May 20, 2010:  All briefing that are releasable are posted under the title for the session.

Wednesday, 12 May  
Time Event Presenter/Chair
0800 Welcome Robert Giesler, IO Chair

Keynote: National Security Issues in the Cyber World

Unfortunately Air Commodore Graham Wright had to cancel at the last moment.  The Keynote address was  presented by Winn Schwartau.  4G Cyberwar

Air Commodore Graham Wright, Deputy Director of the Office of Cyber Security (UK)
0915 Keynote: New Media in the "New" Information Battle Space Price Floyd, Principal Deputy Assistant Secretary of Defense for Public Affairs

Session 1: {tooltip}The Power of Cyber and Social Networking{end-link}With the sudden rise of Social Networking Sites (SNS) to near virulent nature in both its use and popularity, SNS is used to form networks, create relationships and now, analyze the data behind the engines themselves.  This fascinating session shows how information is exchanged, how relationships are developed and the data itself is exploited to show previously imperceptible trends.{end-tooltip}.


Chair: Jack Holt
Panelists: Max Kelley, Facebook
Tim Hwang, OP-X Specialists
Matt Bigge, Strategic Social
Mark Pfeifle, S4

Brown Bag Lunch Session: {tooltip}4G Warfare{end-link}The smart phone is highly mobile, prolific and a huge risk to military & government operations.   Bad actors attack infrastructures using multiple vectors; the smart phone is the next target. By 2014, there will be an estimated 4.1 billion mobile endpoints, most will have varying degrees of intelligence.  Smart phones are already 'chipped' with hostile hardware, Botnets are on iPhones, smart phone malware is widespread; and this is only the test phase. Denying access to social network sites is a small part of the solution , but that just gives a false sense of protection. Mobile computing security requires a new paradigm to affect proper levels of security, privacy and compliance, and must not decrease the usability of the device nor place the onus of protection on the end user.  This presentation provides compelling evidence that both military and civilian government organizations need to “secure” the smart phone ”“ sooner than later. With luck, governments will listen this time.{end-tooltip}.

Opening Keynote Briefing

Winn Schwartau, Founder

Session 2: {tooltip}Deception Operations {end-link}Deception has been a critical piece of all military operations since the dawn of time, this session examines how the United States has integrated deception operations into recent military operations, compares how the Chinese use deception, how the press is an integral and often unwilling partner and how deception may change in the future.{end-tooltip}.

Kuehl Briefing

Chair: Dr. Daniel Kuehl
Panelists:  BG Thomas Draude
Timothy Thomas
Dr. Albert C. Pierce

Session 3: {tooltip}The Internet and Future Conflicts{end-link}Meet the leaders of companies forging the way ahead in the internet, how their engines are changing the face of how we do business, and how their analytical tools are going to guide us in the 21st Century.{end-tooltip}.

Stern Briefing

Stowe Briefing

Boback Briefing

Chair:  BG John Davis
Panelists:  Geoffrey Stowe, Engineer, Palantir Technologies
Robert Boback, CEO, Tiversa

Matt Stern, General Dynamics


Session 4: {tooltip}An Iraqi Military Perspective on War with the United States{end-link}Find out first-hand how the Iraqis viewed what the U.S. was doing and planning, how the Iraqis were responding and gain insight into why Saddam Hussein was unwilling and unable to alter his strategy on the eve of the 2003 war that toppled his regime.   Based on an in-depth study conducted by the Institute for Defense Analysis.{end-tooltip}

Kevin Woods, Institute for Defense Analysis


Session 5: {tooltip}The Reality of Critical Infrastructure Vulnerability{end-link}The City of Seattle invited top experts from all over the United States to wreak havoc in their fair city, killing as many people as possible, sewing seeds of discontent, rendering the city unusable and undermining the collective faith in their government.  Learn what worked and why or why not.{end-tooltip}

Schaffner Briefing

Jake Schaffner, DISL, USD(I)


Networking Social for Social Networking

Thursday, 13 May  



Robert Giesler


Keynote: U.S. Navy Cyber Perspective

RDML Leigher Keynote Briefing

Rear Admiral William E. Leigher, Deputy Commander, U.S. Fleet Cyber Command/U.S. 10th Fleet


Session 6: {tooltip}New Social Media In and Out of Iran{end-link}Learn how the tools like Facebook, LinkedIn, and Twitter are used to maintain a sense of openness in the authoritarian world of repressive regimes, focusing on Iran.  Using tools and techniques specifically designed to keep the portals to Iran open, hear how the truth was funneled in and evidence of their oppressive actions were exfiltrated for worldwide witnessing.{end-tooltip}

Chair: Rafal Rohozinski, Principal at The SecDev Group
Panelists: Dr. John Kelly
Austin Heap, Haystack developer
Nart Villeneuve, Chief Technology Officer, Psiphon Inc


Session 7: {tooltip}Exploiting Commercial Cyber Intelligence{end-link}Hear how the tools and the techniques used by the commercial sector can augment and assist the Intelligence Community in supporting Cyberspace Operations.   What is the private sector doing that is different and unique?  What are the risks and tradeoffs?{end-tooltip}

