Author Topic: Markle Foundation 2003 "Trusted Information Network for DHS" White Paper  (Read 3696 times)

0 Members and 1 Guest are viewing this topic.


Offline birther truther tenther

  • Member
  • *****
  • Posts: 2,726
  • Against all forms of tyranny
Re: Markle Foundation 2003 "Trusted Information Network for DHS" White Paper
« Reply #1 on: November 06, 2010, 04:06:33 am »
Markle Foundation Task Force on National Security in the Information Age
MEMBERS LIST
Co-Chairmen
Zoë Baird
James Barksdale

Members
Alexander Aleinikoff
Robert D. Atkinson
Stewart A. Baker
Eric Benhamou
Jerry Berman
Robert M. Bryant
Ashton Carter
Wesley Clark
Wayne Clough
William P. Crowell
Sidney D. Drell
Esther Dyson
Amitai Etzioni
David J. Farber
John Gage
John Gordon
Slade Gorton
Morton H. Halperin
Margaret A. Hamburg
John J. Hamre
Eric Holder
Arnold Kanter
Michael O. Leavitt
Tara Lemmey
Gilman Louie
John O. Marsh
Judith A. Miller
James H. Morris
Craig Mundie
Jeffrey H. Smith
Abraham D. Sofaer
James B. Steinberg
Paul Schott Stevens
Rick White
Philip Zelikow

Associate Director
Mary McKinley




Philip Zelikow is the executive director of the National Commission on Terrorist Attacks Upon the United States (the 9/11 Commission). He is also the director of the Miller Center of Public Affairs and White Burkett Miller Professor of History at the University of Virginia. After serving in government with the Navy, the State Department, and the National Security Council, he taught at Harvard before assuming his present post in Virginia to direct the nation's largest research center on the American presidency. He was a member of the President's Foreign Intelligence Advisory Board and served as executive director of the National Commission on Federal Election Reform, chaired by former presidents Carter and Ford. Zelikow has also been executive director of the Markle Foundation Task Force on National Security in the Information Age and director of the Aspen Strategy Group, a policy program of the Aspen Institute.



Eric Holder, Jr., is a partner at the law firm of Covington & Burling. He most recently served as U.S. deputy attorney general. Holder began his career as a prosecutor at the Justice Department, he was appointed associate judge of the Superior Court for the District of Columbia in 1988, and he served until 1993. From 1993 to 1997, he was U.S. attorney for the District of Columbia. He was deputy attorney general from 1997 until the inauguration of President Bush, and briefly served under President Bush as acting attorney general pending the confirmation of Attorney General John Ashcroft.


Gilman Louie is the president and CEO of In-Q-Tel, the venture capital firm helping to deliver new technologies to the CIA and intelligence community. Prior to helping found In-Q-Tel, Louie served as Hasbro Interactive's chief creative officer and as general manager of the Games.com group, for which he helped pioneer and market such interactive entertainment products as Falcon, the F-16 flight simulator, and Tetris, which he discovered in the Soviet Union. Prior to joining Hasbro, he served as chief executive of the Nexa Corporation, Sphere, Inc., Spectrum HoloByte, Inc., and MicroProse, Inc. Louie has served on the board of directors of Wizards of the Coast, Total Entertainment Network, Direct Language, and FASA Interactive.



William P. Crowell served as president and CEO of Cylink Corporation, a leading provider of e-business security solutions from November 1998 to February 2003, at which point it was acquired by SafeNet, Inc. Crowell came to Cylink from the National Security Agency, where he held a series of senior positions, including deputy director of operations and deputy director of the agency. He served on the President's Export Council and, in November 2001, was appointed to the DARPA Task Force on Terrorism and Deterrence. Crowell currently serves as a director of Broadware Technologies, a developer of video-surveillance-software infrastructure; and as a director of two software companies: ActivCard, which develops authentication software, and ArcSight, Inc., which develops enterprise-security-management software.



Craig Mundie is the chief technical officer of Advanced Strategies and Policy. He reports to chairman and chief software architect Bill Gates, with whom he is working to develop a comprehensive set of technical, business, and policy strategies for Microsoft Corp. Mundie's role includes coordination of aspects of these strategies where their implementation spans multiple Microsoft product groups. He focuses on Internet-scale platform architectures; on the definition of consumer computing experiences as part of the Microsoft®.NET initiatives; and on technical and policy issues surrounding critical infrastructure protection, intellectual property, and trustworthy computing.


