David Isenberg: James Howcroft on Making Intelligence Relevant in the 21st Century

Advanced Cyber/IO, Articles & Chapters
0Shares
David Isenberg
David Isenberg

Making Intelligence Relevant for the Missions of the 21st Century

by James Howcroft

Small Wars Journal | December 19, 2012

The international challenges which threaten the security of the United States and our partners in the 21st century are not primarily posed by conventional military forces. Despite the “pivot” toward a conventional peer competitor in Asia, the predominant source of conflict in the 21st century has been and will continue to be driven by events in fragile or failing states. Of the 27 active conflicts in the world today, only one is a traditional interstate war.  Due to the forces of globalization, strife and conflict in these regions now can directly impact the security of citizens within our borders. Unaddressed conflict in these regions gives rise to organized crime networks which engage in trafficking of weapons, drugs, people and WMD components.  Ethnic violence results in civil wars which often lead to humanitarian catastrophes and refugee migrations.  Ungoverned space may result in terrorist sanctuaries and the spread of radical ideologies and beliefs.  The most likely deployment mission will not be to engage against a traditional state’s military, but to engage in an unconventional conflict against non-state foes that use asymmetric tactics.

International security organizations and individual nations have various terms and definitions to address the range of possible operations to address security problems in fragile or failing states:  Peace Operations, Peace Support Operations or Stability Operations are commonly used terms.  The U.S Department of Defense (DOD) describes Stability Operations as: Military missions, tasks, and activities conducted outside the United States in coordination with other instruments of national power to maintain or reestablish a safe and secure environment, provide essential governmental services, emergency infrastructure reconstruction and humanitarian relief (Department of Defense Instruction 3000.05, “Stability Operations,” September 16, 2009, para. 3). Most often, regional security organizations, such as NATO or the African Union, empowered by the legitimacy of a UN Security Council mandate, form the headquarters or nucleus for ad hoc “coalitions of the willing” to carry out these missions.  ISAF in Afghanistan, the African Union Mission in Somalia (AMISOM) and the NATO-led coalition operations in Libya are recent examples of this model.  Due to the nature of the missions the military, while a major actor, is only one member of a wider interagency, comprehensive, “whole of government” team assembled to address security, governance, humanitarian and economic developmental needs.

There are numerous, complex challenges to producing and disseminating timely, accurate and fused intelligence to support these operations.  Each step of the intelligence process must be adapted to meet the evolving needs of commanders, decision makers, soldiers and civilian partners on the ground.  In this era of declining defense budgets, what lessons should intelligence professionals be incorporating into training and educational programs to make success more likely during the next deployment to a fragile or failed state?   The following eight examples provide some insights to performing well in a complex environment. It is incumbent on leaders to communicate with and empower their intelligence officers to anticipate mission and information challenges. Incorporating aspects of these examples in training and education programs will help to ensure success on the next deployment.

Continue reading “David Isenberg: James Howcroft on Making Intelligence Relevant in the 21st Century”

Reference: Atlantic Council Envisioning 2030: US Strategy for a Post-Western World

02 China, 05 Iran, 06 Russia, Collective Intelligence, Commercial Intelligence, Communities of Practice, Earth Intelligence, Ethics, IO Impotency, Officers Call, Peace Intelligence, Strategy, White Papers
0Shares
Click on Image to Enlarge
Click on Image to Enlarge

Document:  Envisioning 2030: US Strategy for a Post-Western World (Atlantic Council, 10 December 2030)

Executive Summary

Agree that we are at a potentially historic transition point.  However, the Atlantic Council lacks the strategic analytic model to make the most of its otherwise formidable brain trust.  Agree on the need for a new mental map, but they chose the wrong map.  See the HourGlass Strategy as an alternative (also below the line).

The report misses multiple big possibilities including the eight tribes, M4IS2, and OSE.

1. Frame second-term policies from a more strategic and long-term perspective, recognizing the magnitude of the moment and the likelihood that the United States’ actions now will have generational consequences.

