You are on page 1of 61

Revolution In Military Aairs - 1990 up to the present

Transformation of world society and state through worldwide military revolution

NetCentricTruther
Keywords: Revolution In Military Aairs, Net-Centric Warfare, Net-Centric Operations, Weapons Of Mass Eect, Eects-Based Operations, Sense-and-Respond, Cooperative Engagement Capability, Sensor Grid, Information Grid, Engagement Grid, Global Information Grid, Ubiquitous Computing, Smart Grid, Information Warfare, C4ISR, C2, Andrew Marshall, Oce Of Net Assessment, John Boyd, Donald Rumsfeld, Arthur K. Cebrowski, Thomas M. Barnett, Alvin Toer, Michel Foucault, Gilles Deleuze, Conict Short Of War, Military Operations Other Than War, Noncombatant Evacuation Operations, Panopticon, Social Networking, Oce Of Force Transformation, Blue Force Tracking, Data Mining, Zbigniew Brzezinski, Smart Meter, Full Spectrum Dominance, Cybersecurity, Energy Eciency, PositiveID, Radio Frequency Identication (RF ID), Asymmetrical Warfare, Asymmetric Threat, Counterinsurgency, Precision Engagement, Force Multiplier, Cognitive Capacity, Carbon Credits, Psychological Operations, Dataveillance

Abstract Notice: Personal opinion has been withheld as much as possible. All of the claims within this document have been documented and sourced. As little as possible is left to the authors own interpretation of the facts.

Contents
1 Synopsis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

Transition to the 21st century 2 From the industrial age to 2.1 Alvin Toer . . . . . . . . 2.2 Andrew Marshall . . . . . 2.3 Samuel Huntington . . . . 2.4 Other noteworthy writers

the . . . . . . . .

information . . . . . . . . . . . . . . . . . . . . . . . . . . . .

age . . . . . . . . . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

. . . . .

3 5 5 6 8 8

II

Revolution In Military Aairs / Conict Short Of War 3 Network-Centric Warfare . . . . . . . . . . . . . . . . 3.1 Information/Sensor/Engagement Grid . . . . . . . . . 3.2 Sense & Respond (S&R) . . . . . . . . . . . . . . . . . 3.2.0.1 Example . . . . . . . . . . . . . . . . 3.3 Eects-Based Operations / Shock And Awe . . . . . . 3.3.1 Shock And Awe . . . . . . . . . . . . . . . . . . 3.3.2 Observe, Orient, Decide and Act - OODA Loop 3.3.3 Cooperative Engagement Capability (CEC) . .

. . . . . . . .

. . . . . . . .

. . . . . . . .

. . . . . . . .

. . . . . . . .

. . . . . . . .

. . . . . . . .

. . . . . . . .

. . . . . . . .

9 9 10 12 13 15 16 18 19

III

Implementation of the RMA 3.4 9/10/2001 - War on Pentagon Bureaucracy . . . . . . . . . . 4 Privatization of the intelligence agencies/military contractors 4.1 In-Q-Tel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.2 Blackwater USA/Blackwater Worldwide/Xe . . . . . . . . . . 4.3 Keyhole . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Rollout of the Global Information Grid . . . . . . . . . . . . 5.1 The role of IPv6 within the GiG . . . . . . . . . . . . . . . . 5.2 The adversary and the archetype . . . . . . . . . . . . . . . . 5.2.1 Asymmetric threat . . . . . . . . . . . . . . . . . . . . 5.2.1.1 Data mining/clusters/social networks . . . . 5.2.1.1.1 Social Networking . . . . . . . . . . 5.2.1.1.2 Datamining . . . . . . . . . . . . . . 5.2.1.1.3 Threat inference . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

. . . . . . . . . . . . .

19 22 24 24 26 26 27 28 29 30 31 32 33 35

IV

The result of the ongoing Revolution in Military Aairs 6 Private sector in the information age enabled by the RMA . . . . . . . 6.1 Governing of intellectual ideas - and rights pertaining to these ideas 6.2 Utilisation of the Sensor/Information Grid by the private Sector . . .

35 40 40 41

Next step for the RMA - Transhumanism/Singularity 7 Utopia . . . . . . . . . . . . . . . . . . . . . . . 7.1 Example . . . . . . . . . . . . . . . . . . . . . . 8 Dystopia . . . . . . . . . . . . . . . . . . . . . . 9 Start of transhumanism (Application within the

. . . . . . . . . . . . . . . RMA) .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

41 43 44 44 45

VI

Evil in the RMA 10 Dehumanization . . . . . . . . . . . . . . . . . . . . . . . 10.1 Dehumanization of war . . . . . . . . . . . . . . . . . . . . 10.2 Dehumanization of the person . . . . . . . . . . . . . . . . 10.3 Dehumanization of surveillance and intelligence gathering

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

. . . .

45 50 50 51 53

VII

Explanation of concepts 11 Acronyms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

54 55

1 Synopsis

VIII References Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

55 59

Synopsis
The Global Information Grid and the Internet of Things are computer network-related and are completely dependent on IPv6 as the underlying protocol. The Internet of Things will engulf the entire Planet - a so-called Object Naming Service will take on the role of DNS-server so that all these things can be identied by uniquely addressable, human-comprehensible names. Network-centric warfare is codied by a three-layered network, consisting of a sensor grid, an information grid, and an engagement grid. Users access this network by way of C4ISR-systems (C4ISR stands for Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance - it is a military buzzword that can be accurately summarized as referring to a shared network where practically everybody within the Defense Department all communicate to each other with, allowing them to jointly execute and co-ordinate missions. The biggest dierence between earlier iterations of the same systems - C2, C3I - is the central role that computers now play within that systematic process) Almost all of the technology that is being purpose-made for the Revolution In Military Aairs is being spearheaded by ongoing technological developments within the ICT private sector - sense and respond at the same time allows for a new supply chain for both business aairs as well as those of war. A precedent can be found in the utilization of Operations Research and Game Theory in general - Operations Research was a shared doctrine between the Allied Forces during World War II before being widely adopted as a business doctrine worldwide. The Revolution in Military Aairs is inextricably linked to the ongoing transition to the information age. The information age is driven rst and foremost by computers - content and information is now king, and this, it is argued, will change the entire fabric and social stratication of society.

1 Synopsis

Fig. 1: "Screenshot courtesy of the presentation - "Data Fusion in Tomorrows Network-Centric Warfare"[26] - a comparison is made between a digital immigrant and a digital native. Everyone born before 1985 is for all intents and purposes classied as an old world fossil according to Fred Stein of MITRE Corporation. This is because he has not grown up within a net-centric environment, meaning - he was not raised in a world where ones rst source of information is Google instead of visiting your local library - he has not been raised on videogames - he does not communicate in chat language and therefore can not communicate rapidly by SMS or phone, etcetera."

Part I. Transition to the 21st century


2 From the industrial age to the information age
Since the early 70s, various futurists have lauded the coming of a great societal shift arriving at the beginning of the 21st century. The current society would be completely transformed - from an industrial age to an information age. At the same time, Russian military strategists speculated on the additional possibilities provided by the information age to the Defense department. This became known as a Revolution In Military Aairs). Below is a summary of some of the most prolic authors that came up with the current framework of the Revolution in Military Aairs.

2.1

Alvin Toer

Alvin Toer is one of the most prominent futurists - RMA-evangelists have long regarded him as a lone voice in the wilderness, and as a cheerleader for their cause. His books initially began as a rallying call to arms for a third wave - this is a term coined by Alvin Toer that refers to a third-wave society, To give a short summary: 1. First Wave - The agrarian age that replaced the previous hunter-gatherer society. 2. Second Wave - The industrial age that replaced the agrarian age. Power was now centralized in the hands of the companies with nance capital to back them up instead of plantation owners. This coincided with a major relocation to the major cities. 3. Third Wave - The ongoing third wave that intends to replace the industrial age. This third wave is characterized by rapid, continuous change continual habituation to the new norms and an information-centric economy that wont really sell real tangible products as much as it sells information-based services and intangible products. For instance, consider the example of a mobile communications provider such as Vodafone - the product that is being sold is not so much the mobile phone unit, but the ability to communicate with each other worldwide for a certain agreed-upon price. This ability (or rather service) is not in the hands of the individual user, but in the hands of the provider - and can be revoked or its terms of conditions changed at any given time. The rst books penned by Toer were rather optimistic in tone and rather incredulous in terms of the claims and predictions being made. This rapidly made way in the 90 for more militaristic follow-up books that laid the emphasis on the revolution in military aairs that would actually bring the information age into being.

