The Resource Byting back : regaining information superiority against 21st-century insurgents, Martin C. Libicki [and others] ; prepared for the Office of the Secretary of Defense
Byting back : regaining information superiority against 21st-century insurgents, Martin C. Libicki [and others] ; prepared for the Office of the Secretary of Defense
Resource Information
The item Byting back : regaining information superiority against 21st-century insurgents, Martin C. Libicki [and others] ; prepared for the Office of the Secretary of Defense represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Waubonsee Community College.This item is available to borrow from 1 library branch.
Resource Information
The item Byting back : regaining information superiority against 21st-century insurgents, Martin C. Libicki [and others] ; prepared for the Office of the Secretary of Defense represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Waubonsee Community College.
This item is available to borrow from 1 library branch.
- Summary
- U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government and an armed opposition movement, the key to exploiting information power is to connect with and learn from the population itself, increasing the effectiveness of both the local government and the U.S. military and civilian services engaged in supporting it. Utilizing mostly available networking technology, the United States could achieve early, affordable, and substantial gains in the effectiveness of counterinsurgency by more open, integrated, and inclusive information networking with the population, local authorities, and coalition partners. The most basic information link with the population would be an information technology (IT)-enhanced, fraud-resistant registry-census. The most promising link would come from utilizing local cell phone networks, which are proliferating even among poor countries. Access to data routinely collected by such networks can form the basis for security services such as enhanced-911 and forensics. The cell phones of a well-wired citizenry can be tantamount to sensor fields in settled areas. They can link indigenous forces with each other and with U.S. forces without interoperability problems; they can also track the responses of such forces to emergencies. Going further, outfitting weaponry with video cameras would bolster surveillance, provide lessons learned, and guard against operator misconduct. Establishing a national Wiki can help citizens describe their neighborhoods to familiarize U.S. forces with them and can promote accountable service delivery. All such information can improve counterinsurgency operations by making U.S. forces and agencies far better informed than they are at present. The authors argue that today's military and intelligence networks -- being closed, compartmentalized, controlled by information providers instead of users, and limited to U.S. war fighters -- hamper counterinsurgency and deprive the United States of what ought to be a strategic advantage. In contrast, based on a review of 160 requirements for counterinsurgency, the authors call for current networks to be replaced by an integrated counterinsurgency operating network (ICON) linking U.S. and indigenous operators, based on principles of inclusiveness, integration, and user preeminence. Utilizing the proposed ways of gathering information from the population, ICON would improve the timeliness, reliability, and relevance of information, while focusing security restrictions on truly sensitive information. The complexity and sensitivity of counterinsurgency call for vastly better use of IT than has been seen in Iraq and Afghanistan. Here is a practical plan for just that
- Language
- eng
- Extent
- 1 online resource (xxxiv, 159 pages).
- Note
- "RAND National Defense Research Institute."
- Contents
-
- The influence of user requirements
- The registry-census
- A well-wired country
- Embedded video
- A national wiki
- The principles of ICON
- Implications and implementation
- Isbn
- 9780833042880
- Label
- Byting back : regaining information superiority against 21st-century insurgents
- Title
- Byting back
- Title remainder
- regaining information superiority against 21st-century insurgents
- Statement of responsibility
- Martin C. Libicki [and others] ; prepared for the Office of the Secretary of Defense
- Subject
-
- 2003-2011
- Afghan War (2001- )
- Afghan War, 2001-
- Electronic books
- Electronic books
- Insurgency
- Insurgency
- Iraq
- Iraq War (2003-2011)
- Iraq War, 2003-2011
- Military art and science
- Military art and science -- United States
- POLITICAL SCIENCE -- Political Process | Political Advocacy
- POLITICAL SCIENCE -- Security (National & International)
- United States
- Language
- eng
- Summary
- U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government and an armed opposition movement, the key to exploiting information power is to connect with and learn from the population itself, increasing the effectiveness of both the local government and the U.S. military and civilian services engaged in supporting it. Utilizing mostly available networking technology, the United States could achieve early, affordable, and substantial gains in the effectiveness of counterinsurgency by more open, integrated, and inclusive information networking with the population, local authorities, and coalition partners. The most basic information link with the population would be an information technology (IT)-enhanced, fraud-resistant registry-census. The most promising link would come from utilizing local cell phone networks, which are proliferating even among poor countries. Access to data routinely collected by such networks can form the basis for security services such as enhanced-911 and forensics. The cell phones of a well-wired citizenry can be tantamount to sensor fields in settled areas. They can link indigenous forces with each other and with U.S. forces without interoperability problems; they can also track the responses of such forces to emergencies. Going further, outfitting weaponry with video cameras would bolster surveillance, provide lessons learned, and guard against operator misconduct. Establishing a national Wiki can help citizens describe their neighborhoods to familiarize U.S. forces with them and can promote accountable service delivery. All such information can improve counterinsurgency operations by making U.S. forces and agencies far better informed than they are at present. The authors argue that today's military and intelligence networks -- being closed, compartmentalized, controlled by information providers instead of users, and limited to U.S. war fighters -- hamper counterinsurgency and deprive the United States of what ought to be a strategic advantage. In contrast, based on a review of 160 requirements for counterinsurgency, the authors call for current networks to be replaced by an integrated counterinsurgency operating network (ICON) linking U.S. and indigenous operators, based on principles of inclusiveness, integration, and user preeminence. Utilizing the proposed ways of gathering information from the population, ICON would improve the timeliness, reliability, and relevance of information, while focusing security restrictions on truly sensitive information. The complexity and sensitivity of counterinsurgency call for vastly better use of IT than has been seen in Iraq and Afghanistan. Here is a practical plan for just that
- Cataloging source
- N$T
- Dewey number
- 322.42
- Index
- no index present
- LC call number
- JC328.5
- LC item number
- .B97 2007eb
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
-
- Libicki, Martin C
- National Defense Research Institute (U.S.)
