Mobilizing Information to Prevent Terrorism Accelerating Development of a Trusted Information Sharing Environment

Total Page:16

File Type:pdf, Size:1020Kb

Mobilizing Information to Prevent Terrorism Accelerating Development of a Trusted Information Sharing Environment Mobilizing Information to Prevent Terrorism Accelerating Development of a Trusted Information Sharing Environment Third Report of the Markle Foundation Task Force ZOË BAIRD, JAMES BARKSDALE CHAIRMEN M ARKLE F OUNDATION TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE MEMBERS AND ASSOCIATES, 2006 Chairmen John Gage Richard Wilhelm Sun Microsystems, Inc. Booz Allen Hamilton Zoë Baird Markle Foundation John Gordon Associates United States Air Force, Retired Jim Barksdale Bruce Berkowitz Barksdale Management Slade Gorton Hoover Institution, Stanford University Corporation Preston Gates & Ellis LLP Fred Cate Members Morton H. Halperin Indiana University School of Law Open Society Institute Bloomington Robert D. Atkinson Information Technology Margaret A. Hamburg Scott Charney and Innovation Foundation Nuclear Threat Initiative Microsoft Corporation Rand Beers John J. Hamre Bob Clerman Coalition for American Leadership Center for Strategic and International Mitretek Systems and Security Studies David Gunter Eric Benhamou Eric H. Holder, Jr. Microsoft Corporation 3Com Corporation, Palm, Inc., Benhamou Covington & Burling Global Ventures, LLC Drew Ladner Jeff Jonas JBoss, Inc. Jerry Berman IBM Center for Democracy & Technology Bill Neugent Arnold Kanter MITRE Robert M. Bryant The Scowcroft Group National Insurance Crime Bureau Daniel B. Prieto Tara Lemmey Reform Institute Ashton B. Carter LENS Ventures Kennedy School of Government, Clay Shirky Harvard University Gilman Louie Writer and Consultant Alsop Louie Partners Wesley Clark Peter Swire Wesley K. Clark & Associates John O. Marsh, Jr. Moritz College of Law, The Ohio State Marsh Institute for Government and University William P. Crowell Public Policy, Shenandoah University Security and Intelligence Consultant Mel Taub Judith A. Miller Independent Consultant Bryan Cunningham Bechtel Group, Inc. Morgan & Cunningham LLC Markle Foundation Staff James H. Morris Jim Dempsey Carnegie Mellon University Karen Byers Center for Democracy & Technology Managing Director and Chief Financial Craig Mundie Officer Mary DeRosa Microsoft Corporation Center for Strategic and International Kimberly Hogg Studies Jeffrey H. Smith Assistant to the President Arnold & Porter LLP Sidney D. Drell Danna Lindsay Stanford Linear Accelerator Center, Abraham D. Sofaer Administrative Assistant Stanford University Hoover Institution, Stanford University Michelle Maran Esther Dyson James B. Steinberg Manager, Public Affairs CNET Networks Lyndon Johnson School of Public Affairs, University of Texas at Austin Linda Millis Amitai Etzioni Director, National Security Program The George Washington University Kim Taipale Center for Advanced Studies in Stefaan Verhulst Richard Falkenrath Science and Technology Policy Chief of Research The Brookings Institution Rick White David J. Farber former Member of Congress Carnegie Mellon University Mobilizing Information to Prevent Terrorism Accelerating Development of a Trusted Information Sharing Environment THIRD REPORT OF THE MARKLE FOUNDATION TASK FORCE July 2006 A Project of The Markle Foundation New York City Copyright © 2006 Markle Foundation All rights reserved. Table of Contents Overview ..................................................................................................................................................................... 1 Acknowledgements ....................................................................................................................................... 3 Executive Summary ....................................................................................................................................... 7 Mobilizing Information to Prevent Terrorism while Protecting Civil Liberties ...................................................................................................17 The Importance of Maintaining Trust and Sustaining Determination towards Transformation...........................................................................23 Leadership and the Integration of Policy and Technology to Guide Implementation and Use...........................................................................................25 Persistent Leadership and Strong Oversight from all Branches of Government...................................................................................................................25 Leadership from the President to Steer Cross-Agency Implementation, Facilitate Transformational Change, and Establish Public Confidence ...........................25 Leadership from Congress to Oversee Effective Implementation .....................................27 Leadership throughout the Executive Branch to Promote Information Sharing while Preventing Misuse ..........................................................................................................27 Policies, Processes, and Guidelines that Facilitate Information Sharing and Provide Trust by Empowering and Constraining Users.......................................29 Policies, Processes and Guidelines to Access, Protect, and Share Information ...........29 A New Authorized Use Standard .........................................................................................................32 A Process to Resolve Disputes in Information Sharing ...........................................................41 Managing the Risks of Sharing and Not Sharing ..........................................................................44 Improving the Decision-Making Processes of Senior Officials ...........................................48 