Byting BackA-Regaining Information Superiority Against 21st-Century Insurgents

RAND Counterinsurgency StudyA-Volume 1

Nonfiction, Social & Cultural Studies, Political Science, International, International Security, Computers, Networking & Communications, Computer Security, Operating Systems
Cover of the book Byting BackA-Regaining Information Superiority Against 21st-Century Insurgents by Martin C. Libicki, David C. Gompert, David R. Frelinger, Raymond Smith, David C. Gompert, David R. Frelinger, Raymond Smith, RAND Corporation
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Martin C. Libicki, David C. Gompert, David R. Frelinger, Raymond Smith, David C. Gompert, David R. Frelinger, Raymond Smith ISBN: 9780833042880
Publisher: RAND Corporation Publication: September 28, 2007
Imprint: RAND Corporation Language: English
Author: Martin C. Libicki, David C. Gompert, David R. Frelinger, Raymond Smith, David C. Gompert, David R. Frelinger, Raymond Smith
ISBN: 9780833042880
Publisher: RAND Corporation
Publication: September 28, 2007
Imprint: RAND Corporation
Language: English

U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government and an armed opposition movement, the key to exploiting information power is to connect with and learn from the population itself, increasing the effectiveness of both the local government and the U.S. military and civilian services engaged in supporting it. Utilizing mostly available networking technology, the United States could achieve early, affordable, and substantial gains in the effectiveness of counterinsurgency by more open, integrated, and inclusive information networking with the population, local authorities, and coalition partners. The most basic information link with the population would be an information technology (IT)-enhanced, fraud-resistant registry-census. The most promising link would come from utilizing local cell phone networks, which are proliferating even among poor countries. Access to data routinely collected by such networks can form the basis for security services such as enhanced-911 and forensics. The cell phones of a well-wired citizenry can be made tantamount to sensor fields in settled areas. They can link indigenous forces with each other and with U.S. forces without interoperability problems; they can also track the responses of such forces to emergencies. Going further, outfitting weaponry with video cameras would bolster surveillance, provide lessons learned, and guard against operator misconduct. Establishing a national Wiki can help citizens describe their neighborhoods to familiarize U.S. forces with them and can promote accountable service delivery. All such information can improve counterinsurgency operations by making U.S. forces and agencies far better informed than they are at present. The authors argue that todayÂ's military and intelligence networks-being closed, compartmentalized, controlled by information providers instead of users, and limited to U.S. war fighters-hamper counterinsurgency and deprive the United States of what ought to be a strategic advantage. In contrast, based on a review of 160 requirements for counterinsurgency, the authors call for current networks to be replaced by an integrated counterinsurgency operating network (ICON) linking U.S. and indigenous operators, based on principles of inclusiveness, integration, and user preeminence. Utilizing the proposed ways of gathering information from the population, ICON would improve the timeliness, reliability, and relevance of information, while focusing security restrictions on truly sensitive information. The complexity and sensitivity of counterinsurgency call for vastly better use of IT than has been seen in Iraq and Afghanistan. Here is a practical plan for just that.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government and an armed opposition movement, the key to exploiting information power is to connect with and learn from the population itself, increasing the effectiveness of both the local government and the U.S. military and civilian services engaged in supporting it. Utilizing mostly available networking technology, the United States could achieve early, affordable, and substantial gains in the effectiveness of counterinsurgency by more open, integrated, and inclusive information networking with the population, local authorities, and coalition partners. The most basic information link with the population would be an information technology (IT)-enhanced, fraud-resistant registry-census. The most promising link would come from utilizing local cell phone networks, which are proliferating even among poor countries. Access to data routinely collected by such networks can form the basis for security services such as enhanced-911 and forensics. The cell phones of a well-wired citizenry can be made tantamount to sensor fields in settled areas. They can link indigenous forces with each other and with U.S. forces without interoperability problems; they can also track the responses of such forces to emergencies. Going further, outfitting weaponry with video cameras would bolster surveillance, provide lessons learned, and guard against operator misconduct. Establishing a national Wiki can help citizens describe their neighborhoods to familiarize U.S. forces with them and can promote accountable service delivery. All such information can improve counterinsurgency operations by making U.S. forces and agencies far better informed than they are at present. The authors argue that todayÂ's military and intelligence networks-being closed, compartmentalized, controlled by information providers instead of users, and limited to U.S. war fighters-hamper counterinsurgency and deprive the United States of what ought to be a strategic advantage. In contrast, based on a review of 160 requirements for counterinsurgency, the authors call for current networks to be replaced by an integrated counterinsurgency operating network (ICON) linking U.S. and indigenous operators, based on principles of inclusiveness, integration, and user preeminence. Utilizing the proposed ways of gathering information from the population, ICON would improve the timeliness, reliability, and relevance of information, while focusing security restrictions on truly sensitive information. The complexity and sensitivity of counterinsurgency call for vastly better use of IT than has been seen in Iraq and Afghanistan. Here is a practical plan for just that.

