zenpundit.com » intelligence

Archive for the ‘intelligence’ Category

A Multi-Disciplinary Approach?: Coerr’s The Eagle and the Bear Outline

Thursday, October 20th, 2011

Here is something for the learned readership to chew on.

As you are probably all aware, in the hard sciences it is common for research papers to be the product of large, multidiciplinary, teams with, for example, biochemists working with physicists, geneticists, bioinformatics experts, mathematicians and so on. In the social sciences and humanities, not so much. Traditional disciplinary boundaries and methodological conservatism often prevail or are even frequently the subject of heated disputes when someone begins to test the limits of academic culture

I’m not sure why this has to be so for any of us not punching the clock in an ivory tower.

The organizer of the Boyd & Beyond II Conference, Stan Coerr, a GS-15 Marine Corps, Colonel Marine Corps Reserve and Iraq combat veteran, several years ago, developed a very intriguing analytical outline of thirty years of Afghan War, which I recommend that you take a look at:

The Eagle and the Bear: First World Armies in Fourth World Insurgencies by Stan Coerr

the-eagle-and-the-bear-11.pdf

There are many potential verges for collaboration in this outline – by my count, useful insights can be drawn by from the following fields:

Military History
Strategic Studies
Security Studies
COIN Theory
Operational Design
Diplomatic History
Soviet Studies
Intelligence History
International Relations
Anthropology
Ethnography
Area Studies
Islamic Studies
Economics
Geopolitics
Military Geography
Network Theory

I’m sure that I have missed a few.

It would be interesting to crowdsource this doc a little and get a discussion started. Before I go off on a riff about our unlamented Soviet friends, take a look and opine on any section or the whole in the comments section.

More on Boyd & Beyond II and Boydian Theory

Wednesday, October 19th, 2011

Two posts of note:

USNI Blog (Lucien Gauthier) – Training Sailors to be Autodidactic

….The conference spent a lot of time on the first half of the OODA-Loop, Observing and Orienting.  At some point I became convinced that the type of Sailor we need is one that is a “situational autodidact”.  Major Marcus Mainz, USMC, during his presentation made the brilliant comment that “training is for the known, education is for the unknown” in this sense, the spirit in which we must educate our Sailors must be towards making them capable of educating their self as needed when the unknown presents itself to them.

….For Sailors to take greater advantage of their experiences, they need to actively question their actions.  By this, I mean that a person analyses a question more than they do a statement.  But, it has been my experience that when someone recants an experience they had, it is a rare thing to hear someone say anything in terms of ‘why’ they did something.  Much more often someone only tells the ‘what’ of their actions.  Think of the Socratic Method, where Socrates would answer his students questions with another question.  A Sailor who has internalized such a ‘Socratic process’ would be in a position to provide more cogent feedback as well as learn from their mistakes more often than we do today.

What I am saying is not that the training we offer Sailors falls short of its objectives as they stand today.  But, that the spirit of the training is not where it needs to be-we focus our objectives too much on acting rather than orienting.  The training our Sailors receive are based on concrete and testable objectives that can be measured, quantified and turned into metrics, that fit well into powerpoint.  We do no help Sailors to become autodidactic-we are not training them to become students of their environment, but rather students of their school house.

We start to approach training Sailors to be autodidacts of their environment in the Operational Risk Management training we receive (One thing about ORM:  It is Boyd’s OODA-Loop operationalized.  The Navy has totally ripped off Boyd, and yet we never mention his name outside of the Warfare Universities-shame on us).  We need more and deeper training on ORM and how this method applies to everything we do, whether we consciously realize it or not.  In giving this deeper level or ORM, we should also find Sailors able to be more articulate of the process they’ve gone through.  Thereby becoming able to better train others of their experiences….

Naval affairs is not my bailwick, but my understanding of following online discussions by experts in the field like General Robert Scales, is that Professional Military Education across all the services is a) in need of significant reform and b) is facing a future of restricted budgets and possible deep cuts. My only firsthand knowledge of PME comes from a brief stint in June at The Army War College, courtesy of Dr. Steve Metz. The AWC curriculum was explained to me in detail by Col. Bill Lord, and while they were hitting the right notes in terms of trying to inculcate a strategic epistemology, the time frame allowed for doing so is extremely compressed.

Fast TransientsBoyd’s Conceptual Spiral – New Edition

This is from Dr. Chet Richards as well as Chuck Spinney….

Download Conceptual Spiral (152 KB PDF), Boyd’s take on the origin and importance of novelty:

Novelty is not only produced by the practice of science/engineering and the pursuit of technology, it is also produced by the forces of nature, by our own thinking and doing as well as by others. Furthermore, novelty is produced continuously, if somewhat erratically or haphazardly. Now, in order to thrive and grow in such a world, we must match our thinking and doing, hence our orientation, with that emerging novelty. (28)

Adds the original page numbers, which may seem a little odd because for readability this edition spreads several of Boyd’s originals over two or even three pages.  All of these will have the same number.