Absolutely.  Understanding emergent public governance trends rooted in true cost and whole system analytics, which harness the distributed intelligence of the five billion poor, not in this report.

2. Continue to emphasize what has been called “nation-building at home” as the first foreign policy priority, without neglecting its global context.

Left unsaid is the need to establish a plan, coincident with the creation of a 450-ship Navy, a long-haul Air Force, and an air-liftable Army, to close most of our military bases around the world, and bring all of our troops – and their purchasing power – home.

Continue reading “Reference: Atlantic Council Envisioning 2030: US Strategy for a Post-Western World”

Search: purpose of military intelligence

Searches
0Shares

School Solution:  To fabricate the worst possible threat, each service taking its own liberties, so as to justify the buying of the most outrageously complex and generally unreliable weapons and mobility systems with extremely heavy logistics tails, none of which can be supported by national or tactical intelligence “systems” also built by variations of the lowest bidder on government-specifications cost-plus terms.  The Office of the Secretary of Defense  (Acquisition, Intelligence, Policy) is responsible for producing as much paper as possible, ideally with no fewer than three acronyms per line, so as to keep tens of thousands of lower-grade civilians employees busy, thus justifying the maximum possible number of senior executive positions irrespective of any actual responsibility.  As a precaution against the military actually doing anything sensible, any contractor  employing or otherwise subsidizing a minimum of five retired general officers will be permitted veto power over any honest analysis that slips through.

A Pro Chuck Hagel Answer Below the Line

Continue reading “Search: purpose of military intelligence”

Michel Bauwens: Ericsson Document on Learning and Education in a Networked Society

BTS (Base Transciever Station), Education
0Shares
Michel Bauwens
Michel Bauwens

We are on the brink of a fundamental shift in society. As we journey towards the Networked Society we are unlocking the full potential of learning and education. Students and progressive teachers, empowered by technology, are turning established models on their heads while new skills and educational platforms are redefining our systems and institutions.

Contents:
1 A connected world 4
2 From evolution to revolution 5
3 Classroom disruption 6
Breaking down the walls 6
Knowledge everywhere 6
Lifelong learning 7
The empowered classroom 7
4 The science of change 8
5 Making the grade 10

Learning and Education in a Networked Society (PDF 12 Pages)

Phi Beta Iota:  An Ericsson document.  Most interesting point: mobile traffic expected to grow by fifteen times before 2017.  Most absent word: “open.”

See Also:

Open BTS (Base Transciever Station) (5)

Lynn Wheeler: Open-Source Laptop

Hardware
0Shares
Lynn Wheeler
Lynn Wheeler

Huang designs an open-source laptop

Shane McGlaun

TG Daily, December 18, 2012

Laptop powered by open operating system and designed around open hardware.

If you follow the technology world and the exploits of hardware hackers who like to mod devices such as Xbox 360 game consoles, you will unbdoubtedly recognize the name Bunnie Huang.

Huang is a notable hardware hacker who in 2010 leapt to the defense of one Matthew Crippen when he ran afoul of the federal government for running a business modding Xbox 360s in his garage.

Click on Image to Enlarge
Click on Image to Enlarge

We haven't really discussed Huang 2010, but he is back along with some pals and a new design for an open laptop. Not only will this device run Linux, the laptop design will also be freely available for anyone to download, modify and use as they see fit.

The project – codenamed Novena – currently includes designs for a mainboard and battery board. Hardware includes a 1.2 GHz Freescale i.MX6 ARM Cortex-A9 quad-core processor paired with a Vivante GC2000 GPU (graphics). The above-mentioned processor isn't exactly a speed demon, but it is fast enough for the Linux operating system, especially Ubuntu.

The laptop design is said to be remarkably open – as the only proprietary drivers required are for Wi-Fi and graphics modules. The design is described as a DIY project for now. However, Huang says that if the project gathers enough interest he might eventually launch a campaign via Kickstarter to build notebooks for people who are interested.

