Harvard University Craig Mundie Kim Taipale Microsoft Corporation Center for Advanced Studies in Science and Wesley Clark Technology Policy Wesley K. Clark & Associates Jeffrey H. Smith Arnold & Porter LLP Mel Taub William P. Crowell Independent Consultant Security and Intelligence Consultant Abraham D. Sofaer Hoover Institution, Stanford University Richard Wilhelm Bryan Cunningham Booz Allen Hamilton Morgan & Cunningham LLC James B.
    [Show full text]
  • Conflicts of Interest in the Syria Debate
    Conflicts of interest in the Syria debate An analysis of the defense industry ties of experts and think tanks who commented on military intervention October 2013 About the Public Accountability Initiative The Public Accountability Initiative (PAI) is a non-profit, non-partisan research and educational organization focused on corporate and government accountability. In addition to publishing research on critical public accountability issues, PAI maintains LittleSis.org, an involuntary facebook of powerful people and tool for power research that was used to compile data for this report. PAI’s work is funded by a variety of non-profit sources (all funding sources are listed at http://public- accountability.org/about/funding). This report was authored by PAI research analysts Gin Armstrong and Whitney Yax, and PAI director Kevin Connor. Introduction During the public debate around the question of whether to attack Syria, Stephen Hadley, former national security adviser to George W. Bush, made a series of high-profile media appearances. Hadley argued strenuously for military intervention in appearances on CNN, MSNBC, Fox News, and Bloomberg TV, and authored a Washington Post op-ed headlined "To stop Iran, Obama must enforce red lines with Assad." In each case, Hadley's audience was not informed that he serves as a director of Raytheon, the weapons manufacturer that makes the Tomahawk cruise missiles that were widely cited as a weapon of choice in a potential strike against Syria. Hadley earns $128,500 in annual cash compensation from the company and chairs its public affairs committee. He also owns 11,477 shares of Raytheon stock, which traded at all-time highs during the Syria debate ($77.65 on August 23, making Hadley’s share’s worth $891,189).
    [Show full text]
  • Designing Learning Futures Digital Media & Learning Conference
    DESIGNING LEARNING FUTURES DIGITAL MEDIA & LEARNING CONFERENCE MARCH 3-5, 2011 // LONG BEACH, CALIFORNIA SPONSORS OVERVIEW About the Theme: Designing Learning Futures Conference Chair and Committee Keynotes and Plenary Session Panelists CONFERENCE SCHEDULE [9] Overview [10] March 3, 2011 [11] March 4, 2011 [11] March 5, 2011 CONFERENCE INFORMATION Wireless and Social Media at DML2011 Conference Receptions and Gatherings CONFERENCE PROGRAM ABSTRACTS [15] March 3, 2011 [28] March 4, 2011 [51] March 5, 2011 CONFERENCE PROGRAM DEMOS AND EXHIBITS March 3, 2011: Mozilla Science Fair March 4, 2011: Demos & Exhibits Sponsored by the Pearson Foundation MAPS Conference Venue Maps Map of Local Area GENERAL INFORMATION About Long Beach Travel and Accommodation Local Cuisine SUPPLEMENTS RoadTrip Nation DMLcentral DML Competition DESIGNING LEARNING FUTURES DIGITAL MEDIA & LEARNING CONFERENCE Hilton Conference & Meeting Center // Long Beach, CaliforniaMarch 3-5, 2011 CONFERENCE CHAIR Katie Salen CONFERENCE COMMITTEE Kimberly Austin Student Volunteers Chair danah boyd Emerging Platforms and Policies Chair Sheryl Grant DML Competition Liason Chair Heather A. Horst Local Organizing Committee Chair Trebor Scholz Social Media Chair Mark Surman New Collectives Chair S. Craig Watkins Youth, Digital Media and Empowerment Chair KEYNOTE PRESENTERS Alice Taylor Muki Hansteen-Izora The Digital Media and Learning Conference is an annual event supported by the MacArthur Foun- dation and organized by the Digital Media and Learning Research Hub at University of California, Irvine. The conference is meant to be an inclusive, international and annual gathering of scholars and practitioners in the field, focused on fostering interdisciplinary and participatory dialog and linking theory, empirical study, policy, and practice. SPONSORS UNIVERSITY OF CALIFORNIA UC HUMANITIES RESEHRARCH INSTITUTEI DML hub CONFERENCE OVERVIEW The Digital Media and Learning Conference 2011 is the second annual event organized by the Digital Media and Learning Hub at the University of California, Irvine.
