Byting back :: regaining information superiority against 21st-century insurgents /
U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government a...
Gespeichert in:
Körperschaft: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Santa Monica, CA :
Rand Corp.,
2007.
|
Schriftenreihe: | Rand counterinsurgency study ;
v. 1. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government and an armed opposition movement, the key to exploiting information power is to connect with and learn from the population itself, increasing the effectiveness of both the local government and the U.S. military and civilian services engaged in supporting it. Utilizing mostly available networking technology, the United States could achieve early, affordable, and substantial gains in the effectiveness of counterinsurgency by more open, integrated, and inclusive information networking with the population, local authorities, and coalition partners. The most basic information link with the population would be an information technology (IT)-enhanced, fraud-resistant registry-census. The most promising link would come from utilizing local cell phone networks, which are proliferating even among poor countries. Access to data routinely collected by such networks can form the basis for security services such as enhanced-911 and forensics. The cell phones of a well-wired citizenry can be tantamount to sensor fields in settled areas. They can link indigenous forces with each other and with U.S. forces without interoperability problems; they can also track the responses of such forces to emergencies. Going further, outfitting weaponry with video cameras would bolster surveillance, provide lessons learned, and guard against operator misconduct. Establishing a national Wiki can help citizens describe their neighborhoods to familiarize U.S. forces with them and can promote accountable service delivery. All such information can improve counterinsurgency operations by making U.S. forces and agencies far better informed than they are at present. The authors argue that today's military and intelligence networks -- being closed, compartmentalized, controlled by information providers instead of users, and limited to U.S. war fighters -- hamper counterinsurgency and deprive the United States of what ought to be a strategic advantage. In contrast, based on a review of 160 requirements for counterinsurgency, the authors call for current networks to be replaced by an integrated counterinsurgency operating network (ICON) linking U.S. and indigenous operators, based on principles of inclusiveness, integration, and user preeminence. Utilizing the proposed ways of gathering information from the population, ICON would improve the timeliness, reliability, and relevance of information, while focusing security restrictions on truly sensitive information. The complexity and sensitivity of counterinsurgency call for vastly better use of IT than has been seen in Iraq and Afghanistan. Here is a practical plan for just that. |
Beschreibung: | "RAND National Defense Research Institute." |
Beschreibung: | 1 online resource (xxxiv, 159 pages) |
Bibliographie: | Includes bibliographical references (pages 157-159). |
ISBN: | 9780833042880 0833042882 1281181277 9781281181275 9786611181277 661118127X |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn183674713 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 071213s2007 cau ob 000 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d OCLCQ |d IDEBK |d OCLCQ |d TUU |d OCLCQ |d DKDLA |d CCO |d E7B |d SNM |d FVL |d B24X7 |d OCLCQ |d OCLCO |d ZCU |d OCLCQ |d JSTOR |d OCLCF |d OCLCQ |d OCL |d OCLCQ |d EBLCP |d MHW |d TEFOD |d OCL |d DEBSZ |d OCL |d OCLCQ |d COO |d OCLCQ |d AZK |d JBG |d AGLDB |d CUS |d MOR |d PIFAG |d MERUC |d OCLCQ |d LND |d OCLCO |d WY@ |d U3W |d LOA |d LUE |d ICG |d STF |d WRM |d VNS |d MNI |d VTS |d COCUF |d NRAMU |d OCLCQ |d OCLCO |d INT |d VT2 |d EZ9 |d AU@ |d OCLCQ |d OCLCO |d ERL |d WYU |d TKN |d ICN |d OCLCQ |d OCLCO |d DKC |d OCLCQ |d M8D |d OCLCQ |d SFB |d OCL |d OCLCQ |d OCLCO |d OCLCQ |d OCL |d OCLCO |d OCLCQ |d ANO |d OCL |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 174052449 |a 290605055 |a 475277188 |a 475825931 |a 476120111 |a 568490969 |a 646742354 |a 712978043 |a 722661432 |a 728037376 |a 765139999 |a 923689297 |a 935266282 |a 961621727 |a 962689172 |a 1125525554 |a 1136464286 | ||
020 | |a 9780833042880 |q (electronic bk.) | ||
020 | |a 0833042882 |q (electronic bk.) | ||
020 | |a 1281181277 | ||
020 | |a 9781281181275 | ||
020 | |a 9786611181277 | ||
020 | |a 661118127X | ||
020 | |z 0833041894 | ||
020 | |z 9780833041890 | ||