2 From the industrial age to the information age

His most noteworthy book is his bestseller from 1970, entitled Future Shock[29]. The titular shock from the book Future Shock refers to the shock eect that people experience when rapid changes are being wrought in their society. In the book, Toer proposes that the rapid pace at which these changes will be rammed through will bring Joe and Jane Average into a disillusioned state of aairs - suering from a Future Shock. On a related note, Information overload has today become a very real problem that was rst introduced in this book - the information age opens the oodgates to information in such a way that it can impair and empower the individual in equal measure, to the extent that those who cannot handle will far outweigh the ones that do. The book is actually more relevant today than it was back in the 70s - precisely because such terms as information overload are now easily recognizable and identiable in todays society - think of the Internet and the daily ood of e-mails, forums, news sites, dierences in opinions, rumors, controversies, scandals, and so forth.

2.2

Andrew Marshall

The 81-year old Andrew Marshall has earned the nickname Yoda within Pentagon defense circles - a reference to the wise Jedi Master by the same name in the Star Wars series. He is credited with laying the foundations for the American take on the Revolution in Military Aairs (which was originally an idea and concept originating from Soviet Russian military strategists). The Pentagon was very receptive to Marshalls long-term ideas and planning, to the extent that he nally reached the position of Director of the Oce of Net Assessment, a prime time Pentagon think tank. Marshall came up with his ideas for a Revolution in Military Aairs after sampling a number of scholarly papers written by high-ranking members of the military establishment in the Soviet Union. Prior to Marshall, practically nobody in the American defense department was talking about force modernization projected 20+ years into the future - Marshall regarded this as a sign of vulnerability that the Soviets would eventually exploit to their own ends. Operating under this dialectic (we have to do this because the Soviets are doing it as well), Marshall initiated an ever-increasing number of neophytes into the RMA believer-camp. A power struggle ensued between the RMA evangelicals and the moderate military hawks who were still licking their wounds from the mistakes learned during Vietnam and were hesitant to any talk of revolution and force transformation. They in part would serve as the ideological enemy/threat to the RMA agenda. It would take until 2001 for the RMA crowd to nally gain the upper hand in this clashing of ideologies . Some well-known individuals, such as Donald Rumsfeld, Dick Cheney and Paul Wolfowitz, are considered to be some of Marshalls most well-known protgs.

2 From the industrial age to the information age

Fig. 2: "Alvin Toers book Future Shock[29] concerns itself with a societal shift from the industrial age to the information age. This is the future shock alluded to in the title - this change will be so disruptive, and the pace of technological development will be so rapid, that large segments of the population will experience stress, mass disorientation, an increase in domestic violence and be engulfed in general crisis situations. While in this future shock, people will be suering from an aiction known as information overload - too much information can cause a detrimental eect in people by overloading ones cognitive senses, This is being taken advantage of from a psychological warfare perspective. 99 percent of modern-day wars is psychological and is waged with the distribution and control/denial of information."

2 From the industrial age to the information age

2.3

Samuel Huntington

Samuel Huntington is especially notable for his cosmological explanation behind terrorism in the 21st century. The Clash of Civilizations portends that in times of great change, civilizations with incompatible beliefs and rule sets will ght amongst each other. This hypothesis began as an editorial within the pages of Foreign Aairs12 entitled The Clash Of Civilizations?[18] (with specic emphasis on the question mark) before becoming a best-selling book.). War in the 21st century would be characterized by a number of conicts occurring between civilizations with incompatible rule sets and social norms. A few of the civilizations that Huntington highlighted as being potential troublemakers included: Judeo-Christian/Anglo-Saxon civilization Islamic civilization Hindu civilization Chinese civilization Japanese civilization

2.4

Other noteworthy writers


The conception of a control mechanism, giving the position of any element within an open environment at any given instant (whether animal in a reserve or human in a corporation, as with an electronic collar), is not necessarily one of science ction. Felix Guattari has imagined a city where one would be able to leave ones apartment, ones street, ones neighborhood, thanks to ones (dividual) electronic card that raises a given barrier; but the card could just as easily be rejected on a given day or between certain hours; what counts is not the barrier but the computer that tracks each persons position - licit or illicit - and eects a universal modulation. - Gilles Deleuze, Postscript On The Societies Of Control[11]

Gilles Deleuze (a disciple of Michel Foucault) was obviously acquainted with Foucaults critical perspective on Benthams panopticon, but preferred a different name for the up and coming Panopticon society: society of control. According to Deleuze, the society of discipline (his preferred term for the current system) was at the present date on its last legs and would rapidly whither
1 Foreign Aairs is the ocial bimonthly magazine by the Council On Foreign Relations, the institute that dictates foreign politics the government of the United States - it has sister institutes in Great-Britain and the European Union. 2 The European version is called the European Union Council On Foreign Relations; its British equivalent Royal Institute of International Aairs. It has a branch within every Commonwealth country; they were also being referred to as the round-table groups by Carrol Quigley in his book, Tragedy And Hope.

away and make room for a society of control. The primary modus operandi, as the name alludes, is control. How this diers from the pre-2001 western society is that previously, mere engendering of discipline and application of best-practice doctrines was enough to ensure good behavior - good in the sense that the individuals personal needs were subordinate to that of the common good, like having to fulll your role as a homo economicus to keep the current economic system aoat, paying your taxes to pay o the national debt, contributing to society (very ambiguous in nature but commonly employed as a slogan), and so on. In direct contrast to all of this, the society of control does not encourage discipline - it enforces compliance, and makes sure that your compliance is guaranteed. The stakeholders within this system (chief information ocers, corporate bureaucrats, social workers, defense establishment gures) no longer consider the concept of personal responsibility as being a crucial factor to maintaining a healthy and stable society, but rather, prefer a more conformist approach - good behavior, self-discipline is now quantied, and rational approaches exist (such as surveillance; questionnaires, data mining of forum posts/tweets/e-mails) to measure and determine individual and mass public behavior/opinion.Deleuze covered all of this in his postscript The Societies of Control, as well as alluding to the fact that in order for this to succeed, the unions had to be on board with this new society of control, lest they be classied as a potential threat to the new system.

Part II. Revolution In Military Aairs / Conict Short Of War


What, exactly, is a Revolution in Military Aairs ? These kind of revolutions take place at key junctures in world history, and change the fabric and the character of warfare forever. War is the primary means of instigating social change in societies3 . Examples of a Revolution in Military Aairs in past times include Blitzkrieg, Carrier Warfare (1921-1939), the Atom Bomb and the Manhattan Project (1941-1945), and the age of ICBMs (1955-1965).

Network-Centric Warfare
"Network-Centric Warfare. This RMA candidate was proposed by Vice Admiral Arthur K. Cebrowski and his colleagues in Joint Sta/J-6 (Cebrowski and Garstka, 1998). The network-centric war-

3 This as attested by Carroll Quigley in his book, Tragedy and Hope. (Carroll Quigley was a professor at Georgetown University that holds the distinction of being one of Bill Clintons mentors). In his book, he said of war on p831: Any war performs two rather contradictory services for the social context in which it occurs. On the one hand, it changes the minds of men, especially the defeated, about the factual power relationship between the combatants. And, on the other hand, it alters the factual situation itself, so that changes which in peacetime might have occurred over decades are brought about in a few years

3 Network-Centric Warfare

10

fare concept employs an operational architecture involving three grids to enable the operational objectives of JV2010 [Joint Vision 2010]: an "Information Grid", a "Sensor Grid" and an "Engagement Grid". The Information Grid provides the computing and communications backbone for the other two grids. The Sensor Grid is an assemblage of space, air, ground, sea, and cyberspace sensors and sensor tasking, processing, and fusing applications, providing battlespace awareness. The Engagement Grid, an asemblage of platforms and weapons, exploits this battlespace awareness to enable the JV2010 force employment objectives of precision engagement, dominant maneuver, and full-dimensional protection. Each of these three grids is connected and functions in a network fashion. - Past Revolutions, Future Transformations - What can the history of revolutions in military aairs tell us about transforming the US military?, Richard O. Hundley, RAND Corporation[17] Network-centricity is a concept that was coined by Sun Microsystems4 . It was later given a new lease on life by Admiral Arthur K. Cebrowski[7]. Cebrowski was promoted to the Director of Oce of Transformation under the leadership of then-Secretary of Defense Donald Rumsfeld. With this promotion, Cebrowski was given free reign to spearhead the post-9/11 force transformation, and reshape the armed forces along with it.

3.1

Information/Sensor/Engagement Grid

Network-Centric Warfare is a concept that can only be achieved by integrating three separate network layers. These three networks will subsequently be interconnected to each other over a wider network, such as the so-called Global Information Grid - more on that later on. Lets delve into these three networks rst. Keep in mind that these three overlapping and interconnecting layers are not only rolled out in war zones but in civilian areas as well. 1. Sensor grid The sensor grid is a network consisting primarily of ground sensors, RF ID transponders, and even cameras. The sensor, as the name would lead one to suspect, takes notice of certain events and actions (sensing). This sensor can be an optical one (such as a CCTV camera), an auditory sensor (for instance, a sensor that can perceive sounds above a certain decibel output and upon detection can emit a disrupting sound that will compel
4 Cebrowski talks about network-centric warfare to a reporter at a press conference, debating its origins [which she erroneously believes to be the US Navy]: However, the idea really comes from Sun Microsystems, when the president of Sun [Microsystems] talked about that its not the computer, but its the computer in the networked condition or the networked environment, its about network-centric computing - in other words, it is just a word which goes on the phenomenon of the Information Age.