Developing Adequate Training and Education to Improve Information Sharing Expertise................................................................................................................51 Creating an Information Sharing Institute ........................................................................................57 Technologies that Support Policies and Processes to Connect People and Information.................................................................................................................................................57 Improving Information Sharing and Analysis with Technology ...........................................58 Enhancing System and Information Security with Technology ............................................65 Facilitating Privacy and Accountability through Rules-Based Technology......................69 The Limits of Technology ........................................................................................................................71 Conclusion ...............................................................................................................................................................72 Appendices ..............................................................................................................................................................73 Appendix 1: Overview of Major Developments towards Establishing an Information Sharing Environment ............................................................................................73 Appendix 2: Letter to the President of September 7, 2005 and White House response of October 21, 2005..................................................................89 Overview For four years, we have been privileged to chair the Markle Task Force on National Security in the Information Age. In its two previous reports, the Task Force has advocated the mobilization of information to prevent terrorism through the creation of a trusted information sharing environment. That environment enhances collaboration, and facilitates the flow of information across the federal government, state and local agencies, and the private sector to enhance understanding of the threats to our nation’s security. It does so in a trusted manner, using information effectively and appropriately, and protecting civil liberties. This vision of a trusted network, along with the key attributes of our proposed Systemwide Homeland Analysis and Resource Exchange (SHARE) Network, outlined in our previous report, were enacted into law in the Intelligence Reform and Terrorism Prevention Act of 2004. The Task Force has not been alone in issuing such recommendations. Concepts such as ours have been proposed by the Report of the Joint Inquiry into the Terrorist Attacks of September 11, 2001, the National Commission on Terrorist Attacks Upon the United States, the Commission on the Intelligence Capabilities Regarding Weapons of Mass Destruction, and many others. Yet despite general agreement on the need for enhanced information sharing to combat terrorism, the nation remains far from achieving this goal. Indeed, we are struck by the wide gap that persists between ambition and vision on the one hand, and actual achievement and concrete steps towards implementation on the other. To be sure, the President and Congress have adopted the vision of information sharing, and have acted in a bipartisan way to remove barriers to achieve that vision. We have witnessed some genuine improvements in information sharing. But two years since the publication of our last report, and almost five years since the terrorist attacks of September 11, systematic, trusted information sharing remains more of an aspiration than a reality. The government has yet to articulate a credible implementation plan for a broad and trusted information sharing environment, and the sense of commitment and determination that characterized the government’s response in the
Recommended publications
  • Leaving Reality Behind Etoy Vs Etoys Com Other Battles to Control Cyberspace By: Adam Wishart Regula Bochsler ISBN: 0066210763 See Detail of This Book on Amazon.Com
    Leaving Reality Behind etoy vs eToys com other battles to control cyberspace By: Adam Wishart Regula Bochsler ISBN: 0066210763 See detail of this book on Amazon.com Book served by AMAZON NOIR (www.amazon-noir.com) project by: PAOLO CIRIO paolocirio.net UBERMORGEN.COM ubermorgen.com ALESSANDRO LUDOVICO neural.it Page 1 discovering a new toy "The new artist protests, he no longer paints." -Dadaist artist Tristan Tzara, Zh, 1916 On the balmy evening of June 1, 1990, fleets of expensive cars pulled up outside the Zurich Opera House. Stepping out and passing through the pillared porticoes was a Who's Who of Swiss society-the head of state, national sports icons, former ministers and army generals-all of whom had come to celebrate the sixty-fifth birthday of Werner Spross, the owner of a huge horticultural business empire. As one of Zurich's wealthiest and best-connected men, it was perhaps fitting that 650 of his "close friends" had been invited to attend the event, a lavish banquet followed by a performance of Romeo and Juliet. Defiantly greeting the guests were 200 demonstrators standing in the square in front of the opera house. Mostly young, wearing scruffy clothes and sporting punky haircuts, they whistled and booed, angry that the opera house had been sold out, allowing itself for the first time to be taken over by a rich patron. They were also chanting slogans about the inequity of Swiss society and the wealth of Spross's guests. The glittering horde did its very best to ignore the disturbance. The protest had the added significance of being held on the tenth anniversary of the first spark of the city's most explosive youth revolt of recent years, The Movement.
