24November2014

Advancing strategy, policy and programs for electronic warfare and electromagnetic spectrum operations

Member Login    Join    Renew

InfoWarCon 2010 Agenda

May 20, 2010:  All briefing that are releasable are posted under the title for the session.

Wednesday, 12 May  
 
Time Event Presenter/Chair
0800 Welcome Robert Giesler, IO Chair
0830

Keynote: National Security Issues in the Cyber World

Unfortunately Air Commodore Graham Wright had to cancel at the last moment.  The Keynote address was  presented by Winn Schwartau.  4G Cyberwar

Air Commodore Graham Wright, Deputy Director of the Office of Cyber Security (UK)
0915 Keynote: New Media in the "New" Information Battle Space Price Floyd, Principal Deputy Assistant Secretary of Defense for Public Affairs
1000

Session 1: {tooltip}The Power of Cyber and Social Networking{end-link}With the sudden rise of Social Networking Sites (SNS) to near virulent nature in both its use and popularity, SNS is used to form networks, create relationships and now, analyze the data behind the engines themselves.  This fascinating session shows how information is exchanged, how relationships are developed and the data itself is exploited to show previously imperceptible trends.{end-tooltip}.

 

Chair: Jack Holt
Panelists: Max Kelley, Facebook
Tim Hwang, OP-X Specialists
Matt Bigge, Strategic Social
Mark Pfeifle, S4
1200

Brown Bag Lunch Session: {tooltip}4G Warfare{end-link}The smart phone is highly mobile, prolific and a huge risk to military & government operations.   Bad actors attack infrastructures using multiple vectors; the smart phone is the next target. By 2014, there will be an estimated 4.1 billion mobile endpoints, most will have varying degrees of intelligence.  Smart phones are already 'chipped' with hostile hardware, Botnets are on iPhones, smart phone malware is widespread; and this is only the test phase. Denying access to social network sites is a small part of the solution , but that just gives a false sense of protection. Mobile computing security requires a new paradigm to affect proper levels of security, privacy and compliance, and must not decrease the usability of the device nor place the onus of protection on the end user.  This presentation provides compelling evidence that both military and civilian government organizations need to “secure” the smart phone ”“ sooner than later. With luck, governments will listen this time.{end-tooltip}.

Opening Keynote Briefing

Winn Schwartau, Founder
1300

Session 2: {tooltip}Deception Operations {end-link}Deception has been a critical piece of all military operations since the dawn of time, this session examines how the United States has integrated deception operations into recent military operations, compares how the Chinese use deception, how the press is an integral and often unwilling partner and how deception may change in the future.{end-tooltip}.

Kuehl Briefing


Chair: Dr. Daniel Kuehl
Panelists:  BG Thomas Draude
Timothy Thomas
Dr. Albert C. Pierce
1300

Session 3: {tooltip}The Internet and Future Conflicts{end-link}Meet the leaders of companies forging the way ahead in the internet, how their engines are changing the face of how we do business, and how their analytical tools are going to guide us in the 21st Century.{end-tooltip}.

Stern Briefing

Stowe Briefing

Boback Briefing

Chair:  BG John Davis
Panelists:  Geoffrey Stowe, Engineer, Palantir Technologies
Robert Boback, CEO, Tiversa

Matt Stern, General Dynamics

1500

Session 4: {tooltip}An Iraqi Military Perspective on War with the United States{end-link}Find out first-hand how the Iraqis viewed what the U.S. was doing and planning, how the Iraqis were responding and gain insight into why Saddam Hussein was unwilling and unable to alter his strategy on the eve of the 2003 war that toppled his regime.   Based on an in-depth study conducted by the Institute for Defense Analysis.{end-tooltip}

Kevin Woods, Institute for Defense Analysis

1500

Session 5: {tooltip}The Reality of Critical Infrastructure Vulnerability{end-link}The City of Seattle invited top experts from all over the United States to wreak havoc in their fair city, killing as many people as possible, sewing seeds of discontent, rendering the city unusable and undermining the collective faith in their government.  Learn what worked and why or why not.{end-tooltip}

Schaffner Briefing

Jake Schaffner, DISL, USD(I)

1700

Networking Social for Social Networking

 
Thursday, 13 May  
 

0800 

Opening

Robert Giesler

0805

Keynote: U.S. Navy Cyber Perspective

RDML Leigher Keynote Briefing

Rear Admiral William E. Leigher, Deputy Commander, U.S. Fleet Cyber Command/U.S. 10th Fleet

0845

Session 6: {tooltip}New Social Media In and Out of Iran{end-link}Learn how the tools like Facebook, LinkedIn, and Twitter are used to maintain a sense of openness in the authoritarian world of repressive regimes, focusing on Iran.  Using tools and techniques specifically designed to keep the portals to Iran open, hear how the truth was funneled in and evidence of their oppressive actions were exfiltrated for worldwide witnessing.{end-tooltip}

Chair: Rafal Rohozinski, Principal at The SecDev Group
Panelists: Dr. John Kelly
Austin Heap, Haystack developer
Nart Villeneuve, Chief Technology Officer, Psiphon Inc

0845

Session 7: {tooltip}Exploiting Commercial Cyber Intelligence{end-link}Hear how the tools and the techniques used by the commercial sector can augment and assist the Intelligence Community in supporting Cyberspace Operations.   What is the private sector doing that is different and unique?  What are the risks and tradeoffs?{end-tooltip}

Chair: Matthew Pushkin

Panelists: Jake Schaffner
Richard Forno

Alexander Cochran
Chris Rouland
Brian Varine

1030

Session 8: {tooltip}Cultural Aspects of Social Networking in the Middle East{end-link}The culture of the Middle East is very different from that of the West.  How can these differences be best taught to IO professionals and exploited?  What is important to the leaders in the Middle East and how can we influence them?  How does Social Networking in the Middle East differ from the West and what must we do to best take advantage?{end-tooltip}

Jennifer Bryson, PhD, Director, Islam and Civil Society Project, The Witherspoon Institute

Deven Desai, U.C. Berkeley BA, currently Princeton University Visiting Fellowk

1030

Session 9: {tooltip}Importance of EW to Cyberspace Superiority{end-link}The present and future of communication and conflict occurs within and is dependent on the electromagnetic environment.    Using the common electron, we communicate, prevent others from communicating, alter, degrade or deceive our adversaries.  In fact, the tactics, techniques and procedures used in electronic warfare are more similar to warfare in cyberspace than any other field, yet the two mission areas have been operationally separated.  How are these two mission areas related and should they be more closely integrated from either a train and equip, or operational perspective?{end-tooltip}

LtCol Hare Briefing

Chair: Lt Col Forrest Hare
Panelists:
Lt Col Dean A. Clothier

Mr. Steven McNamara
COL Kevin Wright
Mr. Timothy L. Thomas

1200 Brown Bag Lunch Session: {tooltip}H4ck3rs are People Too{end-link}This documentary is a portrait of the hacking community. In an effort to challenge preconceived notions and media-driven stereotypes H4CK3RS ARE PEOPLE TOO lets hackers speak for themselves and introduce their community to the public.{end-tooltip} a flim by Ashley Schwartau
1300 IO Lifetime Achievement Award Presentation to Herb Romerstein Mr. Robert Giesler, IO Chair

1310

Session 10: {tooltip}Israeli IO{end-link}Israel conducted a campaign against Hezbollah in Lebanon in 2006 but was widely perceived to have lost the concurrent information war, Hezbollah was perceived to be more agile, more supportive and creative in the war of ideas.  In 2007, recognizing the need for a centralized coordination body while still enabling a faster information execution cycle, Israel formed a National Information Directorate and a national information strategy.   Newly empowered, Israel conducted successful operations against Hamas in Gaza and was widely regarded as having won the accompanying information war.{end-tooltip}

Cast Lead - Black and White Briefing

Emergency Procedure Law Brief

National Information Directorate

Public Affairs Policy Process

Yarden Vatikay, Director, National Information Directorate, Israel Prime Minister
Dennis Murphy, Professor, US Army War College
1600 Session 11: {tooltip}Intentional RF Interference on Satellite Communication Systems.{end-link} The growing demands for bandwidth are placing pressure on the available radio frequency spectrum, increasing the probability of unintentional interference. In the meantime, commercial satellite systems remain vulnerable to purposeful interference, to include jamming, unauthorized access, information, insertion, and signal probing. In this session, subject matter experts will discuss the changing satellite communications environment, traditional and non-traditional threats, and techniques for identification, geolocation, and support to jamming and interference response.{end-tooltip}

Jeff Boushell, CEO, Interferometrics, Inc. 

Dr. Dan Oltrogge, AGI

Kevin Davis, Transmitter Location Systems LLC

Friday, 14 May  
 

0800   

Opening

Robert Giesler

0805

Keynote: {tooltip}IO and the Media{end-link}Ms. Dana Priest talks about the intricate relationship between the press and military information operations and how they each take advantage of the other and respect certain bounds.  Ethical and legal problems have accumulated between these two notable professions that impact on the perception of professionalism and objectivity.{end-tooltip}

Dana Priest, Investigative Reporter, The Washington Post

0845

Session 12: {tooltip}CENTCOM IO Programs{end-link}In the broader CENTCOM Area of Responsibility, Operation Earnest Voice (OEV) is the critical program of record that resources their efforts to synchronize their Information Operations activities, to counter extremist ideology and propaganda, and to ensure that credible voices in the region are heard.  OEV provides CENTCOM with direct communication capabilities to reach regional audiences through traditional media as well as via websites and regional public affairs blogging.  In each of these efforts, they follow the admonition the United States practiced in Iraq, that of trying to be “first with the truth.”  Full and enduring funding of OEV and other DoD information operations efforts enables, in coordination with State Department initiatives, the United States to do just that and, in so doing, to communicate critical  messages and to counter the propaganda of adversaries.{end-tooltip}

COL Steve Mains, Division Chief for Information Operations, USCENTCOM

0915

Session 13: {tooltip}Afghanistan/Pakistan IO Integration{end-link}The tribal nature of the borders between Afghanistan and Pakistan do not align with the geographic nature of their borders, the two countries are fraught with problems unique to their respective areas and yet share a sort of commonality dating back thousands of years.  Hear how Information Operations in this highly contentious and unique area is coordinated to maximize its effectiveness on the ground.{end-tooltip}

Chair: Brig Gen Rowayne A. Schatz Jr., Deputy Director for Global Operations
Panelists:  Maj. Charlotte Carpenter, USMC
COL Steve Mains, Division Chief for Information Operations, US CENTCOM

1030

Session 14: {tooltip}Future IO Integration{end-link}Information Operations are still relatively new to the military, their policy, doctrine and practices are evolving almost as fast as the technologies that supports them.   This panel of futurists will discuss how IO should be changing in the future to integrate more seamlessly with future operations.{end-tooltip}

Chair: CAPT(R) Stephanie Helm

Panelists:
COL Chuck Eassa
T.X. Hammes
Rosemary Wenchel

1200

End

 
http://www.israelemb.org/bios/Noam%20katz.html

footer-logoWith over 13,000 members internationally, the Association of Old Crows is an organization for individuals who have common interests in Electronic Warfare (EW), Electromagnetic Spectrum Management Operations, Cyber Electromagnetic Activities (CEMA), Information Operations (IO), and other information related capabilities. The Association of Old Crows provides a means of connecting members and organizations nationally and internationally across government, defense, industry, and academia to promote the exchange of ideas and information, and provides a platform to recognize advances and contributions in these fields.

Home  -  About  -  Events  -  Publications  -  Scholarships  -  Membership  -  Members & Committees  -   Chapters  -  Contact

Member Login  -  Join  -  Renew

Copyright © 2014, AOC. All Rights Reserved.
3by400, a North Georgia web design team using Joomla!