SlideShare a Scribd company logo
1 of 34
Download to read offline
www.ShepherdsPi.com
“What technologies
will be required
over the next 10 years
to protect U.S. interests?”
An Exercise in Prediction
What if we had asked that question,
15 years ago?
“Asymmetric adversary” = an information challenge
(i.e. = intel hard target)
Seeming irrelevance of traditional methods for new targets
- Order of battle
- State-to-state analysis
- “Kremlinological” approaches
- Staid, “authoritative Core Knowledge” repositories
Challenges of IT during wartime
- Stress on systems infrastructure of 2 wars (3?)
- Stress on software (link-analysis, SNA, “search”)
- Stress on collection capacity (sensor grids, Internet)
- Stress on integrity of systems & comms (“cybersecurity”)
- Stress on analysts’ – and technologists’ – imagination
Some IC Surprises Post-9/11
Pace of Technology Change continued along Moore’s Law
Lines of Business disrupted by Internet and related tech
- Communications biz ( -> mobile, transnational, price drops)
- PC biz (laptops, tablets, smartphones)
- Music biz (iTunes, streaming)
- Media biz (near-death print, narrowcasting, ad revolution)
Increasing Role of USG in shaping/governing Internet policy
Private Sector Surprises Post-9/11
• Technological Change
• Difficulties in Supporting USG
• Globalization
Future Business Challenges
New Innovation, New Opportunities
Natural User
Interfaces
Social
Media
Augmented
Reality
Big Data
Machine
Learning
Collaboration Cloud & Services
Cyber
Security
Mobility
Ambient Computing
Machine Learning
Two core themes
of advanced R&D
Two core themes
of advanced R&D
The next paradigm shift: Ambient Computing
Important Implications of these two:
Machine learning is the ability for computers to learn
automatically from data to improve their future
performance continually.
Ambient computing refers to having computing devices,
embedded all around in the environment, that can
understand people’s intent and operate on their behalf.
Machine learning
Ambient computing
Consumer play from these waves:
An era where we move beyond the
personal computer to a world where
computing all around us becomes
more personal.
Government relevance of these waves:
• Unique and insanely powerful mission applications
• Government workforce and workplace transformed
by the Consumer transformation
Government missed 3 recent paradigm shifts…
badly.
1980 1990 2000 2010
Imagine if the WWII War Department had refused to
use telephones because of a Security argument citing
“Person-in-the-middle” re switchboards, or “Endpoint
vulnerability” re Party-lines?
Source: ComScore Reports, March 2014
Globalization
• Technological Change
• Difficulties in Supporting USG
• Globalization
Policy Challenges
Company data sources; Kleiner-Perkins research
Big Data is being used to
solve problems…
Policy
From three facets
1 2 3
Courtesy of and adapted from David Aucsmith
Legal
Pace of technological
change outpaces
regulatory expertise
1 2 3
Courtesy of and adapted from David Aucsmith
Defense Science Board 2015 Summer Study on Autonomy
…identify the science, engineering, and policy problems
that must be solved to permit greater operational use of
autonomy across all war-fighting domains…
…exploration of the bounds – both technological and
social – that limit the use of autonomy across a wide range of
military operations….”
Five Agreed-upon Principles, which
as a set are consistent with established
global norms of free expression and
privacy
Principles are designed to ensure that
governments’ law-enforcement and
intelligence efforts are:
• Rule-bound
• Narrowly tailored
• Transparent
• Subject to oversight
Brad Smith, December 8, 2013 press release
We’ll be watching as
technologies,
cultures,
governments
collide…
IC-CAE - Shepherd: The Internet 2015-2025
IC-CAE - Shepherd: The Internet 2015-2025

More Related Content

Viewers also liked (7)

Rahm 2.0
Rahm 2.0Rahm 2.0
Rahm 2.0
 
Final draft corrected pdf
Final draft corrected pdfFinal draft corrected pdf
Final draft corrected pdf
 
The Coder
The CoderThe Coder
The Coder
 
Textual analysis ansylery
Textual analysis ansyleryTextual analysis ansylery
Textual analysis ansylery
 
Feminist 15years slideshow
Feminist 15years slideshowFeminist 15years slideshow
Feminist 15years slideshow
 
Tuberkulosis
TuberkulosisTuberkulosis
Tuberkulosis
 
FirstSix Deck
FirstSix DeckFirstSix Deck
FirstSix Deck
 

Similar to IC-CAE - Shepherd: The Internet 2015-2025

[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
Adam Thierer
 
Trust and the web veria 11 12- 09
Trust and  the web  veria  11 12- 09Trust and  the web  veria  11 12- 09
Trust and the web veria 11 12- 09
vafopoulos
 

Similar to IC-CAE - Shepherd: The Internet 2015-2025 (20)

INT 1010 02.pdf
INT 1010 02.pdfINT 1010 02.pdf
INT 1010 02.pdf
 
Keis0s2 Is Stages 2008
Keis0s2 Is Stages 2008Keis0s2 Is Stages 2008
Keis0s2 Is Stages 2008
 
IT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notesIT8073 _Information Security _UNIT I Full notes
IT8073 _Information Security _UNIT I Full notes
 
IT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdfIT8073_Information Security_UNIT I _.pdf
IT8073_Information Security_UNIT I _.pdf
 
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)[SLIDES] Internet of Things presentation at AEI (Sept 2014)
[SLIDES] Internet of Things presentation at AEI (Sept 2014)
 
top 10 Data Mining Algorithms
top 10 Data Mining Algorithmstop 10 Data Mining Algorithms
top 10 Data Mining Algorithms
 
How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things? How Can Policymakers and Regulators Better Engage the Internet of Things?
How Can Policymakers and Regulators Better Engage the Internet of Things?
 
