10 August 2010

Unsatisfactory Blue Dart

I worried my Blue Dart was too "out there" for Joint Strategic Leadership when it took more than a day to get a response. Here's what my instructor had to say about it.

William, Unfortunately, your Blue Dart on "Lifegraphs" has been graded unsatisfactory. I read it through twice and couldn't make heads or tails of it. I had never even heard of this topic until your Blue Dart. I took it to our IT folks and this was unfamiliar to them too. Keep in mind that Gen Lorenz wanted Blue Darts that could possibly be published in your hometown newspaper. Keep your audience in mind. Don't pick a subject that is so esoteric that people are unfamiliar with it. You write well. If you pick a topic that is more understandable, you should be able to sail right through this. Best of luck.

I will write my next Blue Dart this week on a strategy for cross domain solutions to help win the GWOT.

02 August 2010

My Blue Dart for AWC - LifeGraphs for National Security and Defense

A Blue Dart is like an op/ed piece in length, purpose and style. I had to write one for the AWC 17th edition Joint Strategic Leadership course. I will submit my Blue Dart after my mentor gives me the OK. If my JSL instructor accepts it, I will proceed with submitting a Professional Development Plan. Otherwise, I will have to rewrite my Blue Dart and resubmit it within 30 days.

Please tell me what you think about the 800 words I wrote on LifeGraphs for national security and defense. Condensing LifeGraphs, the concept, into 700 - 800 words is challenging if you know me and all I can say about it.

My 40 years of living have been circumscribed by computing machinery, software suites and databases galore yet no single legal entity can generate a LifeGraph for me or of me. I have digital tracks, electronic signatures and paper marks in every branch of the US government but it probably cannot graph those artifacts into contiguous behavior and identity patterns with the stealth, speed and agility of F-22A Raptors. Sadly, it is mostly true for our enemies—remember 9/11. Is this changing faster and for the better? Our government wrestles with the transformation of managing human identity in cyberspace to govern. No other nation-state has set a transformational example to emulate so we may be the bellwether. Three-hundred million US citizens’ digital identities are the cooperative but constitutionally protected targets to protect and defend from thousands of criminals and enemies of the state. I believe coordinating LifeGraph legislation, information regulation, financial transformation, and biometric integration will catalyze our National Security and Defense improvement.

LifeGraphs catalyze the conversion of data into actionable intelligence because at least one person involved with traded items will cooperate with US protectors and defenders. Their LifeGraph will be the nexus to synthesize the products in contextual scenes of behaviors to support decisions of national security (e.g., adjudicate a security investigation or arrest a terrorist suspect). LifeGraphing remains a labor intensive challenge for our intelligence and law enforcement communities.

A LifeGraph is a legal record of ownership and stewardship for a natural or legal person’s life and/or property. LifeGraph legislation I call the eReceipt law would obligate traders to exchange non-proprietary (royalty-free), digital encodings of tangible goods and observable services’ structure and behavior at or near the point and time of trade. There are few digitally native products of high assemblage with tangible realizations today but most of the millions of globally traded items are not. Repurposing computer-aided (fill in the blank) is occurring to realize new markets for that data in the consumer chain. Owners will choose to encode the usage of the traded item at their discretion using their secure LifeGraph software. The LifeGrapher incentive to encode product usage and human behavior stems from the intrinsic value it accumulates over time. The risk of LifeGraph theft will dissuade many to graph the data no matter the degree or selectivity over a potential 100-year lifetime.

Assume an eReceipt law, the governmental agencies and departments with regulatory powers have to rewrite rules for information exchange between every combination of legal and natural persons. These rules will apply to traded items and human activities subject to taxation. The interfaces between governments, businesses and citizens for property exchange will effectuate LifeGraphs by channeling the virtual products through “semantic engines” with unique identifiers while its tangible instance changes hands as usual. The effect of governmental LifeGraphing on national security and defense is the potential for better administration of its resources and better services to its citizens, who can securely expose their LifeGraphs to attain governmental services more efficiently than today. Citizens pay taxes for services like protection and defense. Regulators should distribute the storage of the virtual Government in proportion with its natural distributions of humans, goods and nature to localize the effects disasters including the costs to militate against them.

A cashless USA is not essential to useful LifeGraphs or argued to enhance national security or defenses but transforming the financial system in this direction could increase the rate of owners encoding their product usage and for natural persons, their behaviors. The more they encode the more valuable their LifeGraph becomes to others—privacy seduces! LifeGraph software will be able to export authentic LifeGraphlets to sale or just give away. A digital cash infrastructure that isolates the government from the exchange between businesses and citizens like paper & coin money is needed—privacy promotes! The premise is you and the enemy will be lured to the infrastructure replacing monetary currency thinking non-attribution is widely available once again. The government has the deepest pockets so the possibility of acquiring LifeGraph content it was never privy to never goes away if they are willing to pay or persuade the LifeGraphers who they allege have it.

Those allegations will be based on the biometric integration of finance and traded items encodings. The capability to sequence the human genome gives security professionals new opportunities to increase the confidence of human identification and authentication in stressing environments when access control to weapons release authority are the kind of decisions being made in the context of national security and defense. Gone are the days of digital key chains for governmental resources protected or defended at home and abroad. Asset protection systems will bind with the human genomes granted access. The national security and defense needs LifeGraph-based information technology and systems to realize higher levels of surety.