3 Network-Centric Warfare

11

Fig. 3: Network-Centric Warfare is characterized by three overlapping networks. The blue-colored network is called the information network/grid, the red-colored network is called the sensor network/grid, and the greencolored network is referred to as the engagement grid/network. (For further clarication: the cameras on the streets and in malls form are part of a bigger sensor network, the WiFi access points in snackbars and your local Starbucks form part of a bigger information network/grid, and the engagement grid/network is in part enabled by these two aforementioned networks - and the principal actors in this engagement grid are the Unmanned Aerial Vehicles (UAVs) and other robotic vehicles that are now starting to be deployed in western cities by law enforcement.

3 Network-Centric Warfare

12

an assembly of noisy teenagers to ee a certain area), or a motion sensor. Within Network-Centric Warfare doctrine, the sensor is regarded as an information supplier and creator - based upon what the sensor can perceive, information is being produced and uploaded to the information grid that could be of use in its unltered state to any one of the interconnected users on the wider grid. 2. Information grid We previously established that the sensor grid is mostly concerned with everything that can be sensed, perceived and/or detected (aurally/visually). Once an event has been triggered (by way of the sensor having picked up something - such as a certain person entering a building, or an enemy entering a demilitarized zone), the sensor will broadcast a notication of that event to the information network so that other devices and users are able to learn of this new event occurring in real-time. All information that is being dispersed from sensors, and the entire ow of information between users in the network-centric environment all propagates throughout this information grid. In this sense, the sensor grid could not sustain itself without the information grid. But the dependency is mutual on both sides - an information grid would be useless without sensors spreading their information/broadcasts/sensed events over the information network. 3. Engagement grid Lastly there is the engagement grid. The engagement grid is on occasion likened to the executable layer within Network-Centric Warfare - because it is within this grid that the actual transaction occurs, whether that transaction entails death for the enemy that was just perceived by one of the sensors, or an information assault on the hapless individual that was just sensed by a commercial companys sensor grid at a shopping mall. op basis van het sensor netwerk die een evenement heeft gedetecteerd en het informatie netwerk waarover alle onderlinge communicatie tussen soldaten, machines en vliegtuigen plaatsvindt, is er ook een derde soort netwerk dat men in staat stelt om iets te doen aan dit evenement wat zojuist is opgetreden.

3.2

Sense & Respond (S&R)


RF ID could disrupt the way we think about things by doing much of the thinking for us. The technology is helping create a "sense-andresponse supply chain," says Paul - GovernmentExecutive.com, An Internet of Things[15]

Network-Centric Warfare / Network-Centric Operations allows for a new supply chain that will revolutionize the way business and war is conducted. Without an information network that uses sensors as the basic building block to feed

3 Network-Centric Warfare

13

audiovisual temporal input into the wider information ow, this new supply chain would be impossible to achieve. What Sense & Respond (S&R) basically entails is this - based upon an incident that has been perceived by a sensor, an event is broadcasted onto the wider interconnected network. In case some unit on the wider network perceives this event to be of strategic importance, a suitable reaction can be planned and coordinated instantaneously - this is what is understood as the so-called respond end of the supply chain cycle. To put this within the context of pre-existing communicative concepts, think of B.F. Skinners stimulus-response theory, and add to that a relationship between a machine/process and an organic subject, such as an individual or groups of people5 . Once arrived onto the scene of the sensed event, the UAV, by way of its built-in camera, will determine that the subject that caused the event to be generated (the event in this case being the detection of movement within a certain area) is an enemy belonging to one of the local militias. Next, the UAV sends/broadcasts on the information network/grid video footage or a still image of the threat so that the other entities on the network have pictorial evidence of this threat, and know where to hit it (this is what is also known as situational awareness - the ability for everyone - whether it be soldiers, machines, unmanned drones and whatnot - to have one shared holistic overview of the battlespace). Based on the threat level posed by the enemy, a decision can then be formulated as to whether to engage the enemy/neutralise it (a nice-sounding euphemism essentially for killing it), or take no action at all. For the purposes of this hypothetical example, the decision has been made to take out the enemy. Further, in this example, it is not up to a human to make this decision to kill the enemy - this is agreed upon without human intervention by the system itself. This brings us to the so-called system of systems, or the so-called emergent behavior that will be exhibited by these interconnected UAVs/warghters/systems - everything will participate, strategize and communicate with each other using a technique called the Cooperative Engagement Capability whereby each and every single device, while still operating as one in a so-called swarm network, will have its own mechanism/algorithms to be able to come to a denitive conclusion on whether to engage the enemy based upon the threat assessment or leave it up to the other units. The engagement grid now comes into play. The engagement grid is a network that makes use of the sensor and information grids to perfectly pinpoint the target to be engaged. Given the units available on the engagement grid (as in - the warghters - armed UAVs that are currently patrolling the area), the target can then be taken out with precision military strikes. 3.2.0.1 Example The following is a military example illustrating how the three layers of the grid combine to enable sense and respond Network-Centric
5

Sense and respond can also be applied in the areas of logistics, distribution of goods.

3 Network-Centric Warfare

14

Fig. 4: Information sensors enable new ways of warfare - the new supply chain sense and respond is both applicable to business problems as well as those of war.

3 Network-Centric Warfare

15

Warfare. The hypothetical example takes place in a warzone where the United States is embroiled in a guerilla war against local insurgents. A broad array of sensors have been installed in this warzone. Now, suppose that the sensors are motion capture-based, and that one of the sensors in this array detects movement in the warzone that does not belong to that of the blue team (which would be the good guys, the guys on your side), but to the red team (the enemy). The sensor passes the notication of this event (event: a Red Team node moved inside the warzone) to the wider information network/grid (in network-parlance, we would use the term broadcasting instead of passing on when referring to transmitting something to every node on a network). Following the broadcasting of the notication, one of the UAVs (Unmanned Aerial Vehicle) that is currently patrolling the area picks up on this broadcast and decides to scour the area. The UAVs inclination to investigate events of this nature depends on what all the other UAVs within the vicinity are currently doing - in this case, they are all currently preoccupied with something else, hence its the UAVs prerogative to investigate this event. If it senses that the event consists of a key enemy hostile, it will destroy the enemy using its onboard weapons. The scenario for this example was an Intelligence-Surveillance-Reconnaisance mission making use of a Sense & Respond supply chain (the sensors that form the sensor grid; the information grid that the sensors and the UAVs/warghters both use; and nally, the engagement grid [].

3.3

Eects-Based Operations / Shock And Awe

Eects-based operations is a new way of conducting warfare in which a solution is sought to defeat the enemy with such precision that he has already lost the ght long before the ght even truly begins. The aim is to destroy the strategic assets and resources of the enemy as quickly as possible so as to disorientate him and break his decision loop (the OODA Loop) and morale. For instance, if the adversary perceives that his logistic supplies are no longer available, or that strategic reserves have been cut o, this will lead to such a dramatic decline in morale that defeat is inevitable - for he sees an enemy on the march from which it becomes much and more dicult to defend against, never mind ght against. This decline of morale could be part of the eect that an eects based operation sought to instill in ones enemy - once such a certain eect has been cast on the adversary, the opposing side starts destroying more chains in the operational structure - just as long as it takes to disorient the operational cycle of decisionmaking (de OODA loop) to the extent that the enemy is grounded to a halt and has no choice but to surrender. This is but one example of Eects-based operations - it could also be referred to as counter-terrorism, since every act of terrorism has as its specic goal the disruption of the current social order to further a new social order of the terrorists own liking. Further, a terrorist act serves a dual purpose as a media event intended to terrorize those not directly aected by the act itself, this as admitted by the Strategic Studies Institute:

3 Network-Centric Warfare

16

Terrorist attacks ought to be understood as consciously crafted media events, and while that has always been the case, today it is more true than ever before in two ways. First, the terrorist attack is itself often designed and intended for the cameras. Terrorist attacks are designed for an audience. Their true target is not that which is blown upthat item, or those peoplefor that is merely a stage prop. What is really being targeted are those watching at home. The goal, after all, is to have a psychological eect (to terrorize), and it isnt possible to have such an eect on the dead. - p5/135, YouTube War: Fighting In A World Of Cameras In Every Cell Phone And Photoshop On Every Computer, Cori E. Dauber, November 2009, Strategic Studies Institute[10] 3.3.1 Shock And Awe A President who launches a military operation without a congressional authorization will attempt to make the use of force short and decisive. It is desirable to terminate an engagement within the 60 to 90 day limit imposed by the War Powers Resolution. - The RMA And War Powers, The RMA and the Imperial Presidency, Lukasz Kamienski, Strategic Insights[19] Shock And Awe is the most prominent example of an Eects-Based Operations campaign. Just like terrorism, an eects-based operation seeks to aect people in ways other than the physical realm - and this includes the wider audience that is merely acting as spectators to the eects based operation. The eectsbased operation is a campaign of terror/precision warfare rst and a media event second - as in the case of the Shock and Awe campaign, which was widely advertised on American television stations such as CNN (on the left side of the political spectrum) and Fox News (on the righthand side of the political spectrum). Both portrayed the war as a triumph of spectacle - the language used to describe the war and the accompanying narrative to support the war sought to sate Americans lust for revenge after the 9/11 terrorist attacks (Bush, Colin Powell, Dick Cheney en Rumsfeld had engaged in a perception molding campaign trying to oat false and misleading information that Saddam Hussein was involved in the 9/11 terrorist attacks, and that he posed a strategic threat to the United States and Britain because he had Weapons of Mass Destruction in his possession - a subset of Weapons of Mass Eect, and another important area of attention in the Revolution in Military Aairs) Within a short amount of time Iraqs OODA Loop was broken - this quick and decisive victory was a vindication of the pursued Revolution in Military Aairs trajectory. There was a lot of confusion in the media surrounding the Mission Accomplished speech given by George W. Bush - unfortunately, people have a couple of misconceptions surrounding the real intent behind the war. It wasnt that the War in Iraq was planned up until the fall of the Saddamregime - on the contrary, this was but one step in the pursued RMA Course

3 Network-Centric Warfare

17

Of Action6 . The next phase in the RMA agenda would involve a counterinsurrection/counter-insurgency scenario where the military needed to respond with military force against an increasingly disillusioned populace ready to go on the oensive. The following document from 1994 lays out a hypothetical scenario concerning the potential implementation of the RMA and its causative eects. There are many similiarities between the real sequence of events that unfolded in Iraq and the ctional scenario provided in this document, with the only key dierence being that the counter-insurgency operation in the ctional scenario took place in Cuba instead of Iraq. Potential or possible supporters of the insurgency around the world were identied using the Comprehensive Interagency Integrated Database. These were categorized as "potential" or "active," with sophisticated computerized personality simulations used to develop, tailor, and focus psychological campaigns for each. Individuals and organizations with active predilections to support the insurgency were targets of an elaborate global ruse using computer communications networks and appeals by a computergenerated insurgent leader." "Psychological operations included traditional propaganda as well as more aggressive steps such as drug-assisted subliminal conditioning. - The Revolution in Military Aairs And Conict Short Of War, Steven Metz, James Kievit, 7-25-1994, US Army War College[20] This document suggests that creating computer-generated terrorist insurgent leaders to claim responsibility for staged raids and attacks would be an integral factor in Information Operations. The intent would be to mislead, to confuse, to lead would-be insurgents and terrorist sympathizers along a specic path that has been anticipated beforehand by the ones running the Information Operation. This would constitute a deception operation, with the specic aim to infer behavior, midnsets and loyalty to a particular tribe or militia. Further on, the document notes that deception, although frequently used by the military, is somehow thought of as un-American, and thereby dicult to sell as being a good thing. Various crisis management/threat inference have been used during the 2006/2007 Iraq insurgency to determine hostile intent among the insurgents and try to infer possible Course of Actions to plan against. For more information, see the References section ([4]).
6 People labouring under the misconception that Bushs Mission Accomplished speech was testament to the general perceived incompetence and ineptitude surrounding him as a Commander-In-Chief should read the document The RMA And War Powers by Lukasz Kamienski, contributor to the Strategic Insight, a periodical by the Center for Contemporary Conict (CCC). Written in the immediate aftermath of the 2003 Iraqi invasion, it conceded that: the RMA is making longer wars that might trigger the War Powers Act less likely, establishing de facto authority for Presidents to make war.[19]

3 Network-Centric Warfare

18

Fig. 5: John Boyds OODA Loop (Observation, Orientation, Decision, Action Loop). 3.3.2 Observe, Orient, Decide and Act - OODA Loop

In a wargame, the battleeld is divided up into two colour-coded regimes. One of them is known as the blue team area - this area includes all the good guys - the people on your side. The red team is the enemy which has to be fought. Several methodologies have been developed over the years to conquer the enemy as quickly as possible using wargaming. John Boyd, US Air Force military strategist, came up with the famed OODA Loop. This is a decision cycle that has served as the basis for all subsequent decision cycles that have followed in its wake. OODA stands for Observation, Orientation, Decision, and Action. Observation:Gathering of data by way of sensors/ISR sensors. Orientation:The analysis of the data in order to come to a denite conclusion about the data or come to a certain perspective Decision:The creation of a Course Of Action based upon the perspective that was formed during the Orientation phase. Action:The physical execution of the decisions that were formulated and made in the previous steps - bringing them into being. The OODA Loop is an innitely repeating cycle that lies at the heart of any war (whether waged in the air, on ground, or sea) - the objective is to disrupt your enemys decision cycle (his OODA Loop) in order to gain a strategic leverage. One of the ways of doing that is by engaging in information warfare to achieve information superiority over ones enemy. Information warfare from a war perspective entails - incapaciting the enemy by way of deception or deliberate sabotage of your enemys mission critical intelligence gathering/information providing systems.

3 Network-Centric Warfare

19

The OODA Loop is being used in combination with Network-Centric Warfare and the Sense And Respond supply chain to make war as ecient as remotely possible and as a means to achieving near-complete, perfect information on the battleeld - what they call predictive battlespace awareness. Liken it to the micromanagement of the delicate balance between conict and peace. Just like Operations Research as a governing principle spread its way from the military to the business and private sector, so too will sense and respond leave its lasting impact on society at large. 3.3.3 Cooperative Engagement Capability (CEC) "Cooperative Engagement Capability. This concept has been proposed, developed, and demonstrated by the US Navy. The essence of this concept as applied to a Navy battlegroup is that combat systems for geographically seperated platforms share unltered sensor measurement data associated with tracks with rapid timing and precision to eanble the battlegroup units to operate as one [in their engagement of enemy targets]. Rather than a stand-alone RMA candidate, this concept should probably be thought of as an important harbinger of network-centric warfare -Past Revolutions, Future Transformations - What can the history of revolutions in military affairs tell us about transforming the US military?, Richard O. Hundley, RAND Corporation, p107/132[17] Cooperative Engagement Capability refers to the capability by the military to utilize Network-Centric Warfare in such a way that the battleeld is totally in control of the military. As soon as an enemy enters the battleeld, a sensor within the battleeld will alert the entire network of the enemys presence (in networking terminology, he is broadcasting this event over the network). Next, a ghter plane or a ground soldier will be able to determine via the engagement grid how best to engage and destroy this enemy. What we just described here is the sense and respond supply chain put into practice. Without the sensors, this entire way of waging war would be a near impossibility. Cooperative Engagement Capability relies heavily on satellite imagery provided by Geographic Information Systems - think of Google Earth and other uses of GIS where satellite imagery is overlaid on top of a topographic map. If systems such as GIS and GPS did not provide CEC-enabled warghters with the geospatial means to determine where exactly they are in the battleeld and where their supporting cavalries are, it would be impossible to engage an enemy eectively. By giving the warghter a completely monitored battleeld where every sentient thing on the battleeld is divided up into two categories (blue denoting the good guys - red denoting the enemies), autonomous and unmanned vehicles have the required situational awareness to wage war as eectively as infantry human soldiers would be able to do[9].

3 Network-Centric Warfare

20

Fig. 6: "Cooperative Engagement Capability: by means of the three-layered network (sensor, info and engagement network) all military units interconnected with each other over this network have the shared awareness to determine where the enemy is located at any time, and based upon this shared knowledge, can coordinate and engage in groups or packs as one single autonomous ghting force in order to eliminate the threat.UAVs, satellites, ghterplanes, and so on - all of these constitute the aforementioned military units that are able to take advantage of this capability. All of this is realized by way of the Global Information Grid. Cooperative Engagement Capability is a new way of coordinating attacks using both human and mechanical/robot military units - this is enabled by sense-and-respond supply chain logistics, and in turn makes use of the three-layered matrix grid that constitutes Network-Centric Warfare. This warghting structure is currently being applied to both civilian/residential areas as well as war zones - hence the plethora of cameras and sensors popping up in the major Western countries."