    [Show full text]
  • The Task Force Report
    THE MARKLE FOUNDATION TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE Chairmen John Gage Participating Experts Sun Microsystems, Inc. (Non-government) Zoë Baird Markle Foundation Slade Gorton Bruce Berkowitz Preston Gates & Ellis RAND Corporation James L. Barksdale The Barksdale Group Morton H. Halperin Robert Clerman Open Society Institute Mitretek Executive Director Margaret A. Hamburg Mary DeRosa Philip Zelikow Nuclear Threat Initiative Center for Strategic and International Miller Center of Public Affairs Studies University of Virginia John J. Hamre Center for Strategic and International Lauren Hall Members Studies Microsoft Alexander Aleinikoff Eric Holder James Lewis Georgetown University Law Center Covington & Burling Center for Strategic and International Studies Robert D. Atkinson Arnold Kanter Progressive Policy Institute The Scowcroft Group Gilman Louie In-Q-Tel Stewart A. Baker Robert Kimmitt Steptoe & Johnson AOL Time Warner, Inc. Douglas McDonald Abt Associates Eric Benhamou Michael O. Leavitt 3Com Corp. and Palm, Inc. Governor of Utah Daniel Ortiz University of Virginia Jerry Berman Tara Lemmey School of Law Center for Democracy and Project LENS Technology Michael Vatis Judith A. Miller Institute for Security and Technology Robert M. Bryant Williams & Connolly Studies National Insurance Crime Bureau Dartmouth College James H. Morris Ashton Carter Carnegie Mellon University Task Force Staff Harvard University Craig Mundie Mary McKinley Wesley Clark Microsoft Associate Director Stephens Group, Inc. Jeffrey H. Smith Ryan Coonerty Wayne Clough Arnold & Porter Government Affairs Counsel Georgia Institute of Technology Abraham D. Sofaer Peter Kerr William P. Crowell Hoover Institution Markle Foundation Cylink Corporation Stanford University Laura Rozen Sidney D. Drell James B. Steinberg Senior Associate Stanford University The Brookings Institution Tara Sonenshine Esther Dyson Paul Schott Stevens Advisor EDventure Holdings Dechert Stefaan Verhulst Amitai Etzioni Rick White Markle Foundation The George Washington University TechNet David J.
    [Show full text]
  • Creating a Trusted Information Network for Homeland Security Second Report of the Markle Foundation Task Force
    Creating a Trusted Network for Homeland Security Second Report of the Markle Foundation Task Force zoë baird, james barksdale chairmen michael a. vatis executive director Copyright © 2003 Markle Foundation All rights reserved. ISBN 0-9747809-0-1 markle foundation task force on national security in the information age Chairmen Slade Gorton James Dempsey Preston, Gates & Ellis Center for Democracy and Technology Zoë Baird Markle Foundation Morton H. Halperin Mary DeRosa Open Society Institute Center for Strategic and International James L. Barksdale Studies The Barksdale Group Margaret A. Hamburg Nuclear Threat Initiative Lara Flint Executive Director Center for Democracy and Technology John J. Hamre Michael A. Vatis Center for Strategic and International Lauren Hall Markle Foundation Studies Microsoft Members Eric Holder Jeff Jonas Covington & Burling Systems Research & Development Alexander Aleinikoff Georgetown University Law Center Arnold Kanter James Lewis The Scowcroft Group Center for Strategic and International Robert D. Atkinson Studies Progressive Policy Institute Michael O. Leavitt Governor of Utah Terrill D. Maynard Stewart Baker Steptoe & Johnson Tara Lemmey Mary McCarthy Project LENS Center for Strategic and International Eric Benhamou Studies 3Com Corporation Gilman Louie In-Q-Tel Patrick J. Sullivan, Jr. Jerry Berman Cherry Creek Schools Center for Democracy and Technology Judith A. Miller Williams & Connolly Winston Wiley Robert M. Bryant Booz Allen Hamilton National Insurance Crime Bureau James Morris Carnegie Mellon University Associate Director Ashton Carter Harvard University Craig Mundie Mary McKinley Microsoft Markle Foundation Wesley P. Clark Wesley P. Clark & Associates Jeffrey H. Smith Task Force Staff Arnold & Porter Wayne Clough Nancy Boursiquot Georgia Institute of Technology Abraham D.
