Preface |
|
iii | |
|
|
ix | |
|
|
xi | |
Summary |
|
xiii | |
Acknowledgments |
|
xxxi | |
Abbreviations |
|
xxxiii | |
|
|
1 | (10) |
|
Why Information Superiority Matters in Counterinsurgency |
|
|
2 | (5) |
|
Getting to Information Superiority in Counterinsurgency |
|
|
7 | (2) |
|
|
9 | (2) |
|
The Influence of User Requirements |
|
|
11 | (10) |
|
When the Population Is the Terrain |
|
|
12 | (4) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
Military Operations During Counterinsurgency |
|
|
16 | (5) |
|
|
21 | (22) |
|
Categorizing the Information |
|
|
23 | (6) |
|
Personal and Social Information |
|
|
23 | (2) |
|
Systematic Incidents and Reportage Data |
|
|
25 | (2) |
|
Buildings Data: The National CAD Model |
|
|
27 | (2) |
|
|
29 | (2) |
|
Information Reliability and Timeliness |
|
|
31 | (1) |
|
Toward a National Identification System? |
|
|
32 | (1) |
|
|
33 | (7) |
|
Acquiring Identities at Checkpoints |
|
|
36 | (1) |
|
Acquiring Identities Without Checkpoints |
|
|
37 | (3) |
|
|
40 | (3) |
|
|
43 | (36) |
|
|
44 | (7) |
|
|
45 | (1) |
|
Shape the Cell Phone Environment |
|
|
46 | (2) |
|
Associate Cell Phones with Registered Users |
|
|
48 | (2) |
|
Geolocate Cell Phones Periodically and as Needed |
|
|
50 | (1) |
|
Using the System's Capabilities |
|
|
51 | (4) |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
52 | (2) |
|
|
54 | (1) |
|
The Cell Phone Network as the Primary Counterinsurgency Communications System |
|
|
55 | (2) |
|
|
57 | (19) |
|
|
58 | (1) |
|
|
59 | (3) |
|
|
62 | (3) |
|
|
65 | (1) |
|
Commercial Considerations |
|
|
65 | (3) |
|
|
68 | (2) |
|
Avoiding a Permanent Police State |
|
|
70 | (6) |
|
|
76 | (1) |
|
Conclusions and Implementation |
|
|
77 | (2) |
|
|
79 | (10) |
|
Basic Concept and Technical Issues |
|
|
81 | (2) |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
87 | (2) |
|
|
89 | (16) |
|
|
91 | (4) |
|
|
95 | (3) |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
100 | (2) |
|
A National Wiki as a Feedback Mechanism for Government Services |
|
|
102 | (2) |
|
|
104 | (1) |
|
|
105 | (26) |
|
Principle 1: Emphasize User Primacy, Inclusiveness, and Integration |
|
|
107 | (6) |
|
Principle 2: Build ICON to Go Native |
|
|
113 | (4) |
|
Principle 3: Audit, Audit Audit |
|
|
117 | (3) |
|
|
118 | (1) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
Principle 4: Tune ICON to the Level of Insurgency |
|
|
120 | (4) |
|
Principle 5: Post Before Process |
|
|
124 | (2) |
|
Principle 6: Establish a Standard Deck and Populate It from the National Wiki |
|
|
126 | (1) |
|
Principle 7: Rank Information by Reliability and Relevance |
|
|
127 | (2) |
|
|
129 | (2) |
|
Implications and Implementation |
|
|
131 | (14) |
|
|
133 | (3) |
|
Census and National ID Cards |
|
|
134 | (1) |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
135 | (1) |
|
Governance, Accountability, and Public Expression |
|
|
136 | (3) |
|
Adapting Information Capabilities to the Scope and Locus of the Insurgency |
|
|
139 | (2) |
|
|
141 | (2) |
|
Research and Development Needs |
|
|
143 | (1) |
|
|
143 | (2) |
Appendix Disaggregated Information Requirements |
|
145 | (12) |
Bibliography |
|
157 | |