21

Part III. Implementation of the RMA


9/11 crystallized the sense of a rule-set gap. So we have been lling rule-set gaps with great abandon ever since. The Patriot Act is a rule-set reset. - Thomas P.M. Barnett, The Pentagons New Map The Revolution in Military Aairs required a raison detre. Various thinktanks, foremost among them the Project For A New Century thinktank, ponticated in a defense policy outline that the process of transformation would likely be slow, absent the event of a Pearl Harbor-type attack[12]. One of the rst possible candidates tting this basic requirement for a precipitating/crystallizing Big Bang was perceived to be the Y2K bug on January 1, 2000 - the day the so-called Millennium bug would be causing computers worldwide to crash, leading to a worldwide asymmetric shock to the nancial system. But this never happened. This strategic shock was to be found a year later on September 11, 2001. This event had two denining characteristics: It was a strategic shock to the system. Two events were generated in consecutive fashion. Before the towers collapsed, one was dealing with a typical reghting and evacuation operation. All of this changed as soon as the towers started to crumble, however. In an instant, the theatre of operations was shifted from the roofs of the World Trade Center to Ground Zero - where previously a simple reghting and evacuation operation would have suced, now there was a lot of posionous dust to contend with as well as having to remove all the wreckage, safeguarding nearby citizens and saving any possible survivors that were in the building prior to collapse. This further gave government bureaucrats the excuse to call for agile methodologies and a rapid joint response force that could react to threats/events that tend to shift from one specic scenario (planes ying into the World Trade Center) to the next (the collapse of the two towers)7 . These two characteristics of September 11 2001 crystallised - to quote Thomas P.M. Barnett - the necessity for a process of transformation. Before September 11 2001, there was no sense of urgency or need to retransform the entire Defense Department. After September 11 2001, there was no turning back - RMA was the only road to travel. This process of transformation would include the following: The bureaucracy had to become more adaptable, to the point where it would enable cooperation and interoperation inbetween various agencies without cutting through too much bureaucratic red tape. This in turn would enable jointness - joint combat. For instance, the Navy and the Marines had to be able to work together as 1 joint team instead of the
7 See the video Bioterrorism Threats (02-25-2002) available on the C-SPAN Video Archive (see References, Bioterrorism Threats[23])

22

two having their own demarcated areas of interests and their own (incompatible) communication protocols. This required the standardization of all protocols and bringing all the various disparate forms of communication available to the Marines and the Navy together and interoperable by way of an all-encompassing communications network framework. Information had to be shared between agencies and access to the information should be governed using role-based access control. To make a long story short, the culture of the organisations involved had to be open to change instead of resistant and hostile to change - they had to evolve. Previously, the prevailing tendency within the various disparate agencies was to hoard information - certain agencies were opposed to each other and didnt like to share information inbetween each other. All this internal inghting had to make way for a new business culture based on sharing of information - this would require shared communities of interest, agreedupon semantics, and agreed-upon rulesets amongst the various agencies participating with each other as a joint force. The commercial sector had to invest more heavily in defense-related projects, and at the same time, the Defense Department shoud incentivize private companies doing so. There was the perception that the commercial sector had outperformed military-grade computer projects and hardware on a much tighter budget - and this waste in terms of military spending and duplication of technology (the wheel had to be reinvented by the military while a commercial product would do just as well, and be a lot cheaper) was an issue that people like Rumsfeld felt could be avoided by fostering stronger ties with the private sector.

3.4

9/10/2001 - War on Pentagon Bureaucracy


The enemy is closer to home. It is the Pentagon bureaucracy... We must transform the way the Department works, and what it works on.. Some might ask, how in the world could the Secretary of Defense attack the Pentagon in front of its people? To them, I reply: I have no desire to attack the Pentagon - I want to liberate it. We need to save it from itself. - Donald Rumsfeld, September 10, 2001[25]

The shrinking Pentagon budgets during the 90s (after the fall of the Berlin Wall and the subsequent collapse of the Soviet Union) allowed the private commercial industry sector to spearhead technological development and innovation, rather than the defense sector in the Cold War days. The Defense and the intelligence agencies regarded this as a troubling development. They were of the opinion that the defense department should be able to benet from the success of the private sector Secretary of Defense Donald Rumsfeld addressed the Pentagon on September 10, 2001 (a day before the terrorist attacks on September 11, 2001) to declare a

23

signicant change in the way the Defense Department would be run from now on. One of the newspaper headlines read: Rumsfeld declares war on Pentagon bureaucracy. In this talk, Rumsfeld heavily criticized the conservative stance of Pentagon bureaucrats and was of the opinion that taxpayer money was being spilt on projects that for all intents and purposes could have been provided by the private sector - and save lots of money and time. Force transformation, agility, interoperability were all among the keynote subjects - but above all, the need for an RMA was no longer regarded as optional, but rather as a necessity. At the same time, Rumsfeld also acknowledged that not everyone within the Pentagon would appreciate these far-reaching changes, to which he had the following to say: Well, ne, if there is to be a struggle, so be it. 8 . A day later, on September 11 2001, a couple of military wargames had been originally planned, including Global Guardian and Vigilant Guardian. Curiously enough, some of the wargames very much resembled the actual September 11 attacks - for instance, the wargame co-ordinated and conducted by the National Reconnaissance Oce had as its premise a plane that would y into one of the towers of the NRO due to a mechanical glitch.9 A spokesperson of the NRO had the following to say about the wargame: It was just an incredible coincidence that this happened to involve an aircraft crashing into our facility, as soon as the real world events began, we canceled the exercise. Another wargame that had the trappings of a terrorist attack that occurred shortly after September 11, 2001 was known as Operation Tripod - however, this one was scheduled to be held a day after September 11, 2001 (which was cancelled after 9/11). In this wargame, a bio-terror threat hit New York (think along the lines of Anthrax or an H1N1/H5N1 virus as being the threat) - during which the entire population of the city had to be ring-vaccinated. Rudolph Giuliani, then-Mayor of New York, as well as representatives of FEMA and the FBI were to have been involved in this stillborn wargame. Bush wasted no time in declaring the War on Terror following the 9/11 terrorist attacks, with Bushs rst decision being the uniliteral invasion of Afghanistan. The War On Terror is an euphemism for the Revolution in Military Aairs it is a buzzword meant for public consumption that is specically tailored to t in with the naming scheme behind various other social doctrines in America that masqueraded as wars, such as The War On Poverty (LBJ), The War On Cancer (Nixon), and The War On Drugs (Reagan)10 .
8 Also mentioned in this keynote address by Rumsfeld was that trillions of dollars were missing/stolen from the Pentagon, and that the Pentagon could not account for the money lost and where it ended up going[25]. 9 The NRO is the branch of the Department of Defense that concerns itself with the utilisation and management of surveillance satellites. 10 Richard C. Lewinton once commented that Americans, allergic to the term socialism and therefore instantly dismissive of any kind of socialist programs, were instead sold on these social change programs by the government adopting a misleading slogan to mask the social program, such as The War on Cancer, or The War on Drugs. Others have commented in the wake of the 9/11 terrorist attacks that the War on Terror would play itself out more or less like the War on Drugs - also hinting further at the socialist change doctrine behind the purported and veiled war on terror.

4 Privatization of the intelligence agencies/military contractors

24

Privatization of the intelligence agencies/military contractors

Onder de slogan New Federalism werden regerings-, militaire- en inlichtingendiensten geprivatizeerd. Ook de terminologie veranderde langzamerhand inplaats van de term government werd er steeds meer governance toegepast ter vervanging - het semantieke verschil hier is dat governance verwijst naar datgene wat een regering doet - governing the people. Instituten die dus medezeggenschap krijgen in international governance - zoals grote zakelijke kartels, thinktanks en Non-Governmental Organizations - hebben dus indirect de functies van de regering op zich genomen. Op deze manier hebben de publieke vertegenwoordigers steeds minder grip en macht en wordt de macht gecentralizeerd binnen selectieve kartels van bedrijven. Deze bedrijven lobbyen vervolgens bij supranationale regeringen (zoals de European Union) voor meer regeringscontracten en earmarks. Een aantal voorbeelden van intelligentiediensten die commerciele dochtersondernemingen hebben opgezet is wel op zijn plaats.

4.1

In-Q-Tel

In-Q-Tel is a so-called venture capital rm set up by the CIA[27]. The concept behind In-Q-Tel came from former CIA-agent Ruth A. David[27], now employed by ANSER Institute/Analytic Services (which in turn is a sister company of RAND Corporation). In-Q-Tel served as the proverbial capital injection arm of the CIA that would fund high-risk companies - for instance, companies that were treading in unexplored territory and therefore would need to take huge nancial risks. Wellknown companies in the public eye that have received capital injection from In-Q-Tel include: Google, KeyHole, and Facebook11 .
11 Theres a worrying trend to be noticed here - an intelligene agency that not only interferes (and collaborates) with the private sector, but through a joint venture capital proxy tries to redirect, stimulate and encourage emerging trends that will help facilitate the retrieval of information meeting the demands/needs of the intelligence agencies. After the initiative Total Information Awareness purportedly fell through because of public controversy, all of a sudden the private sector lled its void with companies such as Facebook, MySpace, Hyves and YouTube taking over the baton - all of these services combined more or less t the inintial sought-after goals of the Total Information Awareness program, and resemble a sort of LifeLog - a self-maintained diary held by the individual - the only dierence being that the user regards Facebook as a benevolent corporation and regards the exchange of his personal information as being fun and merely a socializing/personal escapade. The original intent of the Total Information Awareness has thus morphed and made the intrusion into ones life and the data-and-intelligence gathering abilities of these services such as Facebook seem less invasive and threatening, because of the consumer/supplicant participating in a consumer/supplier transaction - the consumer in this case is the Facebook user making use of the free service while Facebook is the supplier - the Internet communications service provider that segregates and puts people into tight-knit communities/clusters/hives.

