Joshua Powell spent 23 years in the Marines doing Command and Control operations and the last 5 working as a contractor. Spent 3 years with the Navy working Electronic Warfare / Information Operations and the last two working with George Mason University, Rapid Prototyping Research Center as a Senior Research Faculty. Focused on airborne networking technologies. From the time our kids are born they are leaving behind a virtual shadow. This shadow can quickly become a tool for not only nation state actors but local individuals to manipulate individuals through their life. Eagle Eye movie example - an AI computer “activates” an individual to do what they deem required to save the country. Well what if it was your kid or spouse activated by someone you didn’t know? Who is studying this problem? Congress Defense Primer: Information Operations Think Tanks “Information Operations,” RAND Corporation The Evolution of Special Operations as a Model for Information Forces RUSSIAN HYBRID WARFARE DoD JP 3-13, Information Operations Bottom line - when you have the ability to individualize the targets on-line behavior, habits, and schedule. You have an extraordinarily powerful tool that should be looked at as a weapons grade. We do not allow our enemies to have our tanks, jets, weapons, but we give them nearly unlimited access to our personal data. Personal information is powerful - behavior and habits are the vector for threats to access your life. Look at the attack on Congressmen Hawley’s home in DC. This is terror and it can be done to our families and to our children in very personal and intimate ways.
Joshua Powell spent 23 years in the Marines doing Command and Control operations and the last 5 working as a contractor. Spent 3 years with the Navy working Electronic Warfare / Information Operations and the last two working with George Mason University, Rapid Prototyping Research Center as a Senior Research Faculty. Focused on airborne networking technologies.
From the time our kids are born they are leaving behind a virtual shadow. This shadow can quickly become a tool for not only nation state actors but local individuals to manipulate individuals through their life.
Eagle Eye movie example - an AI computer “activates” an individual to do what they deem required to save the country. Well what if it was your kid or spouse activated by someone you didn’t know?
Who is studying this problem?
Congress Defense Primer: Information Operations Think Tanks
“Information Operations,” RAND Corporation
The Evolution of Special Operations as a Model for Information Forces
RUSSIAN HYBRID WARFARE
DoD
JP 3-13, Information Operations
Bottom line - when you have the ability to individualize the targets on-line behavior, habits, and schedule. You have an extraordinarily powerful tool that should be looked at as a weapons grade. We do not allow our enemies to have our tanks, jets, weapons, but we give them nearly unlimited access to our personal data.
Personal information is powerful - behavior and habits are the vector for threats to access your life.
Look at the attack on Congressmen Hawley’s home in DC. This is terror and it can be done to our families and to our children in very personal and intimate ways.
We’re thrilled to be sponsored by IXL.
IXL’s comprehensive teaching and learning platform for math, language arts, science, and social studies is accelerating achievement in 95 of the top 100 U.S. school districts. Loved by teachers and backed by independent research from Johns Hopkins University, IXL can help you do the following and more:
- Simplify and streamline technology
- Save teachers’ time
- Reliably meet Tier 1 standards
- Improve student performance on state assessments
🚀
Ready to see why leading districts trust IXL for their educational needs? Visit IXL.com/BE today to learn more about how IXL can elevate your school or district.