    [Show full text]
  • Azer Bestavros Biographical Sketch
    Azer Bestavros Biographical Sketch Azer Bestavros is Warren Distinguished Professor of Computer Science and Founding Director of the Hariri Institute for Comput- ing at Boston University (BU), which was set up in 2011 as an incu- bator for high-risk, high-reward multidisciplinary collaborations. Notable efforts that he incubated at the Institute, which matured into multi-million-dollar projects, include the $25M+ Mass Open Cloud, $10M NSF Cloud Security Frontier project, $5M Red Hat Collaboratory for open-source innovation, and the $1M+ SCOPE cloud platform for smart-city applications. Under his leadership, the Institute served as an anchor for a number of university pro- grams, including the Data Science Initiative (DSI), the Digital Health Initiative, the Digital Learning Initiative (DLI), the AI Research Initiative (AIR), the Cyber Security, Law, and Society Alliance, the Software & Application Innovation Lab (SAIL), and BU Spark! for student-driven innovation. Prior to his inaugural role at the Hariri Institute, Professor Bestavros chaired the BU Computer Science Department from 2000 to 2007, having joined it in 1991 after completing his PhD in Computer Science at Harvard University. He holds affiliated appointments in the Department of Electrical & Computer Engineering, the Division of Systems Engineering, and a number of research centers at BU. He held visiting professorships at Harvard University, Institut Eur´ecomin France, KTH Royal Institute of Technology in Sweden, and the American University in Cairo. A distinguished educator and scholar, Professor Bestavros teaches and pursues research in networking, distributed computing, cybersecurity, and high-assurance systems. His semi- nal contributions include pioneering studies of web push caching through content distribution networks, self-similar Internet traffic characterization, game-theoretic cloud resource manage- ment, and safety certification of networked systems and software.
    [Show full text]
  • Winter 2017 FLIGHTLINE
    Daedalus Winter 2017 FLIGHTLINE 18th (Mile High) Flight Denver, CO Cyber Security is headline news these days as we combat threats to our national security and personal identities. Major General Dale Meyerrose, USAF (Ret) was our guest speaker in Oct 2016 to speak to us on that subject. During - Director of National Intelligence. That is quite a lengthy, triple-hat job title but what it boiled down to is that he became the internationally respected subject mat- ter expert on cyber security, strategic planning, intelligence leadership, telemedi- cine technology and military intelligence matters. And, it all started at the USAF Academy as a classmate of our Flight Cap- both on the parachute demonstration team and both became Master Parachutists. Maj gen Dale Meyerrose He founded the MeyerRose Group, LLC, consulting world-wide on cyber security, strategy, business planning, and executive development. He is frequently quoted in international news and trade publications and often ap- pears on Fox News, CNN, MSNBC, and other programs like Bloomberg International. General Meyerrose spoke to us and emphasized cyber security myths vs. the reality. For example the myth that the biggest threat is from outside sources; the reality is inside sources. The myth that high tech hacking is the biggest threat; in reality it is simply credential theft whether it be government agencies or personal data. The myth that China or some other nation is the biggest threat; in reality it is ourselves. We allow malicious software in to on social media channels or e-mail. The bottom line is that cyber security is not something you have; it is something you constantly work on.
