Atjaunināt sīkdatņu piekrišanu

Byting Back: Regaining Information Superiority Against 21st-century Insurgents [Mīkstie vāki]

  • Formāts: Paperback / softback, 193 pages, Illustrations
  • Izdošanas datums: 17-Oct-2007
  • Izdevniecība: RAND
  • ISBN-10: 0833041894
  • ISBN-13: 9780833041890
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 24,80 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 193 pages, Illustrations
  • Izdošanas datums: 17-Oct-2007
  • Izdevniecība: RAND
  • ISBN-10: 0833041894
  • ISBN-13: 9780833041890
Citas grāmatas par šo tēmu:
Libicki et al. argue that information collection requirements and systems for counterinsurgency are important because the community that conducts counterinsurgency crosses national and institutional boundaries and because the indigenous population plays a large role in determining the outcome of an insurgency. They then demonstrate what this focus implies for counterinsurgency requirements, collection, networking, and systems design.
Preface iii
Figures
ix
Tables
xi
Summary xiii
Acknowledgments xxxi
Abbreviations xxxiii
Introduction
1(10)
Why Information Superiority Matters in Counterinsurgency
2(5)
Getting to Information Superiority in Counterinsurgency
7(2)
Overview
9(2)
The Influence of User Requirements
11(10)
When the Population Is the Terrain
12(4)
Security Operations
13(1)
Situational Awareness
14(1)
Winning Allegiance
15(1)
Military Operations During Counterinsurgency
16(5)
The Registry-Census
21(22)
Categorizing the Information
23(6)
Personal and Social Information
23(2)
Systematic Incidents and Reportage Data
25(2)
Buildings Data: The National CAD Model
27(2)
Getting the Information
29(2)
Information Reliability and Timeliness
31(1)
Toward a National Identification System?
32(1)
Registration
33(7)
Acquiring Identities at Checkpoints
36(1)
Acquiring Identities Without Checkpoints
37(3)
Conclusions
40(3)
A Well-Wired Country
43(36)
Systems Concept
44(7)
Encourage Cell Phone Use
45(1)
Shape the Cell Phone Environment
46(2)
Associate Cell Phones with Registered Users
48(2)
Geolocate Cell Phones Periodically and as Needed
50(1)
Using the System's Capabilities
51(4)
Government Services
51(1)
Eyes on the Street
52(1)
Actionable Intelligence
52(2)
Other Uses
54(1)
The Cell Phone Network as the Primary Counterinsurgency Communications System
55(2)
Issues
57(19)
Secret Surveillance?
58(1)
Insurgent Responses
59(3)
Lost or Stolen SIMs
62(3)
Spoofing GPS Signals
65(1)
Commercial Considerations
65(3)
Follow-On Phases
68(2)
Avoiding a Permanent Police State
70(6)
A Note of Caution
76(1)
Conclusions and Implementation
77(2)
Embedded Video
79(10)
Basic Concept and Technical Issues
81(2)
Evasion Techniques
83(1)
Uses
84(1)
Guidelines
85(1)
Video Made Public
86(1)
Conclusions
87(2)
A National Wiki
89(16)
Our Town
91(4)
An Oral Wiki
95(3)
Attribution
98(1)
Language Translation
99(1)
Accuracy and Deception
100(2)
A National Wiki as a Feedback Mechanism for Government Services
102(2)
Conclusions
104(1)
The Principles of ICON
105(26)
Principle 1: Emphasize User Primacy, Inclusiveness, and Integration
107(6)
Principle 2: Build ICON to Go Native
113(4)
Principle 3: Audit, Audit Audit
117(3)
Abnormal Usage
118(1)
Taggants
118(1)
Honeypots
119(1)
Surveillance
119(1)
Principle 4: Tune ICON to the Level of Insurgency
120(4)
Principle 5: Post Before Process
124(2)
Principle 6: Establish a Standard Deck and Populate It from the National Wiki
126(1)
Principle 7: Rank Information by Reliability and Relevance
127(2)
Results and a Caveat
129(2)
Implications and Implementation
131(14)
Summary
133(3)
Census and National ID Cards
134(1)
Cell Phones
134(1)
Embedded Video
135(1)
National Wiki
135(1)
ICON
135(1)
Governance, Accountability, and Public Expression
136(3)
Adapting Information Capabilities to the Scope and Locus of the Insurgency
139(2)
Implementation
141(2)
Research and Development Needs
143(1)
Conclusion
143(2)
Appendix Disaggregated Information Requirements 145(12)
Bibliography 157