Robert D. Atkinson

Robert Atkinson Robert Atkinson is vice president of the Progressive Policy Institute (PPI) and director of PPI's Technology & New Economy Project. Atkinson is the author of the PPI's New Economy Index series and numerous reports on information technology policy issues, such as the role of information technology in homeland defense. He previously served as executive director of the Rhode Island Economic Policy Council and was project director at the former Congressional Office of Technology Assessment

Stewart A. Baker
 is a partner with the Washington, DC-based law firm Steptoe & Johnson, where his practice includes issues relating to digital commerce, electronic surveillance, encryption, privacy, national security, and export controls. From 1992 to 1994, he served as general counsel at the National Security Agency. Baker is co-author of The Limits of Trust: Cryptography, Governments, and Electronic Commerce.


Esther Dyson is the chairman of EDventure Holdings, which publishes Release 1.0 (a monthly technology-industry newsletter) and sponsors two annual conferences: the PC Forum in the U.S., and the High-Tech Forum in Europe. She is an active investor and commentator whose focus is on emerging technologies and business models, emerging markets (especially in Eastern Europe), and emerging companies. She recently finished a two-year term as founding chairman of the Internet Corporation for Assigned Names and Numbers, the international agency charged with setting policy for the Internet's core infrastructure.


David Farber is Distinguished Career Professor of Computer Science and Public Policy at the School of Computer Science at Carnegie Mellon University. In 2003, he retired from the University of Pennsylvania where he held the Alfred Fitler Moore Chair of Telecommunications, with appointments in the Engineering School and the Wharton School. From 2000 to 2001, he served as chief technologist for the Federal Communications Commission. He has held positions at Bell Labs, the Rand Corporation, Xerox Data Systems, the University of California at Irvine, and the University of Delaware. In addition, he is a fellow of the Association for Computing Machinery and the Institute of Electrical and Electronics Engineers and serves on the Board of Trustees of the Electronic Frontier Foundation. He has been a member of both the U.S. Presidential Advisory Board on Information Technology and the Board of Trustees of the Internet Society.


John O. Marsh

John O. Marsh, Jr. is a distinguished Professor of Law at George Mason University, concentrating on cyberterrorism and national security law. He enlisted in the U.S. Army in 1944 and was commissioned a second lieutenant at age 19. He later served in the Army Reserve and the Virginia national Gurard, much of his service being in the 116th Infantry Regiment. He graduated from the Army Airborne and Jumpmaster Schools and earned Senior Parachutist Wings. He received his law degree in 1951 from Washington and Lee University and gegan his practice of law in Strasburg, VA. He was elected to four terms in Congress from the Seventh District of Virginia (1963-1971), and served on the House Appropriations Committee. Choosing not to seek a fifth term, he resumed the practice of law. In March 1973, he returned to federal service as Assitant Secretary of Defense for Legislative Affairs. In January 1974, he became Assistant for National Security Affairs to Vice President Ford, and in August 1974 became Counselor, with Cabinet rank, to President Ford. He chaired the Presidential Committee for the Reorganization of the U.S. Intelligence Community in 1975-76. From 1981-1989, he served as Secretary of the Army; his tenure was the longest of any Secretary in American history. Secretary Marsh has been awarded the Department of Defense Distinguished Public Service Award on six occasions, has been decorated by the governments of France and Brazil, and holds the Presidential Citizens Medal. He was selected as Virginian of the Year for 1990 by the Virginia Press Association and has received the George Catlett Marshall Medal for public service from the Association of the United States Army. He is a member of the advisory council of the Virginia Institute of Marine Science, chairs the advisory committee of Virginia Island Port, and is a member of the Special Congressional Panel on Terrorism to Assess Federal, State and Local Response to Weapons of Mass Destruction (the Gilmore Commission).


Morton H. Halperin is director of the Washington office of the Open Society Institute. He is also director of the Center for Democracy and Free Markets at the Council on Foreign Relations. Halperin served as director of Policy Planning Staff at the Department of State. He was special assistant to President Clinton and senior director for democracy at the National Security Council from 1994 to 1996. Other positions held by Halperin include senior vice president at the Century Foundation/Twentieth Century Fund, director of the American Civil Liberties Union's Washington D.C. office, and director of the Center for National Security Studies.