4 Privatization of the intelligence agencies/military contractors

25

Fig. 7: In-Q-Tel was an important experiment by the CIA - create a private company that would serve as a nancier (venture capital farm) to all sorts of unrelated daughter companies, each of them having a specic specied area of expertise. Dr Ruth A. David came up with the conceptual blueprint behind In-Q-Tel during her tenure at the CIA[31]. Subsequently, she became the Director of the ANSER Institute for Homeland Security (created long before Homeland Security was created after the 9/11 terrorist attacks - ANSER was set up as a daughter corporation of RAND Corporation and had a special service arrangement with the US Air Force. As head of ANSER, she would create the conceptual framework for a postulated Homeland Security that would operate abroad and domestically in the United States. The following quote from Wikipedia sums up In-Q-Tels involvement with private industry: "According to the Washington Post, virtually any U.S. entrepreneur, inventor or research scientist working on ways to analyze data has probably received a phone call from In-Q-Tel or at least been Googled by its sta. The Constitutional repercussions of this disclosure alarm some critics." The reason why it alarms said undisclosed critics is namely because the CIA does not have the Constitutional authority to operate domestically.

4 Privatization of the intelligence agencies/military contractors

26

4.2

Blackwater USA/Blackwater Worldwide/Xe

Blackwater (old name for Xe) is a Private Military Corporation (PMC). A PMC refers to a privatized mercenary corporation that lends its services to state and non-state actors for monetary gain. In addition to serving as a military force drawing on operatives with years of experience working for the CIA and the Army, Blackwater also has its own intelligence service, called Total Intelligence Solutions. The founder of Blackwater, Erik Prince, was cast into the public spotlight after it transpired that Blackwater employees had been responsible for slaughtering an entire city in Iraq, Fallujah, in what was a vengeful act of revenge for a previous attack in which Blackwater employees were killed. His aliation with certain right-wing leaning Christian movements further damaged his public persona, and that of Blackwater along with him. After having resigned as Blackwater CEO in 2009, it was revealed in the press that Erik Prince had been recruited by the CIA as an agent, with the explicit aim to set up and create a quitessential commercial private army (PMC in politically-correct parlance). Aside from Prince having intimiate ties to the CIA himself, his company was also complciit in the coordination and training of various CIA assassination squads. The lucrative military contracts with the Department of Defense have not been ended after George W. Bushs tenure - on the contrary, the Obama administration has given preferential treatment to Blackwater (now called Xe) within the PMC sector - gaining even more contracts in addition to the ones that already existed during the Bush administration. The company has decided to adopt a new name, Xe Corporation, to avoid all the negative public connotations attached to the Blackwater name. It rst tried to restore its agging moral representation in the media by tweaking its logo to appear more friendly and benevolent. For instance, the original logo depicted a targeting reticule over a bear claw - in the sanitized version, the targeting reticule had disappeared from the logo.

4.3

Keyhole

Keyhole, a company founded in 2001, specialised in visual satellite imagery applications. Funding was provided by Sony, Nvidia, and, most notably, the CIAs venture capital rm, In-Q-Tel. Keyhole was subsequently purchased in 2004 by Google. While the company and its products were relatively obscure prior to and following its acquisition by Google, millions of people to date currently make use of its software/services without them knowing it - Googles software, Google Earth, was in actuality a spruced-up, branded version of Keyholes Earth Viewer - Google itself having made little to no modications to the code. The satellites used by Google Earth consists of the KH reconnaisance and Loral Skynet satellites. The company name itself (KeyHole) was an allusion to these KH reconnaissance satellites - these satellites formed part of the original eye-in-the-sky system for the use

5 Rollout of the Global Information Grid

27

Fig. 8: Google Earth is a rebranded version of Keyholes Earth Viewer 3D, a product acquired by Google after the acquisition of Keyhole by Google. The satellite system utilized by Google Earth makes use of the KHreconnaissance satellite systems owned by the CIA. On that same tangent, Keyhole was a privatized frontcompany by the CIA specializing in satellite imagery. of observing and surveilling the Planet. Keyhole enjoyed a major exposure boost during the 2003 invasion of Iraq, when the major news networks such as CNN, ABC and CBS incorporated and made use of 3D yby imagery from its EarthViewer program for use in their major war coverage programming.

Rollout of the Global Information Grid

We earlier discussed the three-layered network that enables Network-Centric Warfare in paragraph 3.1. To summarize for the sake of clarity - each of the three layers has its own function and purpose - the Engagement grid/network is meant for enacting a change on the environment (whether that change be physical in the form of killing an enemy, creating a purpose-made advertisement for a specic person, and so on) , an Information grid/network (a private network where all the units on the network will correspond with each other and be able to read new inputs/broadcasts from sensors/warghting units/bureaucrats/troops), and a Sensor grid/network (an interconnected network of sensors that respond to specic events of a certain type - motion,

5 Rollout of the Global Information Grid

28

Fig. 9: Global Information Grid, Operational View-1 - image courtesy of the Department of Defense auditoral, scent, visual - and broadcast a notication of such and such event occurring on the wider information grid/network). The glue that binds all of these three disparate networks together, is what is referred to as an enterprise architecture. But enterprise architecture is but a conceptual outline for a framework - it cannot exist by itself. Thus, the Department of Defense have developed an actual framework modelled on the Zachman Framework called Department Of Defense Architecture Framework (DoDAF)12 - its implementation being the Global Information Grid . This global network facilitates the army and other stakeholders within the system to coordinate and execute Network-Centric Operations in joint operations, at any location in the world, at any time. This Global Information Grid will cover the entirety of North-America as well as the European Union.

5.1

The role of IPv6 within the GiG


Internet of Things would also greatly benet from a rapid deployment of IPv6, as proposed by the Commission and endorsed by the Council, as this would make it possible to directly address any number of objects needed through the Internet. - p8, Commission Of The European Communities, Internet Of Things - An Action Plan

12 This framework was previously referred to as C4ISR Architecture Framework up until 2003.

5 Rollout of the Global Information Grid

29

For Europe[1] To connect all of the endpoints within the network, (think of all the sensors/cameras/UAVs), every device has to have its own uniquely addressable network address. This is the real reason behind the worldwide migration from IPv4 to the IPv6-protocol - the leap from 32bit adressing (IPv4) to 128bit addressing (IPv6) will lead to an enormous increase in the amount of available end-to-end, point-to-point connected devices/nodes on the Internet. To this end, IPv6 makes it possible to elevate the current-day Internet to a so-called Internet of things - the addressing capacity is big enough to give every grain of sand on the worlds beaches an IP-address - thereby making each and every grain of sand uniquely addressable. 13 . RFID-transponders on products, identication cards and travel products will also be integrated into this new Internet of Things.

5.2

The adversary and the archetype


The Oce of Naval Intelligence will tell you right now - the Chinese are looking ten feet tall. Why? Because Osama Bin Laden does not have submarines. Those who dont see a reality they can live with have moved towards desire over the 1990s, and they invented a special coded language to describe their journey [RMA/4thGenWar/Transformation]. Problem is, they needed a big sexy opponent to ght against. If they cant nd one, they make one up. - Thomas P.M. Barnett, The Pentagons New Map, Presentation[3]

The Revolution in Military Aairs (or 4th generation warfare, whatever term you may prefer) and the accompanying transformation of the military began with Operation Desert Storm (also known as the rst Gulf War). Desert Storm would be the rst of a series of 4th generation warfare trial runs that would prove to be a perfect battle laboratory because of the relatively barren landscape - practically no undulations in terrain. Like the aforementioned quote by Thomas P.M. Barnett would highlight - one of Arthur K. Cebrowskis proteges - the agenda was there before the big, sexy opponent was determined. This proved to be a recurring problem in the post-Cold War. Where previously the Soviets proved to be useful to the department defense in the sense that every expenditure requested and granted by Congress was in the name of thwarting Soviet expansionism, now that argument would fall at on its face, since the big, existential ideological enemy was gone. All of a sudden, there was talk of doing away with the entire Pentagon altogether by seasoned military vets, and there was a sudden decline of willingness to put up the cash for ever-more expensive Pentagon weapon projects when an entire stockpile of nuclear weapons was now essentially rotting away, with the likelihood of it ever proving to be of
13 Denk aan het Burger-Service Nummer onder het eID initiatief van de Nederlandse regering - ter vervanging van het So-nummer, maar dan uniek addresseerbaar middels het Internet. Het Burger-Service Nummer is enkel voor diensten met de overheid.

