Speech at the Valdai International DiscussionClub, October 27, 2016
People sense an ever-growing gap between their interests and the elite’s vision of the only correct course, a course the elite itself chooses. The result is that referendums and elections increasingly often create surprises for the authorities. People do not at all vote as the official and respectable media outlets advised them to, nor as the mainstream parties advised them to. Public movements that only recently were too far left or too far right are taking centre stage and pushing the political heavyweights aside.
Each of the below references in cited in the new monograph series, Reinventing the US Army, for the US Army's Strategic Studies Institute (SSI); links go to the official US Army site. This list will grow over the next 30 days. Links to Human Domain graphics are included.
Palantir Technologies like many Silicon Valley-type firms, takes its inspiration from logical reasoning (our software is great, therefore, the US Army should use it, not DCGS which is not great), Google methods (do not ask permission, apologize later), venture capital infused advisors (we are the masters of the universe), or Larry the Cable guy (git ‘er done).
Documents prepared by US Congress researchers in 2005 revealed that the US government was actively weighing regime change in Syria long before the Arab Spring uprisings of 2011, challenging the view that US support for the Syrian rebels was based on allegiance to a “democratic uprising” and showing that it was simply an extension of a long-standing policy of seeking to topple the government in Damascus.
The United States shipped hundreds of millions of dollars in weapons to Saudi Arabia just weeks prior to the Saudi-led coalition’s funeral bombing in Sanaa, Yemen which killed 140 and wounded over 500.
What is the solution? It is time for the United States to push for the creation of a standing U.N. Peacekeeping Force. This proposal offers three major advantages. First, it would reduce the need for national contingents from willing nations in high risk scenarios. Second, it would facilitate the professionalization of a force that specializes in complex contingencies and is trained, organized, and equipped for sustained peacekeeping missions. Reliance upon volunteers who are committed to the mission, prepared to comply with international law, and are dedicated to the expectation for protecting civilians and enforcing U.N. mandates would be a clear improvement. Third, the deployment of a dedicated force of professionals would eliminate the political repercussions now faced by national leaders when their units are attacked and sustain fatalities. Multinational units comprised of highly trained volunteers would minimize the risks faced by political leaders who would not be held accountable at the ballot box for casualties.
I read “Success Factors for Enterprise Search.” The write up spells out a checklist to make certain that an enterprise search system delivers what the users want—on point answers to their business information needs. The reason a checklist is necessary after more than 50 years of enterprise search adventures is a disconnect between what software can deliver and what the licensee and the users expect. Imagine figuring out how to get across the Grand Canyon only to encounter the Iguazu Falls. . . . The reality is that even the most sophisticated search and content processing systems end up in trouble. Search remains a very difficult problem. Today’s solutions do a few things better than STAIRS III did. But in the end, search software crashes and burns when it has to:
Enemy use of unmanned aerial systems (UAS) is a growing threat to U.S. forces because of their low cost, versatility, and ease of use, according to a recent U.S. Army doctrinal publication. “The UAS is the most challenging and prevalent threat platform to combined arms forces and therefore, a logical choice for enemy use.” See Techniques for Combined Arms for Air Defense, Army Techniques Publication (ATP) 3-01.8, July 29, 2016.
As is the case with U.S.-operated drones, enemy UAS can be used to perform a range of functions from battlefield surveillance and targeting to precision strike, the Army document said. “The enemy will use UAS to fulfill multiple attack roles.” The drone may deliver a weapon or be used as a weapon itself. “As an indirect attack platform, the UAS has the ability to carry the improvised explosive device or become the improvised explosive device.” “Perhaps the most dangerous COA [course of action]… is the Swarm” in which “clusters of UAS” are used by an adversary simultaneously for surveillance, indirect attack and direct attack. What to do about this? The answer is not fully articulated in the Army manual.