Cargando…

Byting back : regaining information superiority against 21st-century insurgents /

U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government a...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: National Defense Research Institute (U.S.)
Otros Autores: Libicki, Martin C.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Santa Monica, CA : Rand Corp., 2007.
Colección:Rand counterinsurgency study ; v. 1.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 JSTOROA_ocn183674713
003 OCoLC
005 20231005004200.0
006 m o d
007 cr cnu---unuuu
008 071213s2007 cau ob 000 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d YDXCP  |d OCLCQ  |d IDEBK  |d OCLCQ  |d TUU  |d OCLCQ  |d DKDLA  |d CCO  |d E7B  |d SNM  |d FVL  |d B24X7  |d OCLCQ  |d OCLCO  |d ZCU  |d OCLCQ  |d JSTOR  |d OCLCF  |d OCLCQ  |d OCL  |d OCLCQ  |d EBLCP  |d MHW  |d TEFOD  |d OCL  |d DEBSZ  |d OCL  |d OCLCQ  |d COO  |d OCLCQ  |d AZK  |d JBG  |d AGLDB  |d CUS  |d MOR  |d PIFAG  |d MERUC  |d OCLCQ  |d LND  |d OCLCO  |d WY@  |d U3W  |d LOA  |d LUE  |d ICG  |d STF  |d WRM  |d VNS  |d MNI  |d VTS  |d COCUF  |d NRAMU  |d OCLCQ  |d OCLCO  |d INT  |d VT2  |d EZ9  |d AU@  |d OCLCQ  |d OCLCO  |d ERL  |d WYU  |d TKN  |d ICN  |d OCLCQ  |d OCLCO  |d DKC  |d OCLCQ  |d M8D  |d OCLCQ  |d SFB  |d OCL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCL  |d OCLCO  |d OCLCQ  |d ANO  |d OCL  |d OCLCQ 
019 |a 174052449  |a 290605055  |a 475277188  |a 475825931  |a 476120111  |a 568490969  |a 646742354  |a 712978043  |a 722661432  |a 728037376  |a 765139999  |a 923689297  |a 935266282  |a 961621727  |a 962689172  |a 1125525554  |a 1136464286 
020 |a 9780833042880  |q (electronic bk.) 
020 |a 0833042882  |q (electronic bk.) 
020 |a 1281181277 
020 |a 9781281181275 
020 |a 9786611181277 
020 |a 661118127X 
020 |z 0833041894 
020 |z 9780833041890 
029 1 |a AU@  |b 000048758131 
029 1 |a AU@  |b 000051317790 
029 1 |a DEBBG  |b BV043165070 
029 1 |a DEBBG  |b BV044090584 
029 1 |a DEBSZ  |b 422159336 
029 1 |a DEBSZ  |b 449107620 
029 1 |a DEBSZ  |b 449573133 
029 1 |a GBVCP  |b 1008650102 
029 1 |a GBVCP  |b 802402062 
029 1 |a NZ1  |b 14239748 
035 |a (OCoLC)183674713  |z (OCoLC)174052449  |z (OCoLC)290605055  |z (OCoLC)475277188  |z (OCoLC)475825931  |z (OCoLC)476120111  |z (OCoLC)568490969  |z (OCoLC)646742354  |z (OCoLC)712978043  |z (OCoLC)722661432  |z (OCoLC)728037376  |z (OCoLC)765139999  |z (OCoLC)923689297  |z (OCoLC)935266282  |z (OCoLC)961621727  |z (OCoLC)962689172  |z (OCoLC)1125525554  |z (OCoLC)1136464286 
037 |a 22573/cttp18h  |b JSTOR 
037 |a C879D35E-FA6F-4538-8850-A7608D792F81  |b OverDrive, Inc.  |n http://www.overdrive.com 
043 |a n-us--- 
050 4 |a JC328.5  |b .B97 2007eb 
072 7 |a POL  |x 043000  |2 bisacsh 
072 7 |a POL012000  |2 bisacsh 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 322.42  |2 22 
049 |a UAMI 
245 0 0 |a Byting back :  |b regaining information superiority against 21st-century insurgents /  |c Martin C. Libicki [and others] ; prepared for the Office of the Secretary of Defense. 
260 |a Santa Monica, CA :  |b Rand Corp.,  |c 2007. 
300 |a 1 online resource (xxxiv, 159 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
490 1 |a Rand counterinsurgency study ;  |v v. 1 
500 |a "RAND National Defense Research Institute." 