035 | |a (OCoLC)183674713 |z (OCoLC)174052449 |z (OCoLC)290605055 |z (OCoLC)475277188 |z (OCoLC)475825931 |z (OCoLC)476120111 |z (OCoLC)568490969 |z (OCoLC)646742354 |z (OCoLC)712978043 |z (OCoLC)722661432 |z (OCoLC)728037376 |z (OCoLC)765139999 |z (OCoLC)923689297 |z (OCoLC)935266282 |z (OCoLC)961621727 |z (OCoLC)962689172 |z (OCoLC)1125525554 |z (OCoLC)1136464286 | ||
037 | |a 22573/cttp18h |b JSTOR | ||
037 | |a C879D35E-FA6F-4538-8850-A7608D792F81 |b OverDrive, Inc. |n http://www.overdrive.com | ||
043 | |a n-us--- | ||
050 | 4 | |a JC328.5 |b .B97 2007eb | |
072 | 7 | |a POL |x 043000 |2 bisacsh | |
072 | 7 | |a POL012000 |2 bisacsh | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 7 | |a 322.42 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Byting back : |b regaining information superiority against 21st-century insurgents / |c Martin C. Libicki [and others] ; prepared for the Office of the Secretary of Defense. |
260 | |a Santa Monica, CA : |b Rand Corp., |c 2007. | ||
300 | |a 1 online resource (xxxiv, 159 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
490 | 1 | |a Rand counterinsurgency study ; |v v. 1 | |
500 | |a "RAND National Defense Research Institute." | ||
504 | |a Includes bibliographical references (pages 157-159). | ||
505 | 0 | |a The influence of user requirements -- The registry-census -- A well-wired country -- Embedded video -- A national wiki -- The principles of ICON -- Implications and implementation. | |
520 | |a U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government and an armed opposition movement, the key to exploiting information power is to connect with and learn from the population itself, increasing the effectiveness of both the local government and the U.S. military and civilian services engaged in supporting it. Utilizing mostly available networking technology, the United States could achieve early, affordable, and substantial gains in the effectiveness of counterinsurgency by more open, integrated, and inclusive information networking with the population, local authorities, and coalition partners. The most basic information link with the population would be an information technology (IT)-enhanced, fraud-resistant registry-census. The most promising link would come from utilizing local cell phone networks, which are proliferating even among poor countries. Access to data routinely collected by such networks can form the basis for security services such as enhanced-911 and forensics. The cell phones of a well-wired citizenry can be tantamount to sensor fields in settled areas. They can link indigenous forces with each other and with U.S. forces without interoperability problems; they can also track the responses of such forces to emergencies. Going further, outfitting weaponry with video cameras would bolster surveillance, provide lessons learned, and guard against operator misconduct. Establishing a national Wiki can help citizens describe their neighborhoods to familiarize U.S. forces with them and can promote accountable service delivery. All such information can improve counterinsurgency operations by making U.S. forces and agencies far better informed than they are at present. The authors argue that today's military and intelligence networks -- being closed, compartmentalized, controlled by information providers instead of users, and limited to U.S. war fighters -- hamper counterinsurgency and deprive the United States of what ought to be a strategic advantage. In contrast, based on a review of 160 requirements for counterinsurgency, the authors call for current networks to be replaced by an integrated counterinsurgency operating network (ICON) linking U.S. and indigenous operators, based on principles of inclusiveness, integration, and user preeminence. Utilizing the proposed ways of gathering information from the population, ICON would improve the timeliness, reliability, and relevance of information, while focusing security restrictions on truly sensitive information. The complexity and sensitivity of counterinsurgency call for vastly better use of IT than has been seen in Iraq and Afghanistan. Here is a practical plan for just that. | ||
588 | 0 | |a Print version record. | |
546 | |a English. | ||
650 | 0 | |a Insurgency. |0 http://id.loc.gov/authorities/subjects/sh85067073 | |
650 | 0 | |a Military art and science |z United States. | |
650 | 0 | |a Afghan War, 2001-2021. |0 http://id.loc.gov/authorities/subjects/sh2004004460 | |
650 | 0 | |a Iraq War, 2003-2011. |0 http://id.loc.gov/authorities/subjects/sh2003003059 | |
650 | 6 | |a Révoltes. | |
650 | 6 | |a Art et science militaires |z États-Unis. | |
650 | 6 | |a Guerre en Afghānistān, 2001-2021. | |