    [Show full text]
  • Markle Foundation
    Implementing a Trusted Information Sharing Environment Using Immutable Audit Logs to Increase Security, Trust, and Accountability A PAPER BY THE MARKLE TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE zoë baird, james barksdale chairmen M A R K L E F O U N D A T I O N TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE MEMBERS AND ASSOCIATES, 2006 Chairmen Eric H. Holder, Jr. Richard Falkenrath Covington & Burling The Brookings Institution Zoë Baird Markle Foundation Jeff Jonas David Gunter IBM Microsoft Corporation Jim Barksdale Barksdale Management Corporation Arnold Kanter Drew Ladner The Scowcroft Group JBoss, Inc. Members Tara Lemmey Randolph D. Moss Robert D. Atkinson LENS Ventures Wilmer Cutler Pickering LLP Progressive Policy Institute Gilman Louie Bill Neugent Eric Benhamou Alsop Louie Partners MITRE 3Com Corporation, Palm, Inc., Benhamou Global Ventures, LLC John O. Marsh, Jr. Daniel Prieto Marsh Institute for Government and Public Kennedy School of Government, Harvard Jerry Berman Policy, Shenandoah University University Center for Democracy & Technology Judith A. Miller Clay Shirky Robert M. Bryant Bechtel Group, Inc. Writer and Consultant National Insurance Crime Bureau James H. Morris Peter Swire Ashton B. Carter Carnegie Mellon University Moritz College of Law, The Ohio State University Kennedy School of Government, Harvard University Craig Mundie Kim Taipale Microsoft Corporation Center for Advanced Studies in Science and Wesley Clark Technology Policy Wesley K. Clark & Associates Jeffrey H. Smith Arnold & Porter LLP Mel Taub William P. Crowell Independent Consultant Security and Intelligence Consultant Abraham D. Sofaer Hoover Institution, Stanford University Richard Wilhelm Bryan Cunningham Booz Allen Hamilton Morgan & Cunningham LLC James B.
    [Show full text]
  • Tuskegee Airmen at Oscoda Army Air Field David K
    WINTER 2016 - Volume 63, Number 4 WWW.AFHISTORY.ORG know the past .....Shape the Future Our Sponsors Our Donors A Special Thanks to Members for their Sup- Dr Richard P. Hallion port of our Recent Events Maj Gen George B. Harrison, USAF (Ret) Capt Robert Huddleston and Pepita Huddleston Mr. John A. Krebs, Jr. A 1960 Grad Maj Gen Dale Meyerrose, USAF (Ret) Col Richard M. Atchison, USAF (Ret) Lt Gen Christopher Miller The Aviation Museum of Kentucky Mrs Marilyn S. Moll Brig Gen James L. Colwell, USAFR (Ret) Col Bobby B. Moorhatch, USAF (Ret) Natalie W. Crawford Gen Lloyd Fig Newton Lt Col Michael F. Devine, USAF (Ret) Maj Gen Earl G Peck, USAF (Ret) Maj Gen Charles J. Dunlap, Jr., USAF (Ret) Col Frederic H Smith, III, USAF (Ret) SMSgt Robert A. Everhart, Jr., USAF (Ret) Don Snyder Lt Col Raymond Fredette, USAF (Ret) Col Darrel Whitcomb, USAFR (Ret) Winter 2016 -Volume 63, Number 4 WWW.AFHISTORY.ORG know the past .....Shape the Future Features Boyd Revisited: A Great Mind with a Touch of Madness John Andreas Olsen 7 Origins of Inertial Navigation Thomas Wildenberg 17 The World War II Training Experiences of the Tuskegee Airmen at Oscoda Army Air Field David K. Vaughan 25 Ralph S. Parr, Jr., USAF Fighter Pilot Extraordinaire Daniel L. Haulman 41 All Through the Night, Rockwell Field 1923, Where Air-to-Air Refueling Began Robert Bruce Arnold 45 Book Reviews Thor Ballistic Missile: The United States and the United Kingdom in Partnership By John Boyes Review by Rick W. Sturdevant 50 An Illustrated History of the 1st Aero Squadron at Camp Furlong: Columbus, New Mexico 1916-1917 By John L.