We are wired to crave and be attracted to novelty, it sets us thinking and generates insights and stimulates our creativity.

Stay hungry, stay foolish

Thursday, October 6th, 2011

[ Steve Jobs obit — posted by CC]
.
attachmentphp.jpg

Steve Jobs, February 24, 1955 – October 5, 2011

Remembering that I’ll be dead soon is the most important tool I’ve ever encountered to help me make the big choices in life. Because almost everything — all external expectations, all pride, all fear of embarrassment or failure – these things just fall away in the face of death, leaving only what is truly important. Remembering that you are going to die is the best way I know to avoid the trap of thinking you have something to lose. You are already naked. There is no reason not to follow your heart.

— from Steve JobsCommencement Address at Stanford University, June 2005

Mapping our interdependencies and vulnerabilities [with a glance at Y2K]

Wednesday, September 28th, 2011

[ by Charles Cameron — mapping, silos, Y2K, 9/11, rumors, wars, Boeing 747s, Diebold voting machines, vulnerabilities, dependencies ]


www.fun1001.com | Send this image to your friend

The “bug” of Y2K never quite measured up to the 1919 influenza bug in terms of devastating effect — but as TPM Barnett wrote in The Pentagon’s New Map:

Whether Y2K turned out to be nothing or a complete disaster was less important, research-wise, than the thinking we pursued as we tried to imagine – in advance – what a terrible shock to the system would do to the United States and the world in this day and age.

1.

My own personal preoccupations during the run-up to Y2K had to do with cults, militias and terrorists — any one of which might have tried for a spectacle.

As it turned out, though, Al Qaida’s plan to set off a bomb at Los Angeles International Airport on New Year’s Eve, 1999 was foiled when Albert Ressam was arrested attempting to enter the US from Canada — so that aspect of what might have happened during the roll-over was essentially postponed until September 11, 2001. And the leaders of the Ugandan Movement for the Restoration of the Ten Commandments of God, acting on visionary instructions (allegedly) from the Virgin Mary, announced that the end of the world had been postponed from Dec 31 / Jan 1 till March 17 — at which point they burned 500 of their members to death in their locked church. So that apocalyptic possibility, too, was temporarily averted.

2.

Don Beck of the National Values Center / The Spiral Dynamics Group, commented to me at one point in the run-up:

Y2K is like a lightening bolt: when it strikes and lights up the sky, we will see the contours of our social systems.

— and that quote from Beck, along with Barnett’s observation, pointed strongly to the fact that we don’t have anything remotely resembling a decent global map of interdependencies and vulnerabilities.

What we have instead is a PERT chart for this or that, Markov diagrams, social network maps, railroad maps and timetables… oodles and oodles of smaller pieces of the puzzle of past, present and future… each with its own symbol system and limited scope. Our mapping, in other words, is territorialized, siloed, and disconnected, while the world system which is integral to our being and survival is connected, indeed, seamlessly interwoven.

I’ve suggested before now that our mapping needs to pass across the Cartesian divide from the objective to the subjective, from materiel to morale, from the quantitative to the qualitative, and from rumors to wars. It also needs a uniform language or translation service, so that Jay Forrester system dynamic models can “talk” with PERT and Markov and the rest, Bucky Fuller‘s World Game included.

I suppose some of all this is ongoing, somewhere behind impenetrable curtains, but I wonder how much.

3.

In the meantime, and working from open source materials, the only kind to which I have access – here are two data points we might have noted a litle earlier, if we had decent interdependency and vulnerability mapping:

quo-vulnerabilities.gif

Fear-mongering — or significant alerts?  I’m not tech savvy enough to know.

4.

Tom Barnett’s point about “the thinking we pursued as we tried to imagine – in advance – what a terrible shock to the system would do to the United States and the world in this day and age” still stands.

Y2K was what first alerted me to the significance of SCADAs.

Something very like what Y2K might have been seems to be unfolding — but slowly, slowly.

Are we thinking yet?

Down the rabbit hole: researching the “jikhad”

Thursday, September 22nd, 2011

[ by Charles Cameron — cross-posted from Chicago Boyz – a meander on the perils and promise of research, jihad, typos, books and more ]
.
It begins with an email from Lexington Green saying I might be interested in a tweet he had posted earlier this morning:

The Insurance Journal tells us:

Defendants named in the complaint were Kingdom of Saudi Arabia, The Saudi High Commission for Relief of Bosnia & Herzegovina, Saudi Joint Relief Committee for Kosovo and Chechnya, Saudi Red Crescent Society, National Commercial Bank, Al Rajhi Banking and Investment Company. Also included as defendants are three Saudi citizens connected to these organizations, Prince Salman Bin Abdul Aziz Al Saud, Suleiman Abdel Aziz Al Saud and Yassin Al Qadi.

The case is Underwriting Members of Lloyd’s Syndicate 3500 v. Kingdom of Saudi Arabia, 11-00202, U.S. District Court, Western District of Pennsylvania.