650 | 6 | |a Guerre en Irak, 2003-2011. | |
650 | 7 | |a POLITICAL SCIENCE |x Political Process |x Political Advocacy. |2 bisacsh | |
650 | 7 | |a POLITICAL SCIENCE |x Security (National & International) |2 bisacsh | |
650 | 7 | |a Insurgency |2 fast | |
650 | 7 | |a Military art and science |2 fast | |
651 | 7 | |a Iraq |2 fast |1 https://id.oclc.org/worldcat/entity/E39PBJtCBPBdMfmXtd4M8cvJXd | |
651 | 7 | |a United States |2 fast |1 https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq | |
647 | 7 | |a Iraq War |d (2003-2011) |2 fast |1 https://id.oclc.org/worldcat/entity/E39Qhp4vB9BhJhQKkFHjttcwXm | |
647 | 7 | |a Afghan War |d (2001-2021) |2 fast |1 https://id.oclc.org/worldcat/entity/E39Qhp4vBbhpQvKPRyqxmTxMQy | |
648 | 7 | |a 2003-2011 |2 fast | |
700 | 1 | |a Libicki, Martin C. |0 http://id.loc.gov/authorities/names/n88127433 | |
710 | 2 | |a National Defense Research Institute (U.S.) |0 http://id.loc.gov/authorities/names/n91060525 | |
758 | |i has work: |a Byting back (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFP3C8d93DXkFQd38qVkCP |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Byting back. |d Santa Monica, CA : Rand Corp., 2007 |z 0833041894 |z 9780833041890 |w (OCoLC)170922430 |
830 | 0 | |a Rand counterinsurgency study ; |v v. 1. |0 http://id.loc.gov/authorities/names/no2007129944 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=213902 |3 Volltext |
938 | |a Books 24x7 |b B247 |n bkg00023738 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL322567 | ||
938 | |a ebrary |b EBRY |n ebr10225483 | ||
938 | |a EBSCOhost |b EBSC |n 213902 | ||
938 | |a Internet Archive |b INAR |n bytingbackregain0000unse | ||
938 | |a YBP Library Services |b YANK |n 2745237 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn183674713 |
---|---|
_version_ | 1816881658763149312 |
adam_text | |
any_adam_object | |
author2 | Libicki, Martin C. |
author2_role | |
author2_variant | m c l mc mcl |
author_GND | http://id.loc.gov/authorities/names/n88127433 |
author_corporate | National Defense Research Institute (U.S.) |
author_corporate_role | |
author_facet | Libicki, Martin C. National Defense Research Institute (U.S.) |
author_sort | Libicki, Martin C. |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | J - Political Science |
callnumber-label | JC328 |
callnumber-raw | JC328.5 .B97 2007eb |
callnumber-search | JC328.5 .B97 2007eb |
callnumber-sort | JC 3328.5 B97 42007EB |
callnumber-subject | JC - Political Theory |
collection | ZDB-4-EBA |
contents | The influence of user requirements -- The registry-census -- A well-wired country -- Embedded video -- A national wiki -- The principles of ICON -- Implications and implementation. |
ctrlnum | (OCoLC)183674713 |
dewey-full | 322.42 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 322 - Relation of state to organized groups |
dewey-raw | 322.42 |
dewey-search | 322.42 |
dewey-sort | 3322.42 |
dewey-tens | 320 - Political science (Politics and government) |
discipline | Politologie |
era | 2003-2011 fast |
era_facet | 2003-2011 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07920cam a2200865 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn183674713</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">071213s2007 cau ob 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TUU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DKDLA</subfield><subfield code="d">CCO</subfield><subfield code="d">E7B</subfield><subfield code="d">SNM</subfield><subfield code="d">FVL</subfield><subfield code="d">B24X7</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">ZCU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">JSTOR</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">EBLCP</subfield><subfield code="d">MHW</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCL</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">JBG</subfield><subfield code="d">AGLDB</subfield><subfield code="d">CUS</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFAG</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LND</subfield><subfield code="d">OCLCO</subfield><subfield code="d">WY@</subfield><subfield code="d">U3W</subfield><subfield code="d">LOA</subfield><subfield code="d">LUE</subfield><subfield code="d">ICG</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">VNS</subfield><subfield code="d">MNI</subfield><subfield code="d">VTS</subfield><subfield code="d">COCUF</subfield><subfield code="d">NRAMU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">EZ9</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">ERL</subfield><subfield code="d">WYU</subfield><subfield code="d">TKN</subfield><subfield