Other key features of the open notebook design include a Raspberry Pi compatible expansion header, a single DDR3 SO-DIMM, an available interface for mobile data cards, USB Wi-Fi module header on the board, a direct drive for a resistive touchscreen and an integrated digital microphone.

See Also:

Open Source Everything List

Talking Frog: Linked Open Data (LOD) 101

Access
0Shares
Click on Image to Enlarge
Click on Image to Enlarge

Wikipedia / Linked Data

Tim Berners-Lee, director of the World Wide Web Consortium, coined the term in a design note discussing issues around the Semantic Web project

The goal of the W3C Semantic Web Education and Outreach group's Linking Open Data community project is to extend the Web with a data commons by publishing various open datasets as RDF on the Web and by setting RDF links between data items from different data sources. In October 2007, datasets consisted of over two billion RDF triples, which were interlinked by over two million RDF links.

Phi Beta Iota:  Wikipedia has its limitations.  This is not a very old idea as they suggest, but rather an extraordinary new idea, word-level linking.  Doug Engelbart's Open Hyperdocument system (OHS) and Pierre Levy's Internet Economy Meta Language (IEML) are related ideas.  What this huge new idea does is go beyond the “thing” to provide its attributes in Resource Description Framework (RDF).  The attributes that are of interest from a public intelligence point of view are those of “true cost” — time, space, energy, water, child labor, tax avoidance, etcetera.  Hence, each datum will be “context aware” and a specific item from a specific company will know where it is in time and space, its costs to date, and its projected costs into the future, all in relation to the specifics of its being.

DuckDuckGo / Linked Open Data (LOD)

Here is the updated image from Wikipedia of the linked datasets as of 2011:

Click on Image to Enlarge
Click on Image to Enlarge

 

Mike Nelson: Adam Theirer’s Annual Cyberlaw and Info-Tech Policy Book Review

Advanced Cyber/IO, Economics/True Cost, Knowledge
0Shares
Mike Nelson
Mike Nelson

Always useful!

Important Cyberlaw & Info-Tech Policy Books (2012 Edition)

by on December 17, 2012 · Add a Comment

The number of major cyberlaw and information tech policy books being published annually continues to grow at an astonishing pace, so much so that I have lost the ability to read and review all of them. In past years, I put together end-of-year lists of important info-tech policy books (here are the lists for 2008, 2009, 2010, and 2011) and I was fairly confident I had read just about everything of importance that was out there (at least that was available in the U.S.). But last year that became a real struggle for me and this year it became an impossibility. A decade ago, there was merely a trickle of Internet policy books coming out each year. Then the trickle turned into a steady stream. Now it has turned into a flood. Thus, I’ve had to become far more selective about what is on my reading list. (This is also because the volume of journal articles about info-tech policy matters has increased exponentially at the same time.)

So, here’s what I’m going to do. I’m going to discuss what I regard to be the five most important titles of 2012, briefly summarize a half dozen others that I’ve read, and then I’m just going to list the rest of the books out there. I’ve read most of them but I have placed an asterisk next to the ones I haven’t.  Please let me know what titles I have missed so that I can add them to the list. (Incidentally, here’s my compendium of all the major tech policy books from the 2000s and here’s the running list of all my book reviews.)

Click on Image to Enlarge
Click on Image to Enlarge

Phi Beta Iota: A total “WOW.”

Includes, in this order (click here to read reviews, below to reach Amazon page):

Rebecca MacKinnon – Consent of the Network: The Worldwide Struggle for Internet Freedom

Susan Crawford – Captive Audience: The Telecom Industry and Monopoly Power in the New Gilded Age

John Palfrey & Urs Gasser – Interop: The Promise and Perils of Highly Interconnected Systems

Christopher Yoo – The Dynamic Internet: How Technology, Users, and Businesses are Transforming the Network

Brett Frischmann –Infrastructure: The Social Value of Shared Resources

and others.