zenpundit.com » IO

Archive for the ‘IO’ Category

Following the Online Breadcrumb Trail…..

Wednesday, August 27th, 2008

Check out Fabius Maximus on the “books vs. internet” debate with an older set of posts The Internet makes us dumber: the Bakken euphoria, a case study and Euphoria about the Bakken Formation.

and

Selil Blog where Professor Sam has done some cyberwar theorizing “From Information operations to cyber warfare and a new terrain”

Information Operations Uber-Post

Wednesday, August 6th, 2008

Matt Armstrong has a must-read analytical, IO piece up at CTLab Review:

New Media and Persuasion, Mobilization, and Facilitation

…New Media is more than 24/7 news cycles. It is the ability to create trusted peer relationships, or the appearance of, to create legitimacy of information as well as depth and breadth of acceptance. This can be done as traditional media or other new media outlets pick up on a bit of “news” for redistribution, giving the impression of validity as the sources go up from one to many, often in excess of the three needed to create a “fact.” It is easier to see you’re not alone in the New Media environment, something that was not possible with radios and film (unless you risked gathering as a group).

There are several defining characteristics of the new media environment. The obvious are hyperconnectivity, persistence of information, inexpensive reach, and dislocation with speaker and listener virtually close but geographically distant. New Media also democraticizes information in the sense that hierarchies are bypassed, permitting both direct access to policy and decision makers and the possibility of “15-minutes of fame” (if even only one minute or less) to everyone. Information can be created and consumed by everyone regardless of “eliteness,” CV, and at minimal cost to any party.

All true and well said. Matt however points to a seldom recognized but critical variable here:

To the insurgent and terrorist, New Media’s capacity to amplify and increase the velocity of an issue that is critical. They increasingly rely on the Internet’s ability to share multiple kinds of media quickly and persistently to permit retrieval across time zones around the world from computers or cell phones. The value is the ability to not just persuade an audience to support their action, but to mobilize their support and to facilitate their will to act on behalf of the group (or not to act on behalf of another group, such as the counterinsurgent).

Velocity is very important in many senses. An accelerating message tempo heightens the sense of crisis in the mind of the audience so long as it does not move so quickly as to slide into unfiltered “noise”. Control of velocity also permits the exploitation of “information lag” in slower moving hierarchies or audiences. Finally, this velocity is really “alinear”; the ability of new media tools to “mash-up” entirely unrelated events separated by time, distance and circumstance and synthesize them out of context permits the scoring of tactical propaganda victories.

Read all of Matt’s post here.

The Wizard goes to the Mountain(Runner)

Sunday, July 27th, 2008

Shane Deichman leaves his usual perch at Wizards of Oz for a special guest post at Matt Armstrong’s excellent public diplomacy and IO blog MountainRunner:

Openness & Government: a guest post by Shane Deichman

….In the early 1960s, President Kennedy charged his Science Advisory Committee (chaired by Dr. Jerome Wiesner, Special Assistant to the President on Science and Technology) to charter a panel to review federal information management policies and practices. The “Panel on Science Information” was chaired by Dr. Alvin M. Weinberg, Director of Oak Ridge National Lab (ORNL). ORNL is the site of the world’s first operational nuclear reactor (the Graphite Reactor, where the “pile” from the University of Chicago was moved during World War II to validate the “breeder reactor” concept) and a key national laboratory.

….NASA and the Atomic Energy Commission were acknowledged by Dr. Weinberg as excelling in this area, interpreting their responsibilities quite broadly, and being proactive in providing full-fledged information services (not just a “document repository”) for enabling access to information. The AEC’s culture of openly sharing information is still evident today in the Department of Energy’s “Office of Scientific and Technical Information” (OSTI) in Oak Ridge – the nation’s central repository of scientific information stored in easily searchable databases (including Science.gov, ScienceAccelerator.gov and WorldWideScience.org). [BTW: OSTI is located on the first street in the nation named after a website, “Science.Gov Way”, in Oak Ridge, Tennessee.]