code="d">ICN</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SFB</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ANO</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">174052449</subfield><subfield code="a">290605055</subfield><subfield code="a">475277188</subfield><subfield code="a">475825931</subfield><subfield code="a">476120111</subfield><subfield code="a">568490969</subfield><subfield code="a">646742354</subfield><subfield code="a">712978043</subfield><subfield code="a">722661432</subfield><subfield code="a">728037376</subfield><subfield code="a">765139999</subfield><subfield code="a">923689297</subfield><subfield code="a">935266282</subfield><subfield code="a">961621727</subfield><subfield code="a">962689172</subfield><subfield code="a">1125525554</subfield><subfield code="a">1136464286</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833042880</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833042882</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281181277</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281181275</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611181277</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">661118127X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0833041894</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780833041890</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)183674713</subfield><subfield code="z">(OCoLC)174052449</subfield><subfield code="z">(OCoLC)290605055</subfield><subfield code="z">(OCoLC)475277188</subfield><subfield code="z">(OCoLC)475825931</subfield><subfield code="z">(OCoLC)476120111</subfield><subfield code="z">(OCoLC)568490969</subfield><subfield code="z">(OCoLC)646742354</subfield><subfield code="z">(OCoLC)712978043</subfield><subfield code="z">(OCoLC)722661432</subfield><subfield code="z">(OCoLC)728037376</subfield><subfield code="z">(OCoLC)765139999</subfield><subfield code="z">(OCoLC)923689297</subfield><subfield code="z">(OCoLC)935266282</subfield><subfield code="z">(OCoLC)961621727</subfield><subfield code="z">(OCoLC)962689172</subfield><subfield code="z">(OCoLC)1125525554</subfield><subfield code="z">(OCoLC)1136464286</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">22573/cttp18h</subfield><subfield code="b">JSTOR</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">C879D35E-FA6F-4538-8850-A7608D792F81</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">JC328.5</subfield><subfield code="b">.B97 2007eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="x">043000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL012000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">322.42</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Byting back :</subfield><subfield code="b">regaining information superiority against 21st-century insurgents /</subfield><subfield code="c">Martin C. Libicki [and others] ; prepared for the Office of the Secretary of Defense.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Santa Monica, CA :</subfield><subfield code="b">Rand Corp.,</subfield><subfield code="c">2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxxiv, 159 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Rand counterinsurgency study ;</subfield><subfield code="v">v. 1</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"RAND National Defense Research Institute."</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (pages 157-159).</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">The influence of user requirements -- The registry-census -- A well-wired country -- Embedded video -- A national wiki -- The principles of ICON -- Implications and implementation.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government and an armed opposition movement, the key to exploiting information power is to connect with and learn from the population itself, increasing the effectiveness of both the local government and the U.S. military and civilian services engaged in supporting it. Utilizing mostly available networking technology, the United States could achieve early, affordable, and substantial gains in the effectiveness of counterinsurgency by more open, integrated, and inclusive information networking with the population, local authorities, and coalition partners. The most basic information link with the population would be an information technology (IT)-enhanced, fraud-resistant registry-census. The most promising link would come from utilizing local cell phone networks, which are proliferating even among poor countries. Access to data routinely collected by such networks can form the basis for security services such as enhanced-911 and forensics. The cell phones of a well-wired citizenry can