    [Show full text]
  • Designing Learning Futures Digital Media & Learning Conference
    DESIGNING LEARNING FUTURES DIGITAL MEDIA & LEARNING CONFERENCE MARCH 3-5, 2011 // LONG BEACH, CALIFORNIA SPONSORS OVERVIEW About the Theme: Designing Learning Futures Conference Chair and Committee Keynotes and Plenary Session Panelists CONFERENCE SCHEDULE [9] Overview [10] March 3, 2011 [11] March 4, 2011 [11] March 5, 2011 CONFERENCE INFORMATION Wireless and Social Media at DML2011 Conference Receptions and Gatherings CONFERENCE PROGRAM ABSTRACTS [15] March 3, 2011 [28] March 4, 2011 [51] March 5, 2011 CONFERENCE PROGRAM DEMOS AND EXHIBITS March 3, 2011: Mozilla Science Fair March 4, 2011: Demos & Exhibits Sponsored by the Pearson Foundation MAPS Conference Venue Maps Map of Local Area GENERAL INFORMATION About Long Beach Travel and Accommodation Local Cuisine SUPPLEMENTS RoadTrip Nation DMLcentral DML Competition DESIGNING LEARNING FUTURES DIGITAL MEDIA & LEARNING CONFERENCE Hilton Conference & Meeting Center // Long Beach, CaliforniaMarch 3-5, 2011 CONFERENCE CHAIR Katie Salen CONFERENCE COMMITTEE Kimberly Austin Student Volunteers Chair danah boyd Emerging Platforms and Policies Chair Sheryl Grant DML Competition Liason Chair Heather A. Horst Local Organizing Committee Chair Trebor Scholz Social Media Chair Mark Surman New Collectives Chair S. Craig Watkins Youth, Digital Media and Empowerment Chair KEYNOTE PRESENTERS Alice Taylor Muki Hansteen-Izora The Digital Media and Learning Conference is an annual event supported by the MacArthur Foun- dation and organized by the Digital Media and Learning Research Hub at University of California, Irvine. The conference is meant to be an inclusive, international and annual gathering of scholars and practitioners in the field, focused on fostering interdisciplinary and participatory dialog and linking theory, empirical study, policy, and practice. SPONSORS UNIVERSITY OF CALIFORNIA UC HUMANITIES RESEHRARCH INSTITUTEI DML hub CONFERENCE OVERVIEW The Digital Media and Learning Conference 2011 is the second annual event organized by the Digital Media and Learning Hub at the University of California, Irvine.
    [Show full text]
  • Introducing Wireless Grids Technology to the Field of Telemedicine
    Syracuse University SURFACE Dissertations - ALL SURFACE May 2014 Introducing Wireless Grids Technology to the Field of Telemedicine Dale W. Meyerrose Syracuse University Follow this and additional works at: https://surface.syr.edu/etd Part of the Social and Behavioral Sciences Commons Recommended Citation Meyerrose, Dale W., "Introducing Wireless Grids Technology to the Field of Telemedicine" (2014). Dissertations - ALL. 74. https://surface.syr.edu/etd/74 This Dissertation is brought to you for free and open access by the SURFACE at SURFACE. It has been accepted for inclusion in Dissertations - ALL by an authorized administrator of SURFACE. For more information, please contact [email protected]. ABSTRACT While telemedicine and technology-enabled education are not new concepts and have significant bodies of research, in depth application to management and treatment of veteran Post-Traumatic Stress Disorder (PTSD) and Traumatic Brain Injury (TBI) is relatively new. The conflicts in the Southwest Asia over the last two decades have significantly increased the need for healthcare and support services for these returning warriors. Creative thinking and innovative technologies are needed to meet the growing and changing demand of these patients in the face of many competing demands within the U.S. healthcare sector. This doctoral research study investigated the potential for a platform-agnostic (ad hoc) networking technology to serve as a trusted social networking and training platform for healthcare providers who are striving to provide quality healthcare that meets the needs of veterans suffering from PTSD and TBI. This research study analyzed the effectiveness of a digitally networked environment to deliver desired training and certification outcomes in a military healthcare environment.