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
Internet of Things & Wearable Technology: Unlocking the Next Wave of Data-Dri...
 
Roadmap for the Trillion Sensor Universe -- a Gilt-hosted, Internet of Things...
Roadmap for the Trillion Sensor Universe -- a Gilt-hosted, Internet of Things...Roadmap for the Trillion Sensor Universe -- a Gilt-hosted, Internet of Things...
Roadmap for the Trillion Sensor Universe -- a Gilt-hosted, Internet of Things...
 
History of computer (1)b bbb
History of computer (1)b bbbHistory of computer (1)b bbb
History of computer (1)b bbb
 
Ethics And Computing
Ethics And ComputingEthics And Computing
Ethics And Computing
 
Marsden #Regulatingcode MIT
Marsden #Regulatingcode MITMarsden #Regulatingcode MIT
Marsden #Regulatingcode MIT
 
2600 v03 n06 (june 1986)
2600 v03 n06 (june 1986)2600 v03 n06 (june 1986)
2600 v03 n06 (june 1986)
 
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
“Permissionless Innovation” & the Grand Tech Policy Clash of Visions to Come
 
Cyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responsesCyber(in)security: systemic risks and responses
Cyber(in)security: systemic risks and responses
 
Systemic cybersecurity risk
Systemic cybersecurity riskSystemic cybersecurity risk
Systemic cybersecurity risk
 
Digital Networks
Digital NetworksDigital Networks
Digital Networks
 
Trust and the web veria 11 12- 09
Trust and  the web  veria  11 12- 09Trust and  the web  veria  11 12- 09
Trust and the web veria 11 12- 09
 
Economics of Information/Technology
Economics of Information/TechnologyEconomics of Information/Technology
Economics of Information/Technology
 
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...Cybersecurity and Emerging tech; recent published articles, speeches, and act...
Cybersecurity and Emerging tech; recent published articles, speeches, and act...
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 

IC-CAE - Shepherd: The Internet 2015-2025

  • 2. “What technologies will be required over the next 10 years to protect U.S. interests?” An Exercise in Prediction What if we had asked that question, 15 years ago?
  • 3. “Asymmetric adversary” = an information challenge (i.e. = intel hard target) Seeming irrelevance of traditional methods for new targets - Order of battle - State-to-state analysis - “Kremlinological” approaches - Staid, “authoritative Core Knowledge” repositories Challenges of IT during wartime - Stress on systems infrastructure of 2 wars (3?) - Stress on software (link-analysis, SNA, “search”) - Stress on collection capacity (sensor grids, Internet) - Stress on integrity of systems & comms (“cybersecurity”) - Stress on analysts’ – and technologists’ – imagination Some IC Surprises Post-9/11
  • 4. Pace of Technology Change continued along Moore’s Law Lines of Business disrupted by Internet and related tech - Communications biz ( -> mobile, transnational, price drops) - PC biz (laptops, tablets, smartphones) - Music biz (iTunes, streaming) - Media biz (near-death print, narrowcasting, ad revolution) Increasing Role of USG in shaping/governing Internet policy Private Sector Surprises Post-9/11
  • 5. • Technological Change • Difficulties in Supporting USG • Globalization Future Business Challenges
  • 6. New Innovation, New Opportunities
  • 8. Ambient Computing Machine Learning Two core themes of advanced R&D Two core themes of advanced R&D
  • 9. The next paradigm shift: Ambient Computing
  • 10. Important Implications of these two: Machine learning is the ability for computers to learn automatically from data to improve their future performance continually. Ambient computing refers to having computing devices, embedded all around in the environment, that can understand people’s intent and operate on their behalf.
  • 11. Machine learning Ambient computing Consumer play from these waves: An era where we move beyond the personal computer to a world where computing all around us becomes more personal. Government relevance of these waves: • Unique and insanely powerful mission applications • Government workforce and workplace transformed by the Consumer transformation
  • 12. Government missed 3 recent paradigm shifts… badly. 1980 1990 2000 2010
  • 13. Imagine if the WWII War Department had refused to use telephones because of a Security argument citing “Person-in-the-middle” re switchboards, or “Endpoint vulnerability” re Party-lines?
  • 14. Source: ComScore Reports, March 2014 Globalization
  • 15. • Technological Change • Difficulties in Supporting USG • Globalization Policy Challenges
  • 16.
  • 17. Company data sources; Kleiner-Perkins research Big Data is being used to solve problems…
  • 18. Policy From three facets 1 2 3 Courtesy of and adapted from David Aucsmith
  • 19. Legal Pace of technological change outpaces regulatory expertise 1 2 3 Courtesy of and adapted from David Aucsmith
  • 20. Defense Science Board 2015 Summer Study on Autonomy …identify the science, engineering, and policy problems that must be solved to permit greater operational use of autonomy across all war-fighting domains… …exploration of the bounds – both technological and social – that limit the use of autonomy across a wide range of military operations….”
  • 21.
  • 22.
  • 23.
  • 24.
  • 25. Five Agreed-upon Principles, which as a set are consistent with established global norms of free expression and privacy Principles are designed to ensure that governments’ law-enforcement and intelligence efforts are: • Rule-bound • Narrowly tailored • Transparent • Subject to oversight
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. Brad Smith, December 8, 2013 press release
  • 32. We’ll be watching as technologies, cultures, governments collide…