be tantamount to sensor fields in settled areas. They can link indigenous forces with each other and with U.S. forces without interoperability problems; they can also track the responses of such forces to emergencies. Going further, outfitting weaponry with video cameras would bolster surveillance, provide lessons learned, and guard against operator misconduct. Establishing a national Wiki can help citizens describe their neighborhoods to familiarize U.S. forces with them and can promote accountable service delivery. All such information can improve counterinsurgency operations by making U.S. forces and agencies far better informed than they are at present. The authors argue that today's military and intelligence networks -- being closed, compartmentalized, controlled by information providers instead of users, and limited to U.S. war fighters -- hamper counterinsurgency and deprive the United States of what ought to be a strategic advantage. In contrast, based on a review of 160 requirements for counterinsurgency, the authors call for current networks to be replaced by an integrated counterinsurgency operating network (ICON) linking U.S. and indigenous operators, based on principles of inclusiveness, integration, and user preeminence. Utilizing the proposed ways of gathering information from the population, ICON would improve the timeliness, reliability, and relevance of information, while focusing security restrictions on truly sensitive information. The complexity and sensitivity of counterinsurgency call for vastly better use of IT than has been seen in Iraq and Afghanistan. Here is a practical plan for just that.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Insurgency.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85067073</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Military art and science</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Afghan War, 2001-2021.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2004004460</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Iraq War, 2003-2011.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2003003059</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Révoltes.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Art et science militaires</subfield><subfield code="z">États-Unis.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Guerre en Afghānistān, 2001-2021.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Guerre en Irak, 2003-2011.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE</subfield><subfield code="x">Political Process</subfield><subfield code="x">Political Advocacy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE</subfield><subfield code="x">Security (National & International)</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Insurgency</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Military art and science</subfield><subfield code="2">fast</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Iraq</subfield><subfield code="2">fast</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJtCBPBdMfmXtd4M8cvJXd</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">United States</subfield><subfield code="2">fast</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq</subfield></datafield><datafield tag="647" ind1=" " ind2="7"><subfield code="a">Iraq War</subfield><subfield code="d">(2003-2011)</subfield><subfield code="2">fast</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39Qhp4vB9BhJhQKkFHjttcwXm</subfield></datafield><datafield tag="647" ind1=" " ind2="7"><subfield code="a">Afghan War</subfield><subfield code="d">(2001-2021)</subfield><subfield code="2">fast</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39Qhp4vBbhpQvKPRyqxmTxMQy</subfield></datafield><datafield tag="648" ind1=" " ind2="7"><subfield code="a">2003-2011</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Libicki, Martin C.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n88127433</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">National Defense Research Institute (U.S.)</subfield><subfield code="0">http://id.loc.gov/authorities/names/n91060525</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Byting back (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFP3C8d93DXkFQd38qVkCP</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Byting back.</subfield><subfield code="d">Santa Monica, CA : Rand Corp., 2007</subfield><subfield code="z">0833041894</subfield><subfield code="z">9780833041890</subfield><subfield code="w">(OCoLC)170922430</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Rand counterinsurgency study ;</subfield><subfield code="v">v. 1.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007129944</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=213902</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bkg00023738</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL322567</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10225483</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">213902</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">bytingbackregain0000unse</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2745237</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
geographic | Iraq fast https://id.oclc.org/worldcat/entity/E39PBJtCBPBdMfmXtd4M8cvJXd United States fast https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq |
geographic_facet | Iraq United States |
id | ZDB-4-EBA-ocn183674713 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:16:13Z |
institution | BVB |
institution_GND | http://id.loc.gov/authorities/names/n91060525 |
isbn | 9780833042880 0833042882 1281181277 9781281181275 9786611181277 661118127X |
language | English |
oclc_num | 183674713 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxxiv, 159 pages) |
psigel | ZDB-4-EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Rand Corp., |
record_format | marc |
series | Rand counterinsurgency study ; |
series2 | Rand counterinsurgency study ; |
spelling | Byting back : regaining information superiority against 21st-century insurgents / Martin C. Libicki [and others] ; prepared for the Office of the Secretary of Defense. Santa Monica, CA : Rand Corp., 2007. 1 online resource (xxxiv, 159 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier data file Rand counterinsurgency study ; v. 1 "RAND National Defense Research Institute." Includes bibliographical references (pages 157-159). The influence of user requirements -- The registry-census -- A well-wired country -- Embedded video -- A national wiki -- The principles of ICON -- Implications and implementation. U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government and an armed opposition movement, the key to exploiting information power is to connect with and learn from the population itself, increasing the effectiveness of both the local government and the U.S. military and civilian services engaged in supporting it. Utilizing mostly available networking technology, the United States could achieve early, affordable, and substantial gains in the effectiveness of counterinsurgency by more open, integrated, and inclusive information networking with the population, local authorities, and coalition partners. The most basic information link with the population would be an information technology (IT)-enhanced, fraud-resistant registry-census. The most promising link would come from utilizing local cell phone networks, which are proliferating even among poor countries. Access to data routinely collected by such networks can form the basis for security services such as enhanced-911 and forensics. The cell phones of a well-wired citizenry can be tantamount to sensor fields in settled areas. They can link indigenous forces with each other and with U.S. forces without interoperability problems; they can also track the responses of such forces to emergencies. Going further, outfitting weaponry with video cameras would bolster surveillance, provide lessons learned, and guard against operator misconduct. Establishing a national Wiki can help citizens describe their neighborhoods to familiarize U.S. forces with them and can promote accountable service delivery. All such information can improve counterinsurgency operations by making U.S. forces and agencies far better informed than they are at present. The authors argue that today's military and intelligence networks -- being closed, compartmentalized, controlled by information providers instead of users, and limited to U.S. war fighters -- hamper counterinsurgency and deprive the United States of what ought to be a strategic advantage. In contrast, based on a review of 160 requirements for counterinsurgency, the authors call for current networks to be replaced by an integrated counterinsurgency operating network (ICON) linking U.S. and indigenous operators, based on principles of inclusiveness, integration, and user preeminence. Utilizing the proposed ways of gathering information from the population, ICON would improve the timeliness, reliability, and relevance of information, while focusing security restrictions on truly sensitive information. The complexity and sensitivity of counterinsurgency call for vastly better use of IT than has been seen in Iraq and Afghanistan. Here is a practical plan for just that. Print version