At the other extreme, the Department of Defense was singled out in the Weinberg Report for having an information agency (Armed Services Technical Information Agency [ASTIA], predecessor of today’s Defense Technical Information Center [DTIC]) that only handled internal reports and internal information retrieval requests.

Read the rest here.

Special note: Matt Armstrong writes:

In the spirit of engaging and informing the American public of what the government does and why, Shane Deichman of Wizard of Oz and deep thinker on S&T sent along this post on Openness & Government. He is also the blogger increasingly pictured drinking with fellow bloggers.

So true, so true. 🙂

Going to Cyberwar with the Army You Have….

Tuesday, July 22nd, 2008

This is hilarious. From David Axe writing for Danger Room:

Army Blogging = Horror Story Waiting to Happen?

….While some soldiers’ blogs may be questionable, they are the ones who understand the Internet and the power it has. … Turning loose senior Army officials who do not understand the impact of the Internet is a treasure trove for those who mean us harm!

I am a consultant to a major Army command that supplies soldiers with everything they need — and the command with one of the biggest IT footprints in the Army, if not the [entire] Department of Defense. I have seen first-hand what havoc those in positions of authority can wreak when they post on the Internet, or attempt to use technology without understanding it. Information on troop movements, supply levels, diagrams of weapons systems, chemical munitions, you name it, has been posted to the likes of YouTube and Flickr, and hosted on unprotected and unsecured .COMs. All in a misguided attempt to look “hip” or “cool” or “net savvy.” …

Give a senior service official a BlackBerry and I can guarantee he will transmit sensitive and sometimes classified information on it without thinking. He will use the Bluetooth headset and the built-in phone to talk about sensitive topics without a care in the world as to who is listening. I have lost count of how many times we have had to collect all of the BlackBerries we issue and purge them due to sensitive or classified information being sent on them. The BlackBerry is one of the greatest weapons system in the terrorists’ inventory, and we supply the bullets!

Nerds of Jihad and the Virtual Worlds Evolution

Tuesday, July 1st, 2008

Tim Stevens of Ubiwar had a very intriguing post Thoughts on Countering Online Radicalisation that deals with Islamist “cyberterrorism”  but also the evolution and state of online life and the challenges these pose to CI, CT and law enforcement . You should go read it in full because I am going to comment upon particular snippets:

Terrorists know their actions are reported instantaneously through a multitude of television channels, radio stations, websites, blogs and newsgroups. If the effectiveness of a violent act relies on being able to broadcast it as swiftly as possible to as many people as possible, then the contemporary global communications environment is as near perfect a tool as has yet been invented.

The media environment is at saturation point for “early adapter” elite Westerners by the saturation is fractured. A good visual analogy of the total media picture would be the social media “ripple effect” diagram by David Armano  – including all forms of media would greatly increase the complexity by orders of magnitude but the logic of the effect would remain the same ( the memetic velocity of each form of media differs but they all interact nonetheless). The message of Islamist terrorism like any other meme in a highly competitive, complex adaptive media system must follow the rules of an attention economy or languish to little effect. There must be psychological “hooks” in the message and content, delivery and the multiplicity of audiences must be considered strategically.

Reams of newsprint, untold hours of televisual hyperbole and a thousand academic articles have been expended on this subject, but it remains of critical importance. How do we adjust our Western liberal mores to account for the fact that every violent sub- or non-state actor knows the internet is a tool and, like ‘us’, knows how to use it? The time has long passed when we should be surprised by this, although articles crop up regularly in provincial newspapers and magazines, and occasionally in national dailies, somehow expressing surprise that terrorists use the internet for their own ends, and that something-must-be-done. We wrestle with the First Amendment, the spectre of censorship looms, militaries worry about operational security, and politicians tack with the prevailing wind, dispensing legislation and initiatives like sticking plasters in a bucket of razor blades.

But what is the fuss all about? Do commentators on the subject actually know what happens on the internet? The videos of IEDs in Iraq, or of Juba the Baghdad Sniper, or viral 9/11 videos, might just be the thin end of the wedge. Terrorists and insurgents leverage the tools of new media to broadcast violent propaganda, but why? What lies beneath?

