Byting Back : Regaining Information Superiority Against 21st-Century Insurgents

  • ISBN13:


  • ISBN10:


  • Format: Paperback
  • Copyright: 2007-10-15
  • Publisher: Natl Book Network

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $23.00 Save up to $2.30
  • Rent Book $20.70
    Add to Cart Free Shipping


Supplemental Materials

What is included with this book?


Libicki et al. argue that information collection requirements and systems for counterinsurgency are important because the community that conducts counterinsurgency crosses national and institutional boundaries and because the indigenous population plays a large role in determining the outcome of an insurgency. They then demonstrate what this focus implies for counterinsurgency requirements, collection, networking, and systems design.

Table of Contents

Prefacep. iii
Figuresp. ix
Tablesp. xi
Summaryp. xiii
Acknowledgmentsp. xxxi
Abbreviationsp. xxxiii
Introductionp. 1
Why Information Superiority Matters in Counterinsurgencyp. 2
Getting to Information Superiority in Counterinsurgencyp. 7
Overviewp. 9
The Influence of User Requirementsp. 11
When the Population Is the Terrainp. 12
Security Operationsp. 13
Situational Awarenessp. 14
Winning Allegiancep. 15
Military Operations During Counterinsurgencyp. 16
The Registry-Censusp. 21
Categorizing the Informationp. 23
Personal and Social Informationp. 23
Systematic Incidents and Reportage Datap. 25
Buildings Data: The National CAD Modelp. 27
Getting the Informationp. 29
Information Reliability and Timelinessp. 31
Toward a National Identification System?p. 32
Registrationp. 33
Acquiring Identities at Checkpointsp. 36
Acquiring Identities Without Checkpointsp. 37
Conclusionsp. 40
A Well-Wired Countryp. 43
Systems Conceptp. 44
Encourage Cell Phone Usep. 45
Shape the Cell Phone Environmentp. 46
Associate Cell Phones with Registered Usersp. 48
Geolocate Cell Phones Periodically and as Neededp. 50
Using the System's Capabilitiesp. 51
Government Servicesp. 51
Eyes on the Streetp. 52
Actionable Intelligencep. 52
Other Usesp. 54
The Cell Phone Network as the Primary Counterinsurgency Communications Systemp. 55
Issuesp. 57
Secret Surveillance?p. 58
Insurgent Responsesp. 59
Lost or Stolen SIMsp. 62
Spoofing GPS Signalsp. 65
Commercial Considerationsp. 65
Follow-On Phasesp. 68
Avoiding a Permanent Police Statep. 70
A Note of Cautionp. 76
Conclusions and Implementationp. 77
Embedded Videop. 79
Basic Concept and Technical Issuesp. 81
Evasion Techniquesp. 83
Usesp. 84
Guidelinesp. 85
Video Made Publicp. 86
Conclusionsp. 87
A National Wikip. 89
Our Townp. 91
An Oral Wikip. 95
Attributionp. 98
Language Translationp. 99
Accuracy and Deceptionp. 100
A National Wiki as a Feedback Mechanism for Government Servicesp. 102
Conclusionsp. 104
The Principles of ICONp. 105
Emphasize User Primacy, Inclusiveness, and Integrationp. 107
Build ICON to Go Nativep. 113
Audit, Audit, Auditp. 117
Abnormal Usagep. 118
Taggantsp. 118
Honeypotsp. 119
Surveillancep. 119
Tune ICON to the Level of Insurgencyp. 120
Post Before Processp. 124
Establish a Standard Deck and Populate It from the National Wikip. 126
Rank Information by Reliability and Relevancep. 127
Results and a Caveatp. 129
Implications and Implementationp. 131
Summaryp. 133
Census and National ID Cardsp. 134
Cell Phonesp. 134
Embedded Videop. 135
National Wikip. 135
ICONp. 135
Governance, Accountability, and Public Expressionp. 136
Adapting Information Capabilities to the Scope and Locus of the Insurgencyp. 139
Implementationp. 141
Research and Development Needsp. 143
Conclusionp. 143
Disaggregated Information Requirementsp. 145
Bibliographyp. 157
Table of Contents provided by Ingram. All Rights Reserved.

Rewards Program

Write a Review