Mary K. McKinley is the associate director of the Markle Foundation Task Force on National Security in the Information Age. She was managing editor of AmericanPresident.org at the University of Virginia's Miller Center of Public Affairs, where she also served on the staff of the National Commission on Federal Election Reform, led by Presidents Jimmy Carter and Gerald Ford. Prior her work with the Miller Center, she staffed the Aspen Institute's U.S.-Russia Dialogue and the Aspen Strategy Group, managing programs of bi-partisan roundtables bringing together leaders in the fields of national security and foreign and defense policy. From 1990-1995, she lived in Budapest, Hungary, where she was a project manager at the Soros Foundations-Open Society Institute and also developed programs at other non-profit organizations based in Central and Eastern Europe.



James H. Morris is the Herbert A. Simon Professor of Human Computer Interaction and Dean of the School of Computer Science at Carnegie Mellon. As a professor at the University of California at Berkeley, he developed important underlying principles of programming languages. For 10 years he worked at the Xerox Palo Alto Research Center, where he was part of the team that developed the Alto System. From 1983 to 1988, Morris was director of the Information Technology Center at CMU-a joint project with IBM-where he oversaw the development of "Andrew," a prototype university computing system. Morris is also a founder of the MAYA Design Group, a consulting firm that specializes in interactive-product design.



PLEASE READ THE OTHER BIOS AT THIS LINK
http://web.archive.bibalex.org/web/20060321133628/http://www.markletaskforce.com/index.html


Offline birther truther tenther

  • Member
  • *****
  • Posts: 2,726
  • Against all forms of tyranny
Re: Markle Foundation 2003 "Trusted Information Network for DHS" White Paper
« Reply #2 on: November 06, 2010, 04:23:09 am »
LMAO,  I wouldn't trust these people to protect my civil liberties. CSIS, CFR, Microsoft, IBM, In-Q-Tel, NSA, RAND, GMU labs, a Soros Foundation front group,  ROFL, LOL, HAHAHAHA!  I think this About Us section was written on April 1st!!!



http://web.archive.bibalex.org/web/20041204090426/www.markletaskforce.com/about.html

MARKLE FOUNDATION

This is the second report of an extraordinary task force we have been privileged to co-chair. This remarkable and diverse group has come together to serve our nation by doing the hard work of considering how we can create an information network that prevents terrorism and protects the security of our homeland, while preserving the civil liberties that are a fundamental part of our national values.

In the Task Force’s first report, we stressed the importance of creating a decentralized network of information-sharing and analysis to address the challenge of homeland security. We emphasized the need to form that network around presidential guidelines shaped by public debate on how to both achieve security and maintain liberty. We also set forth principles for capitalizing on our society’s strengths in information and technology. In this second report, we reaffirm those principles and provide greater detail on how to implement our approach.

The network we envision would be created with the following key elements, which reflect the character of the distributed, asymmetric threat we confront:

   1. The handling of information should be decentralized, and should take place directly among users, according to a network model rather than a mainframe or hub-and-spoke model.
   2. The network should be guided by policy principles that simultaneously empower and constrain government officials by making it clear what is permissible and what is prohibited.
   3. Our government’s strategy should focus on prevention.
   4. The distinguishing line between domestic and foreign threats is increasingly difficult to sustain. Thus, in its approach, our government should avoid creating blind spots, or gaps between agencies, that arise from this distinction. At the same time, though, our government needs urgently to define new rules—rules to replace the old “line at the border” between domestic and foreign authorities for information-collection and use—to ensure that agencies do not infringe on our traditional civil liberties.
   5. The network should reflect the fact that many key participants are not in the federal government, but rather in state or local government and the private sector.
   6. The network should make it possible for the government to effectively utilize not only information gathered through clandestine intelligence activities and law enforcement investigations, but also appropriate information held by private companies. This should happen only after clear articulation by the government of the need for this information and the issuance of guidelines for its collection and use.
   7. Combating terrorism is a long-term effort that is designed to protect our way of life and our values along with our security. Therefore, the policies and actions undertaken need to have the support—and trust—of the American people. Privacy and other civil liberties must be protected.

What do these principles mean in practice?