The substrate below the spectacular image factory is a world that most readers of this blog well recognise. Websites, blogs, chatrooms, social networking sites, discussion fora, mailing lists, internet relay chat, massively multiplayer online role-playing games, virtual worlds, email, instant messaging, video sharing, file sharing, torrenting, and a host of other spaces where people – fundamentally – interact.

At this point here it would be profitable for non-geeks and enjoyable for the geeks to detour to Metaverse Roadmap Overview to get a better look at the part of the iceberg of the future that will be beneath the surface of the water. The cognitive power of games should not be underestimated as a learning modality or community-building tool. Virtuality tools drastically lower the transaction costs and risk for experimenting with challenging the social contract and these tools are in the hands of far more more socially alienated people than ever before, not merely unemployed, hiphop listening, Islamist wannabes in Marseilles unhappy with French public housing. The next generation of Ted Kacyznskis might be a superempowered scale free network like “Anonymous“.

Comprehension is critical. All movements congregate around a message, a coherent narrative understood by all, a rallying cry. Extremist propaganda serves this function, and discriminates amongst different audiences. In the court of international public opinion it aims to create either fear or a broad sense of sympathy. When aimed at the enemy, whether military or civilian, the intention is to create fear and uncertainty, and to undermine morale. Different emphases can be placed on the message distributed to extant supporters of an extremist organisation – corroboration, encouragement, reinforcement, righteousness. The fourth audience is the population in whose interest extremists claim to act. Propaganda mobilises public support, constructs bottom-up legitimacy, and affirms credibility through action. Within this population lies the most important group of all: the next generation of extremists.

What would John Boyd have said here ?

“Shape or influence events so that we not only amplify our spirit and strength (while isolating our adversaries and undermining their resolve and drive) but also influence the uncommitted or potential adversaries so that they are drawn toward our philosophy and are empathetic toward our success. – Patterns of Conflict

I would also add that the potential radical online is also drawn in by the same psychological process that occurs with cults – acceptance, affirmation of identity, certainty, an emotive connection that is continually reinforced and provides a neurophysical stimulus. A good book to pick up here would be Eric Hoffer’s classic The True Believer: Thoughts on the Nature of Mass Movements (Perennial Classics). The mad gleam in the eye of the ranting Islamist has been seen before in SS diehards, Maoist Red Guards, anarchists of the 19th century People’s Will and innumerable others.

Extremism itself is not the problem and nor is radical thinking, but violence against innocent individuals – becoming ‘kinetic’ in military parlance – is not acceptable in modern liberal society. Although its role is sometimes overstated online radicalisation is very real. It cannot be viewed in isolation from the societies in which it occurs but there are targeted approaches available to mitigate its worst excesses. Testimonies of violent extremists of every ilk highlight the role of the internet in radicalisation, either of themselves or of others, and we are obliged to pay attention.

Prior to the 1960’s, liberal societies and liberals themselves did not have problems accepting the fact that the open society had blood enemies and treating them as such. Liberals volunteered to go to Spain to fight fascism and were enthusiastic advocates for the crusade to destroy Nazism in WWII. Social Democrats and trade unionists fought to kick Stalinists out of unions and democratic-Left organizations and so on.  They had a moral center and argued for a “vital center” against extremism, at home or abroad.

Unfortunately, ever since the Vietnam War, liberals have been unable to effectively answer the anti-Western, anti-democratic, illiberal critique posed by New Left radicals, deconstructionists, multiculturalists, gender feminists and various forms of au courant intellectual nihilism. Instead, the democratic Left have accepted the undemocratic extremists as political allies in good standing against the Right, are loath to criticize them and implicitly accepted the moral legitimacy of their crypto-Marxist jeremiad, if not their policy recommendations or often inane political advice. While a general cultural trend, this effect is most acute in the baby boom generation, particularly the ’68’ers and New Right oponents who are at their zenith of systemic responsibility as managing editors, CEO’s, political leaders, intellectuals and bureaucrats.

 A generation still torn by the cultural civil war of their youth make ineffective defenders of a civilization. “The Long War” will be long in part because our leadership is badly divided and on occasion, blind and grossly incompetent.


Switch to our mobile site