Byting back regaining information superiority against 21st-century insurgents

U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government a...

Full description

Bibliographic Details
Main Author: Libicki, Martin C.
Format: eBook
Language:English
Published: Santa Monica, CA Rand Corp. 2007, 2007
Series:Rand counterinsurgency study
Subjects:
Online Access:
Collection: JSTOR Open Access Books - Collection details see MPG.ReNa
LEADER 04699nam a2200481 u 4500
001 EB001842310
003 EBX01000000000000001006299
005 00000000000000.0
007 tu|||||||||||||||||||||
008 180730 r ||| eng
020 |a 9786611181277 
020 |a 1281181277 
020 |a 9781281181275 
020 |z 9780833041890 
020 |a 9780833041890 
020 |z 0833041894 
020 |a 0833041894 
020 |a 661118127X 
050 4 |a JC328.5 
100 1 |a Libicki, Martin C. 
245 0 0 |a Byting back  |h Elektronische Ressource  |b regaining information superiority against 21st-century insurgents  |c Martin C. Libicki [and others] ; prepared for the Office of the Secretary of Defense 
260 |a Santa Monica, CA  |b Rand Corp.  |c 2007, 2007 
300 |a xxxiv, 159 pages 
505 0 |a The influence of user requirements -- The registry-census -- A well-wired country -- Embedded video -- A national wiki -- The principles of ICON -- Implications and implementation 
505 0 |a Includes bibliographical references (pages 157-159) 
651 4 |a Iraq / fast 
651 4 |a United States / fast 
653 |a Insurgency 
653 |a Iraq War, 2003-2011 
653 |a POLITICAL SCIENCE / Security (National & International) 
653 |a POLITICAL SCIENCE / Political Process / Political Advocacy 
653 |a Afghan War, 2001-2021 
041 0 7 |a eng  |2 ISO 639-2 
989 |b ZDB-39-JOA  |a JSTOR Open Access Books 
490 0 |a Rand counterinsurgency study 
500 |a "RAND National Defense Research Institute." 
776 |z 9780833042880 
776 |z 0833042882 
856 4 0 |u https://www.jstor.org/stable/10.7249/mg595-1osd  |x Verlag  |3 Volltext 
082 0 |a 322.42 
520 |a U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government and an armed opposition movement, the key to exploiting information power is to connect with and learn from the population itself, increasing the effectiveness of both the local government and the U.S. military and civilian services engaged in supporting it. Utilizing mostly available networking technology, the United States could achieve early, affordable, and substantial gains in the effectiveness of counterinsurgency by more open, integrated, and inclusive information networking with the population, local authorities, and coalition partners. The most basic information link with the population would be an information technology (IT)-enhanced, fraud-resistant registry-census.  
520 |a The authors argue that today's military and intelligence networks -- being closed, compartmentalized, controlled by information providers instead of users, and limited to U.S. war fighters -- hamper counterinsurgency and deprive the United States of what ought to be a strategic advantage. In contrast, based on a review of 160 requirements for counterinsurgency, the authors call for current networks to be replaced by an integrated counterinsurgency operating network (ICON) linking U.S. and indigenous operators, based on principles of inclusiveness, integration, and user preeminence. Utilizing the proposed ways of gathering information from the population, ICON would improve the timeliness, reliability, and relevance of information, while focusing security restrictions on truly sensitive information. The complexity and sensitivity of counterinsurgency call for vastly better use of IT than has been seen in Iraq and Afghanistan. Here is a practical plan for just that 
520 |a The most promising link would come from utilizing local cell phone networks, which are proliferating even among poor countries. Access to data routinely collected by such networks can form the basis for security services such as enhanced-911 and forensics. The cell phones of a well-wired citizenry can be tantamount to sensor fields in settled areas. They can link indigenous forces with each other and with U.S. forces without interoperability problems; they can also track the responses of such forces to emergencies. Going further, outfitting weaponry with video cameras would bolster surveillance, provide lessons learned, and guard against operator misconduct. Establishing a national Wiki can help citizens describe their neighborhoods to familiarize U.S. forces with them and can promote accountable service delivery. All such information can improve counterinsurgency operations by making U.S. forces and agencies far better informed than they are at present.