    [Show full text]
  • “There Are Many Things to Love About Connecting for Health
    Nation At Risk: Policy Makers Need Better Information to Protect the Country The Markle Foundation Task Force on National Security in the Information Age March 2009 THE MARKLE FOUNDATION TASK FORCE ON NATIONAL SECURITY IN THE INFORMATION AGE Zoë Baird, Co-Chair* Jim Barksdale, Co-Chair The Markle Foundation Barksdale Management Corporation MEMBERS: Robert D. Atkinson Jim Dempsey* Slade Gorton* Judith A. Miller* Information Technology and Center for Democracy & K&L Gates Bechtel Group, Inc. Innovation Foundation Technology Morton H. Halperin James H. Morris Rand Beers** Mary DeRosa** Open Society Institute Carnegie Mellon University National Security Network Senate Committee on the Judiciary Margaret A. Hamburg** Craig Mundie Eric Benhamou Nuclear Threat Initiative Microsoft Corporation 3Com Corporation, Palm, Inc., Sidney D. Drell Benhamou Global Ventures, LLC Stanford Linear John J. Hamre Jeffrey H. Smith* Accelerator Center, Center for Strategic and Arnold & Porter LLP Jerry Berman Stanford University International Studies Center for Democracy & Abraham D. Sofaer* Technology Esther Dyson Eric H. Holder, Jr.** Hoover Institution, CNET Networks Covington & Burling Stanford University Robert M. Bryant National Insurance Crime Bureau Amitai Etzioni Jeff Jonas* James B. Steinberg** The George Washington IBM Lyndon Johnson School of Public Ashton B. Carter** University Affairs, University of Texas at Kennedy School of Government, Arnold Kanter Austin Harvard University Richard Falkenrath The Scowcroft Group New York Police Department Kim Taipale Wesley Clark Tara Lemmey* Center for Advanced Studies in Wesley K. Clark & Associates David J. Farber LENS Ventures Science Carnegie Mellon University and Technology Policy William P. Crowell* Gilman Louie Security and Intelligence John Gage Alsop Louie Partners Rick White* Consultant Kleiner Perkins Caulfield & Byers former Member of Congress John O.
    [Show full text]
  • WINTER 2010 - Volume 57, Number 4 the Air Force Historical Foundation Founded on May 27, 1953 by Gen Carl A
    WINTER 2010 - Volume 57, Number 4 WWW.AFHISTORICALFOUNDATION.ORG The Air Force Historical Foundation Founded on May 27, 1953 by Gen Carl A. “Tooey” Spaatz MEMBERSHIP BENEFITS and other air power pioneers, the Air Force Historical All members receive our exciting and informative Foundation (AFHF) is a nonprofi t tax exempt organization. Air Power History Journal, either electronically or It is dedicated to the preservation, perpetuation and on paper, covering: all aspects of aerospace history appropriate publication of the history and traditions of American aviation, with emphasis on the U.S. Air Force, its • Chronicles the great campaigns and predecessor organizations, and the men and women whose the great leaders lives and dreams were devoted to fl ight. The Foundation • Eyewitness accounts and historical articles serves all components of the United States Air Force— Active, Reserve and Air National Guard. • In depth resources to museums and activities, to keep members connected to the latest and AFHF strives to make available to the public and greatest events. today’s government planners and decision makers information that is relevant and informative about Preserve the legacy, stay connected: all aspects of air and space power. By doing so, the • Membership helps preserve the legacy of current Foundation hopes to assure the nation profi ts from past and future US air force personnel. experiences as it helps keep the U.S. Air Force the most modern and effective military force in the world. • Provides reliable and accurate accounts of historical events. The Foundation’s four primary activities include a quarterly journal Air Power History, a book program, a • Establish connections between generations.
    [Show full text]
  • Solving the Dilbert Paradox
    Solving the Dilbert Paradox Richard Adler Rapporteur Communications and Society Program Charles M. Firestone Executive Director Washington, D.C. 2011 To purchase additional copies of this report, please contact: The Aspen Institute Publications Office P.O. Box 222 109 Houghton Lab Lane Queenstown, Maryland 21658 Phone: (410) 820-5326 Fax: (410) 827-9174 E-mail: [email protected] For all other inquiries, please contact: The Aspen Institute Communications and Society Program One Dupont Circle, NW Suite 700 Washington, DC 20036 Phone: (202) 736-5818 Fax: (202) 467-0790 Charles M. Firestone Patricia K. Kelly Executive Director Assistant Director Copyright © 2011 by The Aspen Institute This work is licensed under the Creative Commons Attribution- Noncommercial 3.0 United States License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc/3.0/us/ or send a letter to Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA. The Aspen Institute One Dupont Circle, NW Suite 700 Washington, DC 20036 Published in the United States of America in 2011 by The Aspen Institute All rights reserved Printed in the United States of America ISBN: 0-89843-545-5 11-006 1816CSP/11-BK Contents FOREWORD, Charles M. Firestone ...............................................................v SOLVING THE DILBERT PARADOX, Richard Adler Defining the Dilbert Paradox ......................................................................... 3 Defining Talent ...............................................................................................
    [Show full text]