- Series statement
- Rand counterinsurgency study
- Series volume
- v. 1
- http://library.link/vocab/subjectName
-
- Afghan War (2001- )
- Iraq War (2003-2011)
- Insurgency
- Military art and science
- Afghan War, 2001-
- Iraq War, 2003-2011
- Afghan War, 2001-
- Insurgency
- Iraq War, 2003-2011
- Military art and science
- POLITICAL SCIENCE
- POLITICAL SCIENCE
- Insurgency
- Military art and science
- Iraq
- United States
- Label
- Byting back : regaining information superiority against 21st-century insurgents, Martin C. Libicki [and others] ; prepared for the Office of the Secretary of Defense
- Link
- Note
- "RAND National Defense Research Institute."
- Antecedent source
- unknown
- Bibliography note
- Includes bibliographical references (pages 157-159)
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- The influence of user requirements -- The registry-census -- A well-wired country -- Embedded video -- A national wiki -- The principles of ICON -- Implications and implementation
- Control code
- ocn183674713
- Dimensions
- unknown
- Extent
- 1 online resource (xxxiv, 159 pages).
- File format
- unknown
- Form of item
- online
- Isbn
- 9780833042880
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Quality assurance targets
- not applicable
- Reformatting quality
- unknown
- Sound
- unknown sound
- Specific material designation
- remote
- Stock number
-
- 22573/cttp18h
- C879D35E-FA6F-4538-8850-A7608D792F81
- System control number
-
- (Sirsi) o183674713
- (OCoLC)183674713
- Label
- Byting back : regaining information superiority against 21st-century insurgents, Martin C. Libicki [and others] ; prepared for the Office of the Secretary of Defense
- Link
- Note
- "RAND National Defense Research Institute."
- Antecedent source
- unknown
- Bibliography note
- Includes bibliographical references (pages 157-159)
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- The influence of user requirements -- The registry-census -- A well-wired country -- Embedded video -- A national wiki -- The principles of ICON -- Implications and implementation
- Control code
- ocn183674713
- Dimensions
- unknown
- Extent
- 1 online resource (xxxiv, 159 pages).
- File format
- unknown
- Form of item
- online
- Isbn
- 9780833042880
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Quality assurance targets
- not applicable
- Reformatting quality
- unknown
- Sound
- unknown sound
- Specific material designation
- remote
- Stock number
-
- 22573/cttp18h
- C879D35E-FA6F-4538-8850-A7608D792F81
- System control number
-
- (Sirsi) o183674713
- (OCoLC)183674713
Subject
- 2003-2011
- Afghan War (2001- )
- Afghan War, 2001-
- Electronic books
- Electronic books
- Insurgency
- Insurgency
- Iraq
- Iraq War (2003-2011)
- Iraq War, 2003-2011
- Military art and science
- Military art and science -- United States
- POLITICAL SCIENCE -- Political Process | Political Advocacy
- POLITICAL SCIENCE -- Security (National & International)
- United States
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.waubonsee.edu/portal/Byting-back--regaining-information-superiority/qeWp4Ex_fPg/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.waubonsee.edu/portal/Byting-back--regaining-information-superiority/qeWp4Ex_fPg/">Byting back : regaining information superiority against 21st-century insurgents, Martin C. Libicki [and others] ; prepared for the Office of the Secretary of Defense</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.waubonsee.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.waubonsee.edu/">Waubonsee Community College</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Byting back : regaining information superiority against 21st-century insurgents, Martin C. Libicki [and others] ; prepared for the Office of the Secretary of Defense
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.waubonsee.edu/portal/Byting-back--regaining-information-superiority/qeWp4Ex_fPg/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.waubonsee.edu/portal/Byting-back--regaining-information-superiority/qeWp4Ex_fPg/">Byting back : regaining information superiority against 21st-century insurgents, Martin C. Libicki [and others] ; prepared for the Office of the Secretary of Defense</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.waubonsee.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.waubonsee.edu/">Waubonsee Community College</a></span></span></span></span></div>