More books from RAND Corporation

Cover of the book The Affordable Care Act and Health Insurance Markets by Martin C. Libicki, David C. Gompert, David R. Frelinger, Raymond Smith, David C. Gompert, David R. Frelinger, Raymond Smith
Cover of the book The Uses and Limits of Small-Scale Military Interventions by Martin C. Libicki, David C. Gompert, David R. Frelinger, Raymond Smith, David C. Gompert, David R. Frelinger, Raymond Smith
Cover of the book Toward a Culture of Consequences by Martin C. Libicki, David C. Gompert, David R. Frelinger, Raymond Smith, David C. Gompert, David R. Frelinger, Raymond Smith
Cover of the book From Insurgency to Stability by Martin C. Libicki, David C. Gompert, David R. Frelinger, Raymond Smith, David C. Gompert, David R. Frelinger, Raymond Smith
Cover of the book Cataract Blindness and Simulation-Based Training for Cataract Surgeons by Martin C. Libicki, David C. Gompert, David R. Frelinger, Raymond Smith, David C. Gompert, David R. Frelinger, Raymond Smith
Cover of the book Overseas Basing of U.S. Military Forces by Martin C. Libicki, David C. Gompert, David R. Frelinger, Raymond Smith, David C. Gompert, David R. Frelinger, Raymond Smith
Cover of the book Friends, Foes, and Future Directions by Martin C. Libicki, David C. Gompert, David R. Frelinger, Raymond Smith, David C. Gompert, David R. Frelinger, Raymond Smith
Cover of the book The Long Shadow of 9/11 by Martin C. Libicki, David C. Gompert, David R. Frelinger, Raymond Smith, David C. Gompert, David R. Frelinger, Raymond Smith
Cover of the book Democratization in the Arab World by Martin C. Libicki, David C. Gompert, David R. Frelinger, Raymond Smith, David C. Gompert, David R. Frelinger, Raymond Smith
Cover of the book Patient Privacy, Consent, and Identity Management in Health Information Exchange by Martin C. Libicki, David C. Gompert, David R. Frelinger, Raymond Smith, David C. Gompert, David R. Frelinger, Raymond Smith
Cover of the book Maritime Terrorism by Martin C. Libicki, David C. Gompert, David R. Frelinger, Raymond Smith, David C. Gompert, David R. Frelinger, Raymond Smith
Cover of the book Sea Power and American Interests in the Western Pacific by Martin C. Libicki, David C. Gompert, David R. Frelinger, Raymond Smith, David C. Gompert, David R. Frelinger, Raymond Smith
Cover of the book Toward a Comparison of DNA Profiling and Databases in the United States and England by Martin C. Libicki, David C. Gompert, David R. Frelinger, Raymond Smith, David C. Gompert, David R. Frelinger, Raymond Smith
Cover of the book Whither Al-Anbar Province? by Martin C. Libicki, David C. Gompert, David R. Frelinger, Raymond Smith, David C. Gompert, David R. Frelinger, Raymond Smith
Cover of the book The U.S. Army in Southeast Asia by Martin C. Libicki, David C. Gompert, David R. Frelinger, Raymond Smith, David C. Gompert, David R. Frelinger, Raymond Smith
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy