ORPP logo
Image from Google Jackets

Regaining Information Superiority Against 21st-Century Insurgents : RAND Counterinsurgency Study, Volume 1.

By: Contributor(s): Material type: TextTextPublisher: Santa Monica : RAND Corporation, The, 2007Copyright date: ©2007Edition: 1st edDescription: 1 online resource (194 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9780833042880
Subject(s): Genre/Form: Additional physical formats: Print version:: Regaining Information Superiority Against 21st-Century InsurgentsLOC classification:
  • JC328.5.B97 2007
Online resources:
Contents:
Cover -- Preface -- Contents -- Figures -- Tables -- Summary -- Acknowledgments -- Abbreviations -- Chapter One - Introduction -- Why Information Superiority Matters in Counterinsurgency -- Getting to Information Superiority in Counterinsurgency -- Overview -- Chapter Two - The Influence of User Requirements -- When the Population Is the Terrain -- Security Operations -- Situational Awareness -- Winning Allegiance -- Military Operations During Counterinsurgency -- Chapter Three - The Registry-Census -- Categorizing the Information -- Personal and Social Information -- Systematic Incidents and Reportage Data -- Buildings Data: The National CAD Model -- Getting the Information -- Information Reliability and Timeliness -- Toward a National Identification System? -- Registration -- Acquiring Identities at Checkpoints -- Acquiring Identities Without Checkpoints -- Conclusions -- Chapter Four - A Well-Wired Country -- Systems Concept -- Encourage Cell Phone Use -- Shape the Cell Phone Environment -- Associate Cell Phones with Registered Users -- Geolocate Cell Phones Periodically and as Needed -- Using the System's Capabilities -- Government Services -- Eyes on the Street -- Actionable Intelligence -- Other Uses -- The Cell Phone Network as the Primary Counterinsurgency Communications System -- Issues -- Secret Surveillance? -- Insurgent Responses -- Lost or Stolen SIMs -- Spoofing GPS Signals -- Commercial Considerations -- Follow-On Phases -- Avoiding a Permanent Police State -- A Note of Caution -- Conclusions and Implementation -- Chapter Five - Embedded Video -- Basic Concept and Technical Issues -- Evasion Techniques -- Uses -- Guidelines -- Video Made Public -- Conclusions -- Chapter Six - A National Wiki -- Our Town -- An Oral Wiki -- Attribution -- Language Translation -- Accuracy and Deception.
A National Wiki as a Feedback Mechanism for Government Services -- Conclusions -- Chapter Seven - The Principles of ICON -- Principle 1: Emphasize User Primacy, Inclusiveness, and Integration -- Principle 2: Build ICON to Go Native -- Principle 3: Audit, Audit, Audit -- Abnormal Usage -- Taggants -- Honeypots -- Surveillance -- Principle 4: Tune ICON to the Level of Insurgency -- Principle 5: Post Before Process -- Principle 6: Establish a Standard Deck and Populate Itfrom the National Wiki -- Principle 7: Rank Information by Reliability and Relevance -- Results and a Caveat -- Chapter Eight - Implications and Implementation -- Summary -- Census and National ID Cards -- Cell Phones -- Embedded Video -- National Wiki -- ICON -- Governance, Accountability, and Public Expression -- Adapting Information Capabilities to the Scope and Locus of the Insurgency -- Implementation -- Research and Development Needs -- Conclusion -- Appendix -- Bibliography.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Cover -- Preface -- Contents -- Figures -- Tables -- Summary -- Acknowledgments -- Abbreviations -- Chapter One - Introduction -- Why Information Superiority Matters in Counterinsurgency -- Getting to Information Superiority in Counterinsurgency -- Overview -- Chapter Two - The Influence of User Requirements -- When the Population Is the Terrain -- Security Operations -- Situational Awareness -- Winning Allegiance -- Military Operations During Counterinsurgency -- Chapter Three - The Registry-Census -- Categorizing the Information -- Personal and Social Information -- Systematic Incidents and Reportage Data -- Buildings Data: The National CAD Model -- Getting the Information -- Information Reliability and Timeliness -- Toward a National Identification System? -- Registration -- Acquiring Identities at Checkpoints -- Acquiring Identities Without Checkpoints -- Conclusions -- Chapter Four - A Well-Wired Country -- Systems Concept -- Encourage Cell Phone Use -- Shape the Cell Phone Environment -- Associate Cell Phones with Registered Users -- Geolocate Cell Phones Periodically and as Needed -- Using the System's Capabilities -- Government Services -- Eyes on the Street -- Actionable Intelligence -- Other Uses -- The Cell Phone Network as the Primary Counterinsurgency Communications System -- Issues -- Secret Surveillance? -- Insurgent Responses -- Lost or Stolen SIMs -- Spoofing GPS Signals -- Commercial Considerations -- Follow-On Phases -- Avoiding a Permanent Police State -- A Note of Caution -- Conclusions and Implementation -- Chapter Five - Embedded Video -- Basic Concept and Technical Issues -- Evasion Techniques -- Uses -- Guidelines -- Video Made Public -- Conclusions -- Chapter Six - A National Wiki -- Our Town -- An Oral Wiki -- Attribution -- Language Translation -- Accuracy and Deception.

A National Wiki as a Feedback Mechanism for Government Services -- Conclusions -- Chapter Seven - The Principles of ICON -- Principle 1: Emphasize User Primacy, Inclusiveness, and Integration -- Principle 2: Build ICON to Go Native -- Principle 3: Audit, Audit, Audit -- Abnormal Usage -- Taggants -- Honeypots -- Surveillance -- Principle 4: Tune ICON to the Level of Insurgency -- Principle 5: Post Before Process -- Principle 6: Establish a Standard Deck and Populate Itfrom the National Wiki -- Principle 7: Rank Information by Reliability and Relevance -- Results and a Caveat -- Chapter Eight - Implications and Implementation -- Summary -- Census and National ID Cards -- Cell Phones -- Embedded Video -- National Wiki -- ICON -- Governance, Accountability, and Public Expression -- Adapting Information Capabilities to the Scope and Locus of the Insurgency -- Implementation -- Research and Development Needs -- Conclusion -- Appendix -- Bibliography.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.