Okay, I’m curious. I go to the complaint [.pdf] and start reading… and on page 9, I find:

That’s interesting. A DIA report, better look that up. But there’s no reference provided…

So I googled for “latent penetration” NEI which sent me back to versions of the court filing, and then for “latent penetration” and found that Robert W. Schaefer on p. 166 of his book, The Insurgency in Chechnya and the North Caucasus: From Gazavat to Jihad, quotes [with minor variations] from what is obviously the same DIA document and in footnote 29, p 165 identifies it as “Declassified DIA intelligence report NC 3095345, October 16, 1998, 3 (obtained through the Freedom of Information Act).”

Onwards to locate NC 3095345, which can be found here [.pdf] and contains the following relevant text on p. 3:

So that’s the source of the description of AQ’s overall plan in the Lloyds complaint.

But what’s “latent penetration”? The DIA document even has it in quote marks – does that make it a technical term?

Back to Google.

The FBI uses the term “latent penetration” – maybe I’m onto something! In their Electronic Biometric Transmission Specification (EBTS) [.pdf] on p. 58 they offer the “following list of TOTs is applicable to latent friction ridge searches transmitted to the FBI”:

fbi-latent-prints.gif

I have to admit – a Latent Penetration Query sounds like just the thing I’m after – but the FBI appears to think of “latent penetration” in terms of fingerprints…

Okay, next up. A quick look at David Waterman and Andrew A. Weiss‘ book, Vertical Integration in Cable Television, (AEI, 1997) tells us:

latent-penetration-in-cable-television.gif

That’s all a bit above my head, and in any case I don’t watch cable TV… and the networks in question aren’t terrorist networks, they’re cable networks…

When I add the word “terror” into my search, however, I get directed to Prof. Kostogryzov Andrey‘s paper [.ppt] addressing the question of a “methodical approach for the evaluation of systems vulnerability in conditions of terrorist threats” for a symposium at the University of Texas, Arlington – which sounds promising.

Searching the good professor’s powerpoint for “latent penetration” takes me to slide 36, however, where I read:

symposium-slide-36.gif

To be honest with you, I don’t feel any closer to understanding “latent penetration” beyond a sort of general “potentially getting inside the opposition” kind of sense.

So let’s get back to NEI – which is what the Lloyds transcription has in parens immediately after the quote-marked phrase “latent penetration” – what’s that about?

Well, on closer examination, it looks as though Lloyds got that wrong, and the DIA document — compare their E’s and F’s in the typed excerpt above and I think you’ll agree — actually says NFI…

Phew! NFI.

What’s that?

The DIA probably classifies its acronyms, but this particular document has been declassified and NFI hasn’t been redacted, so perhaps the Free Dictionary acronym finder will be able to help…

I quickly dismiss such possibilities as National Fatherhood Initiative and get down to my three basic possibilities:

NFI … No Further Information (available)
NFI … National Foreign Intelligence
NFI … No Freaking Idea

The last of these describes my own feelings at this point, although “freaking” would be the milder way to put it. So it’s down to guesswork: I’ll go with #2.

Okay: according to this particular DIA report, AQ “seeks to establish a worldwide Islamic state” by means that include “latent penetration” — I still have only the vaguest idea [OTVI] what that means — and “control over nuclear and biological weapons (Jikhad)”.

Jikhad?

The DIA docu self-describes thus:

dia-self-descript.gif

Variant spellings, okay…

But I’m wondering if “Jikhad” is one of them…

Back to the search engines, where I discover the word does have prior art in a terrorist – indeed, a specifically AQ — context, to wit:

jikhad-book-cover-med.jpg

$149.95, call it $150 on Amazon, and available for free shipping

Well, you can’t judge a book title by its cover, so I have an inquiry in to the good folks at the University of Calgary library, which has a copy – but I’m guessing “Jikhad” is a typo in both cases, aren’t you?

*

And what grand purpose does all this serve?

None, you may think – the complaint has been withdrawn, as Lex tells us, “without prejudice” – so the issue is, if I may use a legal term despite the fact that IANAL, “moot”.

Unless one is interested in the prices of books these days, or the frequency of spelling vagaries on their printed covers, or possible Arabic words bearing on terrorism that one hasn’t run across previously, or fingerprints, or the reliability of a document of which LTC Schaefer notes (p. 165, n 29):

It is important to note that no evaluation of the information detailed in the report is included in the declassified version; and anyone who deals with intelligence will tell you that text without context is pretext. It is entirely possible that this document was passed to U.S. Intelligence by the Russians in order to bolster the evidence linking the Chechens with Al Qaeda.

On second thoughts, we can learn something here about care in reading sources – about the transmission errors that commonly crop up when texts are translated or transmitted – and about the importance of context.

Text without context is pretext.

That whole paragraph of LTC Schaefer’s is worth the price of admission.


Switch to our mobile site