5 Rollout of the Global Information Grid

30

use increasingly narrowing. Without an enemy, there is no war. Without a war, budget cuts due to a lowered threat assessment. 5.2.1 Asymmetric threat

The enemy of the RMA (Revolution in Military Aairs) would take on the form of an elastic/ambiguous archetype - the asymmetric enemy. The asymmetric nature of this enemy needs expanding upon. It refers to the size of the enemy, which is asymmetrical in nature. The characteristics common to the asymmetric enemy are the following: He/she can be state-aliated or not - the people involved in the cell/network do not necessarily have to be within the same city, state or nation People who share his/her mindset and interests form a community of interest - and have the potential to form clans/gangs (or, less pejoratively, communities) His/her convictions and ideas do not depend on the mainstream media (television, radio - which is largely centrally controlled) in order to gain traction and be propagated to the mass, but instead exploit new methods of communication and mediums (such as the Internet, Twitter, instant messaging, e-mail) This archetype is very broad in scope since it could be applied to a gure like Osama Bin Laden or an entity such as Al-Qaeda just as easily as it could be applied to an innocuous social network comprised of a gathering of acquaintances. Everyone has certain characterizing interests or thought processes that might not be the prevailing attitudes or interests of the day, but are likely to be shared by a few other unrelated individuals. To oer an example while staying within the realm of computers, take the case of people who like to toy with old computer hardware from the 1980s, such as a Commodore 64 or an Commodore Amiga. This kind of activity would fall outside the norm - you will be hard pressed to nd a modern day computer parts supplier or convenience store that will be willing to sell new and/or old/used software for such systems, never mind participate in the buying or selling of old/new/refurbished parts or machines. Yet the Internet enables certain clans/communities/groups comprised of individuals to set up their own supply- and distribution chains independent of the massmarket system - for instance, they could participate in stocking up second-hand Commodore 64s, repair broken parts and sell them as new on an online webshop. Or to approach this from the perspective of a software programmer - programmers could dedicate themselves towards writing new software for the old machines and organize meetup parties on line or in real life (IRL) where they will announce or showcase such new software - the means to organization is there by use of e-mail, Internet, instant messaging chat, Skype, and so on. Together, this would constitute a community of intereset. What binds these people together, are network connections relating to shared ideas, shared convictions and shared interests. The network connections in

5 Rollout of the Global Information Grid

31

turn are further strengthened by the means to communication that allows these people to organize independent of any broader, mass-market system. People can form connections between each other where previously there would not be the inclination to form an connection or group in the rst place. A gathering of like minded people comprises an information loop, and this information ow is obviously not controlled or authorized by a wider massmarket system. This raises all kinds of problems from a jurisdictive perspective. Are people in danger of violating the intellectual copyright proprietor holders rights to selling wares under the Commodore brand when users are selling refurbished Commodore 64 units on the Internet, or setting up dedicated webshops for them? Is it within the holder of the intellectual property right to demand that this webshop cease any and all activities in selling or proting from products perusing the Commodore brand - even though the unit that is being sold has been taken out of production for at least the better part of three decades now and the Commodore brand is a part of the original machine title? A couple of tools have been provided to intellectual copyright proprietors over the years to help relinquish their loss of control over uncontrolled information ows - in the form of laws such as the Digital Millennium Copyright Act (DMCA, North America) and the EUCD (European Union Copyright Directive). Even further still, further binding intellectual IP/copyright laws are putting the pressure on ISPs, website providers and the like to engage in self-policing on what users can and cannot post or upload due to fear of litigation on behalf of the third party (the ISP, the website hosting provider, and so on). 5.2.1.1 Data mining/clusters/social networks What binds the enemy together, are ideas. In an information age, the primary currency is information. The shift in mindset that brings around (companies will approach business from a dierent perspective if the key distinguishing factor is content) also changes the priorities and the operating procedures of the military and other defenserelated institutions. In previous bygone ages, a certain ideology or a certain nation-state was singled out as the enemy - every neighboring state or country that was not under Roman law was deemed by the Roman Republic/Empire to be barbaric in nature - and this value judgment served as a justication towards declaring war on that country, pre-emptively invading it and consolidating it under the Roman Republic/Empire. This was a standardization of culture - once conquered, the remaining people of the conquered nation who were not sold into slavery could attain Roman citizenship and enjoy the spoils of Roman life - the only correct way of life. The same tendency tended to prevail as the justifying rally for war in medieval times between Christians and Muslims - one way of life being better than the other. Both religion and nation states have taken on a less central role in world affairs due to globalism and the rise of atheism. In this new landscape, ideas now constitute the enemy, which is ever-changing. Certain ideas/convictions are incompatible with others - intellectual ideas copyrighted by certain corporations, for instance - ideas which can aect the bottom line of the corporation because

5 Rollout of the Global Information Grid

32

it gives them a strategic leverage against other corporations. For instance, to be against a societal and militaristic revolution such as the RMA would be regarded as a potentially dangerous idea from the perspective of those who want to ram through this policy14 . To put a long story short - ideas (existing and new ones) have the potential to cause specic harm to pre-existing agendas, and thus could lead to a disruption of the current social order (a repeating occurrence in nearly every Revolution - the American Revolution of 1776 was looked upon from the perspective of the British Empire and its scribes as a terrorist and subversive movement threatening Britains alleged rightful dominance over the colonies and the relative social order they proclaimed to have helped bring about). Therefore, its imperative for the holders of power to dissect information and infer currently prevailing mindsets, activities and beliefs among vast groups of people. Enter Social Networking. 5.2.1.1.1 Social Networking

"There are only two places where socialism works one is a beehive and the other is an anthill." - Sir Ian Stewart-Richardson This often-quoted line by Sir Ian Stewart-Richardson approaches socialism from a purely organizational perspective. The beehive and the anthill both have a rigid hierarchy, with the lower classes (which is composed of innitely more units
14 A good example is to be found in the recent Sony-Linux asco. The PlayStation3 games console has been advertised as of 2006 with the promise of being more than a games console - touting its ability to install a secondary operating system on the built-in harddrive. This made it possible to install an operating system such as Linux or BSD without voiding your warranty by having to crack the systems security system. Sony was prepared to allow people this relative freedom because they were reasonably condent no harm could be done while being sand boxed in a virtual environment governed by the PS3s Hypervisor - Linux running as a guest Operating System meant it could not directly address the physical hardware therefore, there was no conceivable risk of a hacker using the Linux OS to hack the underlying security subsystem of the PS3. However, Sony eventually got cold feet when a certain hacker known by the handle Geohot had succeeded in partially cracking the hypervisor. Citing socalled security risks as an excuse to ram through this change in policy, as of April 2010 Sony has decided to retroactively remove the Linux/OtherOS functionality from every PlayStation3 connected to the Internet through a rmware update (Firmware version 3.21). This helped anger and enrage many individuals as well as private universities and defense-run departments such as the US Air Force - what further aggravates the situation is that by not upgrading the rmware to revision 3.21 (the Linux-busting rmware), Sony deems you a threat/security risk and therefore no longer eligible to access their PlayStation Network service or any other service provided by Sony to their PlayStation3 game console for that matter. Even legal users are duped in this way because of so-called security risks - the argument Sony is putting forth is that they have only provided you with a end-user license agreement to use the PlayStation3 game console you bought, but that they are perfectly within their rights (as per the EULA you are required to sign before using the PS3) to withdraw or remove any service or feature their system provides if it runs the risk of threatening intellectual copyright or posing the risk of being a security threat. Fiascos such as this can only help fuel the controversial debate surrounding intellectual copyright - the Sony-PS3 Linux case study illustrates that the delicate balance of power between that of the consumer and the producer/corporation has broken down - with the one on the losing end appearing to be the consumer.