504 |a Includes bibliographical references (pages 157-159). 
505 0 |a The influence of user requirements -- The registry-census -- A well-wired country -- Embedded video -- A national wiki -- The principles of ICON -- Implications and implementation. 
520 |a U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government and an armed opposition movement, the key to exploiting information power is to connect with and learn from the population itself, increasing the effectiveness of both the local government and the U.S. military and civilian services engaged in supporting it. Utilizing mostly available networking technology, the United States could achieve early, affordable, and substantial gains in the effectiveness of counterinsurgency by more open, integrated, and inclusive information networking with the population, local authorities, and coalition partners. The most basic information link with the population would be an information technology (IT)-enhanced, fraud-resistant registry-census. The most promising link would come from utilizing local cell phone networks, which are proliferating even among poor countries. Access to data routinely collected by such networks can form the basis for security services such as enhanced-911 and forensics. The cell phones of a well-wired citizenry can be tantamount to sensor fields in settled areas. They can link indigenous forces with each other and with U.S. forces without interoperability problems; they can also track the responses of such forces to emergencies. Going further, outfitting weaponry with video cameras would bolster surveillance, provide lessons learned, and guard against operator misconduct. Establishing a national Wiki can help citizens describe their neighborhoods to familiarize U.S. forces with them and can promote accountable service delivery. All such information can improve counterinsurgency operations by making U.S. forces and agencies far better informed than they are at present. The authors argue that today's military and intelligence networks -- being closed, compartmentalized, controlled by information providers instead of users, and limited to U.S. war fighters -- hamper counterinsurgency and deprive the United States of what ought to be a strategic advantage. In contrast, based on a review of 160 requirements for counterinsurgency, the authors call for current networks to be replaced by an integrated counterinsurgency operating network (ICON) linking U.S. and indigenous operators, based on principles of inclusiveness, integration, and user preeminence. Utilizing the proposed ways of gathering information from the population, ICON would improve the timeliness, reliability, and relevance of information, while focusing security restrictions on truly sensitive information. The complexity and sensitivity of counterinsurgency call for vastly better use of IT than has been seen in Iraq and Afghanistan. Here is a practical plan for just that. 
588 0 |a Print version record. 
546 |a English. 
590 |a JSTOR  |b Books at JSTOR Open Access 
590 |a JSTOR  |b Books at JSTOR All Purchased 
650 0 |a Insurgency. 
650 0 |a Military art and science  |z United States. 
650 0 |a Afghan War, 2001-2021. 
650 0 |a Iraq War, 2003-2011. 
650 6 |a Révoltes. 
650 6 |a Art et science militaires  |z États-Unis. 
650 6 |a Guerre en Afghānistān, 2001- 
650 6 |a Guerre en Irak, 2003-2011. 
650 7 |a POLITICAL SCIENCE  |x Political Process  |x Political Advocacy.  |2 bisacsh 
650 7 |a POLITICAL SCIENCE  |x Security (National & International)  |2 bisacsh 
650 7 |a Insurgency.  |2 fast  |0 (OCoLC)fst00975461 
650 7 |a Military art and science.  |2 fast  |0 (OCoLC)fst01020874 
651 7 |a Iraq.  |2 fast  |0 (OCoLC)fst01205757 
651 7 |a United States.  |2 fast  |0 (OCoLC)fst01204155 
647 7 |a Iraq War  |d (2003-2011)  |2 fast  |0 (OCoLC)fst01802311 
647 7 |a Afghan War  |d (2001-2021)  |2 fast  |0 (OCoLC)fst01695175 
648 7 |a 2003-2011  |2 fast 
700 1 |a Libicki, Martin C. 
710 2 |a National Defense Research Institute (U.S.) 
776 0 8 |i Print version:  |t Byting back.  |d Santa Monica, CA : Rand Corp., 2007  |z 0833041894  |z 9780833041890  |w (OCoLC)170922430 
830 0 |a Rand counterinsurgency study ;  |v v. 1. 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.7249/mg595-1osd  |z Texto completo 
938 |a Books 24x7  |b B247  |n bkg00023738 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL322567 
938 |a ebrary  |b EBRY  |n ebr10225483 
938 |a EBSCOhost  |b EBSC  |n 213902 
938 |a Internet Archive  |b INAR  |n bytingbackregain0000unse 
938 |a YBP Library Services  |b YANK  |n 2745237 
994 |a 92  |b IZTAP