    [Show full text]
  • “There Are Many Things to Love About Connecting for Health
    Nation At Risk: Policy Makers Need Better Information to Protect the Country The Markle Foundation Task Force on National Security in the Information Age March 2009 THE MARKLE FOUNDATION TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE Zoë Baird, Co-Chair* Jim Barksdale, Co-Chair The Markle Foundation Barksdale Management Corporation MEMBERS: Robert D. Atkinson Jim Dempsey* Slade Gorton* Judith A. Miller* Information Technology and Center for Democracy & K&L Gates Bechtel Group, Inc. Innovation Foundation Technology Morton H. Halperin James H. Morris Rand Beers** Mary DeRosa** Open Society Institute Carnegie Mellon University National Security Network Senate Committee on the Judiciary Margaret A. Hamburg** Craig Mundie Eric Benhamou Nuclear Threat Initiative Microsoft Corporation 3Com Corporation, Palm, Inc., Sidney D. Drell Benhamou Global Ventures, LLC Stanford Linear John J. Hamre Jeffrey H. Smith* Accelerator Center, Center for Strategic and Arnold & Porter LLP Jerry Berman Stanford University International Studies Center for Democracy & Abraham D. Sofaer* Technology Esther Dyson Eric H. Holder, Jr.** Hoover Institution, CNET Networks Covington & Burling Stanford University Robert M. Bryant National Insurance Crime Bureau Amitai Etzioni Jeff Jonas* James B. Steinberg** The George Washington IBM Lyndon Johnson School of Public Ashton B. Carter** University Affairs, University of Texas at Kennedy School of Government, Arnold Kanter Austin Harvard University Richard Falkenrath The Scowcroft Group New York Police Department Kim Taipale Wesley Clark Tara Lemmey* Center for Advanced Studies in Wesley K. Clark & Associates David J. Farber LENS Ventures Science Carnegie Mellon University and Technology Policy William P. Crowell* Gilman Louie Security and Intelligence John Gage Alsop Louie Partners Rick White* Consultant Kleiner Perkins Caulfield & Byers former Member of Congress John O.
    [Show full text]
  • Solving the Dilbert Paradox
    Solving the Dilbert Paradox Richard Adler Rapporteur Communications and Society Program Charles M. Firestone Executive Director Washington, D.C. 2011 To purchase additional copies of this report, please contact: The Aspen Institute Publications Office P.O. Box 222 109 Houghton Lab Lane Queenstown, Maryland 21658 Phone: (410) 820-5326 Fax: (410) 827-9174 E-mail: [email protected] For all other inquiries, please contact: The Aspen Institute Communications and Society Program One Dupont Circle, NW Suite 700 Washington, DC 20036 Phone: (202) 736-5818 Fax: (202) 467-0790 Charles M. Firestone Patricia K. Kelly Executive Director Assistant Director Copyright © 2011 by The Aspen Institute This work is licensed under the Creative Commons Attribution- Noncommercial 3.0 United States License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc/3.0/us/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA. The Aspen Institute One Dupont Circle, NW Suite 700 Washington, DC 20036 Published in the United States of America in 2011 by The Aspen Institute All rights reserved Printed in the United States of America ISBN: 0-89843-545-5 11-006 1816CSP/11-BK Contents FOREWORD, Charles M. Firestone ...............................................................v SOLVING THE DILBERT PARADOX, Richard Adler Defining the Dilbert Paradox ......................................................................... 3 Defining Talent ...............................................................................................
    [Show full text]