record. English. Insurgency. http://id.loc.gov/authorities/subjects/sh85067073 Military art and science United States. Afghan War, 2001-2021. http://id.loc.gov/authorities/subjects/sh2004004460 Iraq War, 2003-2011. http://id.loc.gov/authorities/subjects/sh2003003059 Révoltes. Art et science militaires États-Unis. Guerre en Afghānistān, 2001-2021. Guerre en Irak, 2003-2011. POLITICAL SCIENCE Political Process Political Advocacy. bisacsh POLITICAL SCIENCE Security (National & International) bisacsh Insurgency fast Military art and science fast Iraq fast https://id.oclc.org/worldcat/entity/E39PBJtCBPBdMfmXtd4M8cvJXd United States fast https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq Iraq War (2003-2011) fast https://id.oclc.org/worldcat/entity/E39Qhp4vB9BhJhQKkFHjttcwXm Afghan War (2001-2021) fast https://id.oclc.org/worldcat/entity/E39Qhp4vBbhpQvKPRyqxmTxMQy 2003-2011 fast Libicki, Martin C. http://id.loc.gov/authorities/names/n88127433 National Defense Research Institute (U.S.) http://id.loc.gov/authorities/names/n91060525 has work: Byting back (Text) https://id.oclc.org/worldcat/entity/E39PCFP3C8d93DXkFQd38qVkCP https://id.oclc.org/worldcat/ontology/hasWork Print version: Byting back. Santa Monica, CA : Rand Corp., 2007 0833041894 9780833041890 (OCoLC)170922430 Rand counterinsurgency study ; v. 1. http://id.loc.gov/authorities/names/no2007129944 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=213902 Volltext |
spellingShingle | Byting back : regaining information superiority against 21st-century insurgents / Rand counterinsurgency study ; The influence of user requirements -- The registry-census -- A well-wired country -- Embedded video -- A national wiki -- The principles of ICON -- Implications and implementation. Insurgency. http://id.loc.gov/authorities/subjects/sh85067073 Military art and science United States. Afghan War, 2001-2021. http://id.loc.gov/authorities/subjects/sh2004004460 Iraq War, 2003-2011. http://id.loc.gov/authorities/subjects/sh2003003059 Révoltes. Art et science militaires États-Unis. Guerre en Afghānistān, 2001-2021. Guerre en Irak, 2003-2011. POLITICAL SCIENCE Political Process Political Advocacy. bisacsh POLITICAL SCIENCE Security (National & International) bisacsh Insurgency fast Military art and science fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85067073 http://id.loc.gov/authorities/subjects/sh2004004460 http://id.loc.gov/authorities/subjects/sh2003003059 |
title | Byting back : regaining information superiority against 21st-century insurgents / |
title_auth | Byting back : regaining information superiority against 21st-century insurgents / |
title_exact_search | Byting back : regaining information superiority against 21st-century insurgents / |
title_full | Byting back : regaining information superiority against 21st-century insurgents / Martin C. Libicki [and others] ; prepared for the Office of the Secretary of Defense. |
title_fullStr | Byting back : regaining information superiority against 21st-century insurgents / Martin C. Libicki [and others] ; prepared for the Office of the Secretary of Defense. |
title_full_unstemmed | Byting back : regaining information superiority against 21st-century insurgents / Martin C. Libicki [and others] ; prepared for the Office of the Secretary of Defense. |
title_short | Byting back : |
title_sort | byting back regaining information superiority against 21st century insurgents |
title_sub | regaining information superiority against 21st-century insurgents / |
topic | Insurgency. http://id.loc.gov/authorities/subjects/sh85067073 Military art and science United States. Afghan War, 2001-2021. http://id.loc.gov/authorities/subjects/sh2004004460 Iraq War, 2003-2011. http://id.loc.gov/authorities/subjects/sh2003003059 Révoltes. Art et science militaires États-Unis. Guerre en Afghānistān, 2001-2021. Guerre en Irak, 2003-2011. POLITICAL SCIENCE Political Process Political Advocacy. bisacsh POLITICAL SCIENCE Security (National & International) bisacsh Insurgency fast Military art and science fast |
topic_facet | Insurgency. Military art and science United States. Afghan War, 2001-2021. Iraq War, 2003-2011. Révoltes. Art et science militaires États-Unis. Guerre en Afghānistān, 2001-2021. Guerre en Irak, 2003-2011. POLITICAL SCIENCE Political Process Political Advocacy. POLITICAL SCIENCE Security (National & International) Insurgency Military art and science Iraq United States |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=213902 |
work_keys_str_mv | AT libickimartinc bytingbackregaininginformationsuperiorityagainst21stcenturyinsurgents AT nationaldefenseresearchinstituteus bytingbackregaininginformationsuperiorityagainst21stcenturyinsurgents |