BN.com Gift Guide

BYTING BACK: REGAINING INYPORMATION SUPERIORITY AGA

Overview

Libicki et al. argue that information collection requirements and systems for counterinsurgency are important because the community that conducts counterinsurgency crosses national and institutional boundaries and because the indigenous population plays a large role in determining the outcome of an insurgency. They then demonstrate what this focus implies for counterinsurgency requirements, collection, networking, and systems design.

...
See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (6) from $1.99   
  • New (2) from $18.75   
  • Used (4) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$18.75
Seller since 2007

Feedback rating:

(23567)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
BRAND NEW

Ships from: Avenel, NJ

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
$18.85
Seller since 2009

Feedback rating:

(10638)

Condition: New
New Book. Shipped from US within 4 to 14 business days. Established seller since 2000

Ships from: Secaucus, NJ

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Byting BackA-Regaining Information Superiority Against 21st-Century Insurgents: RAND Counterinsurgency StudyA-Volume 1

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$8.49
BN.com price
(Save 14%)$9.95 List Price
Sending request ...

Overview

Libicki et al. argue that information collection requirements and systems for counterinsurgency are important because the community that conducts counterinsurgency crosses national and institutional boundaries and because the indigenous population plays a large role in determining the outcome of an insurgency. They then demonstrate what this focus implies for counterinsurgency requirements, collection, networking, and systems design.

Read More Show Less

Product Details

  • ISBN-13: 9780833041890
  • Publisher: RAND Corporation
  • Publication date: 10/25/2007
  • Series: Rand Counterinsurgency Study Series
  • Pages: 156
  • Product dimensions: 5.90 (w) x 8.90 (h) x 0.60 (d)

Table of Contents

Preface     iii
Figures     ix
Tables     xi
Summary     xiii
Acknowledgments     xxxi
Abbreviations     xxxiii
Introduction     1
Why Information Superiority Matters in Counterinsurgency     2
Getting to Information Superiority in Counterinsurgency     7
Overview     9
The Influence of User Requirements     11
When the Population Is the Terrain     12
Security Operations     13
Situational Awareness     14
Winning Allegiance     15
Military Operations During Counterinsurgency     16
The Registry-Census     21
Categorizing the Information     23
Personal and Social Information     23
Systematic Incidents and Reportage Data     25
Buildings Data: The National CAD Model     27
Getting the Information     29
Information Reliability and Timeliness     31
Toward a National Identification System?     32
Registration     33
Acquiring Identities at Checkpoints     36
Acquiring Identities Without Checkpoints     37
Conclusions     40
A Well-Wired Country     43
Systems Concept     44
Encourage Cell Phone Use     45
Shape the Cell Phone Environment     46
Associate Cell Phones with Registered Users     48
Geolocate Cell Phones Periodically and as Needed     50
Using the System's Capabilities     51
Government Services     51
Eyes on the Street     52
Actionable Intelligence     52
Other Uses     54
The Cell Phone Network as the Primary Counterinsurgency Communications System     55
Issues     57
Secret Surveillance?     58
Insurgent Responses     59
Lost or Stolen SIMs     62
Spoofing GPS Signals     65
Commercial Considerations     65
Follow-On Phases     68
Avoiding a Permanent Police State     70
A Note of Caution     76
Conclusions and Implementation     77
Embedded Video     79
Basic Concept and Technical Issues     81
Evasion Techniques     83
Uses     84
Guidelines     85
Video Made Public     86
Conclusions     87
A National Wiki     89
Our Town     91
An Oral Wiki     95
Attribution     98
Language Translation     99
Accuracy and Deception     100
A National Wiki as a Feedback Mechanism for Government Services     102
Conclusions     104
The Principles of ICON     105
Emphasize User Primacy, Inclusiveness, and Integration     107
Build ICON to Go Native     113
Audit, Audit, Audit     117
Abnormal Usage     118
Taggants     118
Honeypots     119
Surveillance     119
Tune ICON to the Level of Insurgency     120
Post Before Process     124
Establish a Standard Deck and Populate It from the National Wiki     126
Rank Information by Reliability and Relevance     127
Results and a Caveat     129
Implications and Implementation     131
Summary     133
Census and National ID Cards     134
Cell Phones     134
Embedded Video     135
National Wiki     135
ICON     135
Governance, Accountability, and Public Expression      136
Adapting Information Capabilities to the Scope and Locus of the Insurgency     139
Implementation     141
Research and Development Needs     143
Conclusion     143
Disaggregated Information Requirements     145
Bibliography     157
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)