Regaining Information Superiority Against 21st-Century Insurgents : RAND Counterinsurgency Study, Volume 1.
Material type:
- text
- computer
- online resource
- 9780833042880
- JC328.5.B97 2007
Cover -- Preface -- Contents -- Figures -- Tables -- Summary -- Acknowledgments -- Abbreviations -- Chapter One - Introduction -- Why Information Superiority Matters in Counterinsurgency -- Getting to Information Superiority in Counterinsurgency -- Overview -- Chapter Two - The Influence of User Requirements -- When the Population Is the Terrain -- Security Operations -- Situational Awareness -- Winning Allegiance -- Military Operations During Counterinsurgency -- Chapter Three - The Registry-Census -- Categorizing the Information -- Personal and Social Information -- Systematic Incidents and Reportage Data -- Buildings Data: The National CAD Model -- Getting the Information -- Information Reliability and Timeliness -- Toward a National Identification System? -- Registration -- Acquiring Identities at Checkpoints -- Acquiring Identities Without Checkpoints -- Conclusions -- Chapter Four - A Well-Wired Country -- Systems Concept -- Encourage Cell Phone Use -- Shape the Cell Phone Environment -- Associate Cell Phones with Registered Users -- Geolocate Cell Phones Periodically and as Needed -- Using the System's Capabilities -- Government Services -- Eyes on the Street -- Actionable Intelligence -- Other Uses -- The Cell Phone Network as the Primary Counterinsurgency Communications System -- Issues -- Secret Surveillance? -- Insurgent Responses -- Lost or Stolen SIMs -- Spoofing GPS Signals -- Commercial Considerations -- Follow-On Phases -- Avoiding a Permanent Police State -- A Note of Caution -- Conclusions and Implementation -- Chapter Five - Embedded Video -- Basic Concept and Technical Issues -- Evasion Techniques -- Uses -- Guidelines -- Video Made Public -- Conclusions -- Chapter Six - A National Wiki -- Our Town -- An Oral Wiki -- Attribution -- Language Translation -- Accuracy and Deception.
A National Wiki as a Feedback Mechanism for Government Services -- Conclusions -- Chapter Seven - The Principles of ICON -- Principle 1: Emphasize User Primacy, Inclusiveness, and Integration -- Principle 2: Build ICON to Go Native -- Principle 3: Audit, Audit, Audit -- Abnormal Usage -- Taggants -- Honeypots -- Surveillance -- Principle 4: Tune ICON to the Level of Insurgency -- Principle 5: Post Before Process -- Principle 6: Establish a Standard Deck and Populate Itfrom the National Wiki -- Principle 7: Rank Information by Reliability and Relevance -- Results and a Caveat -- Chapter Eight - Implications and Implementation -- Summary -- Census and National ID Cards -- Cell Phones -- Embedded Video -- National Wiki -- ICON -- Governance, Accountability, and Public Expression -- Adapting Information Capabilities to the Scope and Locus of the Insurgency -- Implementation -- Research and Development Needs -- Conclusion -- Appendix -- Bibliography.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
There are no comments on this title.