Byting Back--Regaining Information Superiority Against 21st-Century Insurgents: RAND Counterinsurgency Study
Libicki et al. argue that information collection requirements and systems for counterinsurgency are important because the community that conducts counterinsurgency crosses national and institutional boundaries and because the indigenous population plays a large role in determining the outcome of an insurgency. They then demonstrate what this focus
"1139799588"
Byting Back--Regaining Information Superiority Against 21st-Century Insurgents: RAND Counterinsurgency Study
Libicki et al. argue that information collection requirements and systems for counterinsurgency are important because the community that conducts counterinsurgency crosses national and institutional boundaries and because the indigenous population plays a large role in determining the outcome of an insurgency. They then demonstrate what this focus
23.0 In Stock
Byting Back--Regaining Information Superiority Against 21st-Century Insurgents: RAND Counterinsurgency Study

Byting Back--Regaining Information Superiority Against 21st-Century Insurgents: RAND Counterinsurgency Study

Byting Back--Regaining Information Superiority Against 21st-Century Insurgents: RAND Counterinsurgency Study

Byting Back--Regaining Information Superiority Against 21st-Century Insurgents: RAND Counterinsurgency Study

Paperback

$23.00 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Related collections and offers


Overview

Libicki et al. argue that information collection requirements and systems for counterinsurgency are important because the community that conducts counterinsurgency crosses national and institutional boundaries and because the indigenous population plays a large role in determining the outcome of an insurgency. They then demonstrate what this focus

Product Details

ISBN-13: 9780833041890
Publisher: RAND Corporation
Publication date: 10/17/2007
Series: Rand Counterinsurgency Study Series , #1
Pages: 156
Product dimensions: 5.90(w) x 8.90(h) x 0.60(d)

Table of Contents

Preface     iii
Figures     ix
Tables     xi
Summary     xiii
Acknowledgments     xxxi
Abbreviations     xxxiii
Introduction     1
Why Information Superiority Matters in Counterinsurgency     2
Getting to Information Superiority in Counterinsurgency     7
Overview     9
The Influence of User Requirements     11
When the Population Is the Terrain     12
Security Operations     13
Situational Awareness     14
Winning Allegiance     15
Military Operations During Counterinsurgency     16
The Registry-Census     21
Categorizing the Information     23
Personal and Social Information     23
Systematic Incidents and Reportage Data     25
Buildings Data: The National CAD Model     27
Getting the Information     29
Information Reliability and Timeliness     31
Toward a National Identification System?     32
Registration     33
Acquiring Identities at Checkpoints     36
Acquiring Identities Without Checkpoints     37
Conclusions     40
A Well-Wired Country     43
Systems Concept     44
Encourage Cell Phone Use     45
Shape the Cell Phone Environment     46
Associate Cell Phones with Registered Users     48
Geolocate Cell Phones Periodically and as Needed     50
Using the System's Capabilities     51
Government Services     51
Eyes on the Street     52
Actionable Intelligence     52
Other Uses     54
The Cell Phone Network as the Primary Counterinsurgency Communications System     55
Issues     57
Secret Surveillance?     58
Insurgent Responses     59
Lost or Stolen SIMs     62
Spoofing GPS Signals     65
Commercial Considerations     65
Follow-On Phases     68
Avoiding a Permanent Police State     70
A Note of Caution     76
Conclusions and Implementation     77
Embedded Video     79
Basic Concept and Technical Issues     81
Evasion Techniques     83
Uses     84
Guidelines     85
Video Made Public     86
Conclusions     87
A National Wiki     89
Our Town     91
An Oral Wiki     95
Attribution     98
Language Translation     99
Accuracy and Deception     100
A National Wiki as a Feedback Mechanism for Government Services     102
Conclusions     104
The Principles of ICON     105
Emphasize User Primacy, Inclusiveness, and Integration     107
Build ICON to Go Native     113
Audit, Audit, Audit     117
Abnormal Usage     118
Taggants     118
Honeypots     119
Surveillance     119
Tune ICON to the Level of Insurgency     120
Post Before Process     124
Establish a Standard Deck and Populate It from the National Wiki     126
Rank Information by Reliability and Relevance     127
Results and a Caveat     129
Implications and Implementation     131
Summary     133
Census and National ID Cards     134
Cell Phones     134
Embedded Video     135
National Wiki     135
ICON     135
Governance, Accountability, and Public Expression      136
Adapting Information Capabilities to the Scope and Locus of the Insurgency     139
Implementation     141
Research and Development Needs     143
Conclusion     143
Disaggregated Information Requirements     145
Bibliography     157
From the B&N Reads Blog

Customer Reviews