Chair: Matthew Pushkin

Panelists: Jake Schaffner
Richard Forno

Alexander Cochran
Chris Rouland
Brian Varine


Session 8: {tooltip}Cultural Aspects of Social Networking in the Middle East{end-link}The culture of the Middle East is very different from that of the West.  How can these differences be best taught to IO professionals and exploited?  What is important to the leaders in the Middle East and how can we influence them?  How does Social Networking in the Middle East differ from the West and what must we do to best take advantage?{end-tooltip}

Jennifer Bryson, PhD, Director, Islam and Civil Society Project, The Witherspoon Institute

Deven Desai, U.C. Berkeley BA, currently Princeton University Visiting Fellowk


Session 9: {tooltip}Importance of EW to Cyberspace Superiority{end-link}The present and future of communication and conflict occurs within and is dependent on the electromagnetic environment.    Using the common electron, we communicate, prevent others from communicating, alter, degrade or deceive our adversaries.  In fact, the tactics, techniques and procedures used in electronic warfare are more similar to warfare in cyberspace than any other field, yet the two mission areas have been operationally separated.  How are these two mission areas related and should they be more closely integrated from either a train and equip, or operational perspective?{end-tooltip}

LtCol Hare Briefing

Chair: Lt Col Forrest Hare
Lt Col Dean A. Clothier

Mr. Steven McNamara
COL Kevin Wright
Mr. Timothy L. Thomas

1200 Brown Bag Lunch Session: {tooltip}H4ck3rs are People Too{end-link}This documentary is a portrait of the hacking community. In an effort to challenge preconceived notions and media-driven stereotypes H4CK3RS ARE PEOPLE TOO lets hackers speak for themselves and introduce their community to the public.{end-tooltip} a flim by Ashley Schwartau
1300 IO Lifetime Achievement Award Presentation to Herb Romerstein Mr. Robert Giesler, IO Chair


Session 10: {tooltip}Israeli IO{end-link}Israel conducted a campaign against Hezbollah in Lebanon in 2006 but was widely perceived to have lost the concurrent information war, Hezbollah was perceived to be more agile, more supportive and creative in the war of ideas.  In 2007, recognizing the need for a centralized coordination body while still enabling a faster information execution cycle, Israel formed a National Information Directorate and a national information strategy.   Newly empowered, Israel conducted successful operations against Hamas in Gaza and was widely regarded as having won the accompanying information war.{end-tooltip}

Cast Lead - Black and White Briefing

Emergency Procedure Law Brief

National Information Directorate

Public Affairs Policy Process

Yarden Vatikay, Director, National Information Directorate, Israel Prime Minister
Dennis Murphy, Professor, US Army War College
1600 Session 11: {tooltip}Intentional RF Interference on Satellite Communication Systems.{end-link} The growing demands for bandwidth are placing pressure on the available radio frequency spectrum, increasing the probability of unintentional interference. In the meantime, commercial satellite systems remain vulnerable to purposeful interference, to include jamming, unauthorized access, information, insertion, and signal probing. In this session, subject matter experts will discuss the changing satellite communications environment, traditional and non-traditional threats, and techniques for identification, geolocation, and support to jamming and interference response.{end-tooltip}

Jeff Boushell, CEO, Interferometrics, Inc. 

Dr. Dan Oltrogge, AGI

Kevin Davis, Transmitter Location Systems LLC

Friday, 14 May  



Robert Giesler


Keynote: {tooltip}IO and the Media{end-link}Ms. Dana Priest talks about the intricate relationship between the press and military information operations and how they each take advantage of the other and respect certain bounds.  Ethical and legal problems have accumulated between these two notable professions that impact on the perception of professionalism and objectivity.{end-tooltip}

Dana Priest, Investigative Reporter, The Washington Post


Session 12: {tooltip}CENTCOM IO Programs{end-link}In the broader CENTCOM Area of Responsibility, Operation Earnest Voice (OEV) is the critical program of record that resources their efforts to synchronize their Information Operations activities, to counter extremist ideology and propaganda, and to ensure that credible voices in the region are heard.  OEV provides CENTCOM with direct communication capabilities to reach regional audiences through traditional media as well as via websites and regional public affairs blogging.  In each of these efforts, they follow the admonition the United States practiced in Iraq, that of trying to be “first with the truth.”  Full and enduring funding of OEV and other DoD information operations efforts enables, in coordination with State Department initiatives, the United States to do just that and, in so doing, to communicate critical  messages and to counter the propaganda of adversaries.{end-tooltip}

COL Steve Mains, Division Chief for Information Operations, USCENTCOM


Session 13: {tooltip}Afghanistan/Pakistan IO Integration{end-link}The tribal nature of the borders between Afghanistan and Pakistan do not align with the geographic nature of their borders, the two countries are fraught with problems unique to their respective areas and yet share a sort of commonality dating back thousands of years.  Hear how Information Operations in this highly contentious and unique area is coordinated to maximize its effectiveness on the ground.{end-tooltip}

Chair: Brig Gen Rowayne A. Schatz Jr., Deputy Director for Global Operations
Panelists:  Maj. Charlotte Carpenter, USMC
COL Steve Mains, Division Chief for Information Operations, US CENTCOM


Session 14: {tooltip}Future IO Integration{end-link}Information Operations are still relatively new to the military, their policy, doctrine and practices are evolving almost as fast as the technologies that supports them.   This panel of futurists will discuss how IO should be changing in the future to integrate more seamlessly with future operations.{end-tooltip}

Chair: CAPT(R) Stephanie Helm

COL Chuck Eassa
T.X. Hammes
Rosemary Wenchel