First, our government should give greater priority to sharing and analyzing information. In the Cold War intelligence architecture, the government placed a premium on the security of information. It developed a system that tightly controlled access to information by requiring that every individual have a demonstrable “need to know” certain information before he could see it and by allowing the agency that initially acquired the intelligence to restrict further dissemination of that intelligence. This system assumed that it was possible to determine a priori who needed to know particular information. And it reflected the judgment that the risk of inadvertent or malicious disclosure was greater than the benefit of wider information-sharing.

This architecture and the underlying assumptions are ill suited to today’s challenges. The events of September 11, 2001, have starkly demonstrated the dangers associated with the failure to share information, not only within the federal government, but also between the federal government, on the one hand, and state and local governments and the private sector on the other. Therefore, the government should open up the system to state and local agencies and officials and, in some circumstances, to private sector actors, providing access not just to information but to technology and money as well. Our government should reengineer operational processes where needed and build the technology architecture and tools that will facilitate two-way sharing and interoperability. Our government should also take into account the needs of the users, as well as the agency that originally developed the information, in deciding whether or how to control where the information goes. This should take place in an environment in which the need to protect both the security of sensitive information and individual civil liberties is consistently addressed.

Furthermore, our government should effectively utilize the valuable information that is held in private hands, but only within a system of rules and guidelines designed to protect civil liberties. Our nation can never hope to harden all potential targets against terrorist attack. Therefore, we must rely on information to try to detect, prevent, and respond to attacks. The travel, hotel, financial, immigration, health, or educational records of a person suspected by our government of planning terrorism may hold information that is vital to unveiling both his activities and the identities and activities of other terrorists.

But until the government devises consistent guidelines for controlling when and how such information is accessed and used—and until those guidelines are publicly debated—the public’s concerns over potential privacy infringements will continue to hamper the necessary development of new technologies and new operational programs to use that information.

The need to create the network we envision is more urgent than ever. Terrorism remains a continuing threat around the world. And the potential for terrorists to use weapons of mass destruction raises the stakes considerably. Building the technical architecture, changing agency cultures, establishing new rules and procedures, and securing the necessary funding all take time. It is therefore imperative that the steps we recommend receive immediate attention. We urge the Executive Branch and Congress to implement the measures necessary to create the proposed Systemwide Homeland Analysis and Response Exchange Network (SHARE)—which would empower all participants to be full and active partners in protecting our security, and which would be governed by guidelines designed to protect our liberties.

Zoë Baird        James Barksdale

Location:

Task Force on National Security in the Information Age
Markle Foundation
10 Rockefeller Plaza
16th Floor
New York, NY 10020-1903
Phone: 212-xxxxxxxxxx
Fax: 212-7xxxxxx

About the Markle Foundation:

The Task Force on National Security in the Information Age is supported by the Markle Foundation, a New York-based private philanthropy that works to realize the potential of emerging communications and technology to improve people's lives. The Foundation has two active program areas: Information Technologies for Better Health, and Policy for a Networked Society, under which The Task Force on National Security in the Information Age falls. The Markle Foundation's overarching goal in this area is to enhance national security through innovative use of information and communications technologies developed in a manner protective of personal security and liberty. For more information, see www.markle.org.

In Alliance With:

Center for Strategic & International Studies
The Brookings Institution

Contact Us:

For More Task Force Related Information please contact:

Danielle Petras
Phone: 212/xxxxxxx
[email protected]

Technical concerns about this site: [email protected]

Concerns or opinions about issues: [email protected]

Offline birther truther tenther

  • Member
  • *****
  • Posts: 2,726
  • Against all forms of tyranny
Re: Markle Foundation 2003 "Trusted Information Network for DHS" White Paper
« Reply #3 on: November 06, 2010, 04:27:28 am »
http://web.archive.bibalex.org/web/20040802235523/markletaskforce.com/jhamre.html

John J. Hamre is the president and CEO of the Center for Strategic and International Studies (CSIS).
Before joining CSIS, he served in the Department of Defense as U.S. deputy secretary from 1997 to 1999, and as under secretary, serving as the agency's comptroller from 1993 to 1997. Prior to that, he worked for ten years as a professional staff member of the Senate Armed Services Committee. From 1978 to 1984, he served in the Congressional Budget Office, where he became deputy assistant director for national security and international affairs.