5 Rollout of the Global Information Grid

33

than the higher classes) all having a certain uniformity of thought/purpose. Segueing into the human society for a minute - Social networking enables people to network/relate with other people who are all for all intents and purposes on the same wavelength - they share the same ideas, the same interests, hobbies or ideas. Together, these people would form a cluster - or rather, social network. They communicate with each other using sites such as Facebook, Myspace, Hyves and so on. This information that they share and disseminate within their inner circle, as well as the conversations they engage in, are not anonymous in nature, and the information and the conversations are not being relayed from person to person, but instead are stored on private servers owned by an information tracker/middle man (Facebook, Hyves, Myspace). These information trackers have stipulated certain privacy agreements and Terms of Use agreements to which the user must conform to - in it, the provider makes certain promises as to what he will and will not do with the information that is being passed over its network, but reserves the right to change its terms of agreements at any time. Rights can be granted just as easily as they can be revoked. What becomes clear is that there is a certain hierarchy and a centralized degree of authority to be detected here - the information-service provider/information trackers (the Facebook, Hyves, Myspace administrators) are at the top of this hierarchical social structure, while the worker-bees that form one or many social networks (and share all of their data with the centralized authority) are at the bottom of the hierarchical foodchain - both in terms of the power they wield over their own information which they post on the site as well as the degree of control they have over who gets to access this information and whether or not it is being sold or passed on to prying eyes such as the authorities. 5.2.1.1.2 Datamining Datamining is being applied to social networks and mobile networks to segregate and divide people into clusters/segments. The aim is to build up individual probability prole consisting of information on the following: interactions with other people the nature of these interactions (common conversation topics, interests, etc) the frequency with which these interactions occur (how many times per day do people chat over IM/SMS, with whom, with whom did said person chat the most this week) These disciplines are all lumped together under the broad banner of Social Computing. This is a computer-related sociological engineering branch that makes use of the various disciplines of information gathering/tracking (data mining, data bases, knowledge bases) to create useable statistical data sources (proximity networks, friendship networks, sexual networks, social networks, and so on). This data can then be cross-referenced with GIS and GPS-systems

5 Rollout of the Global Information Grid

34

Fig. 10: An example of data mining in social networks inferred by ones mobile phone usage - there are two kinds of social networks on display here based on the same data source - a friendship network and a proximity network. This gives the analyst a reasonably accurate snapshot of the geographical spreading of ones inner social circle. All of this combines to form a total snapshot of ones daily social interactions. To view the complete presentation, see Inference In Complex Social Systems[13] (consult the References section).

35

(Geographic Information Systems and Global Positioning System in subsequent order) to give the analyst even more insight into the nature of the event. For instance, by combining all these disparate data sources he is able to infer where such and such person was located at the time the specic event occurred (for instance - calling someone on the phone, driving in your GPS-equipped car to one of your friends) who he has been in contact with on a weekly or daily basis. 5.2.1.1.3 Threat inference This analysis can be used for marketing purposes (think Googles AdSense) - but it can also be used for defense purposes. Threat inference is concerned with the modelling of insurrections and terrorist threats, and in the process creating a so-called Course of Action. The objective is as follows - what threat lurks beneath the intentions and deeds of a single individual or a group of persons, and which steps have to be taken to neutralise this threat? A couple of systems by George Mason University (in close cooperation with the US Air Force) are being used to determine the best Course of Action for any given situation. Starting with Pythia (an improved oshoot of CAESAR II/Eb), sociological factors now play an important part and heavily inuence the next most desired Course of Action path to be travelled in the branching tree of possible decisions. A couple of examples of threat-inference / temporal crisis management systems : Commanders Predictive Environment (CPE) CAESAR III (George Mason University) Pythia (previously known as CAESAR II/Eb, George Mason University) TEMPER (George Mason University) JSIMS (Joint Simulation Systems)

Part IV. The result of the ongoing Revolution in Military Aairs


This revolution has no clear demarcation point. The title: Revolution in Military Aairs, is similarly misleading. Other alternative titles - such as New World Order - have been trivialized and ridiculed by the media and dont really give a good idea of where all of this is leading to. What the Revolution in Military Aairs hopes to accomplish is the creation of an external dimension - a meta-tag dimension. Do not mistake this as some metaphysical plane of existence, for the entire radiowave spectrum and the Internet by themselves would constitute a similar external dimensions things which are there within the physical realm but are not directly perceivable by the naked eye. Hence, this external dimension in question consists of a

36

Fig. 11: An illustration from the PowerPoint presentation Dynamic Network Analysis: Automap/ORA/Dynet[14], courtesy of the Carnegie Mellon University. These juxtaposed networks are all classied as communities of interest in the social computing eld Dynamic/Social Network Analysis. As can be seen in the accompanying screenshot, the invasion of privacy into the private lifes of the population set is quite far-reaching, chronicling the amount of sexual partners one has to the amount of different conversation subjects in the e-mails he receives and sends. To view the presentation, see the References section, Dynamic Network Analysis: Automap/ORA/Dynet[14])

37

Fig. 12: This slide from the PowerPoint-presentation Commanders Predictive Environment[21] gives a good insight into the way the emerging sciences of threat inference and crisis management systems are being utilized by domestic law enforcement. Everyday behavior patterns are studied thoroughly and uctuations in normal behaviour are observed and analyzed - on a daily basis. The amount of dierent uctuations in normal behavior patterns are studied on a per-day basis, and based upon this data, the threat such and such specic changing behavior patterns represents will be inferred (for instance, violent or physical altercations on the streets could lead to disruption of the social order; the same with public protests). This leads us inevitably to the ever-increasing role the military will play in domestic law enforcement vis-a-vis Military Operations Other Than War) See the References section for the link to the original PowerPoint presentation.

38

coupling of computer networks that lend semantical meaning/relationships between objects in the real world. These meta-tagged objects are then given a corresponding presence in the virtual world - i.e. the Internet of things. In this Internet of Things, these things will have a couple of properties and a status attached to them. This Internet of things, serving as just another service-oriented architecture to the Global Information Grid in the grand scheme of things, will allow various agencies such as the Joint Armed Forces, Homeland Security, private intelligence agencies and the like a near panoptical overlay of modern-day society (think of all the cameras on the streets, think of all the dierent motion-based sensors currently installed in the major cities, think of all the telephones with a built-in camera that are currently in use by millions if not billions of people, think of the KH-reconnaissance satellites courtesy of KeyHole that was subsequently bought out by Google in 2004, and what we now know as Google Earth - and lastly, give a passing thought on the Global Positioning System that will be used for taxing-by-the-mile schemes15 ). Benthams panopticon has been applied to the entirety of society. But its ramications on world society does not stop with merely the means to surveillance - a digital copy of the real world has been created that integrates all the measurable and controllable aspects/resources of the world that is subject to the boundaries of the grid. Personnel locators, CO2 sensors, smart energy meters - all of these devices/sensors feed into this digital overlay of the real world, adding to a more or less complete panoptical overview of entire swathes of people. This further helps facilitate a sense-and-respond supply chain to serve as the backbone for a new era in marketing, advertising, social engineering, and surveillance. Examples of sense and respond would include - you are using up an exorbitant amount of energy this week, therefore the response to this sensing by the energy company will be that your costs will go up accordingly to reect this change. Another sense and respond scenario could consist of you going into the mall, a billboard display doing an iris identication check, and upon nding out youre inside its customer database, the GAP billboard will show a tailor-made advertisement on its screen that will alert you to new tanktops that might be of interest to you[30]. This kind of customer data management overview of peoples private lives will more or less grant perfect information to those with power in this new Sense & Respond surveillance society - if one deems it necessary to inquire who said person is that just bought something, then one can go through his psyche prole by making use of the information gathering/data mining that is being performed on forums/instant messaging/chat rooms, as to more or less accurately venture a guess as to what the persons current frame of mind is, what specic issues are most important to him at this specic time, etc. de status van bepaalde RFID-tagged produkten kan worden vastgelegd en gecontroleerd. Door de cameras in de treinen en bussen (alsmede de RFIDreisprodukten zoals de OV-chipkaart) kan netwerk problematiek uit de Opera15 The Netherlands will be the rst country to introduce mandatory, nation-wide taxingby-the-mile by 2012, with government-mandated GPS tracker boxes installed inside every car.

39

Fig. 13: From the article "Sense and Respond - the Next Generation Business Model[30]" by Seungjin Whang: "Minority Report, Steven Spielbergs sci- movie release in 2002 has the following scene: John Anderton (Tom Cruise), after having eyeballs replaced to escape police detection, walks into an apparal store (the Gap). The camera in the store scans his eyes, and the at TV panel instantaneously starts an advertisement showing a holographic image of a woman, "Hello, Mr. Yakamoto! Welcome back to the Gap. How did those assorted tank tops work out for you? Come on in and see how good you look in one of our new Winter sweaters." Well, this scene (prepared with the help of MIT Media Lab) demonstrates the next generation of business model - sense and respond."

6 Private sector in the information age enabled by the RMA

40

tions Research discipline worden toegepast, namelijk: hoeveel mensen rijden er op een gegeven moment in de bus/trein, op welke tijdstippen is de bezetting het hoogst, enzovoorts. The external invisible layer of dataveillance will fulll its true purpose eventually once the transhumanist movement starts seeping into the popular culture. The multitudes of sensors, access points and wireless data pushing through the airwaves will engulf an augmented persons senses - to the extent that that his sensory input and output can be manipulated with or embellished from a remote distance.

Private sector in the information age enabled by the RMA

The commercial/private sector is but one stakeholder that is envisioning entirely new business opportunities in this information-based society that will depend squarely on the wide-ranging sensor/information grid. To further help empower these booming technology companies, new law instruments have been devised that redene the concept of intellectual property and to what extent the laws concerning intellectual property can be enforced ( Digital Millennium Copyright Act in the US; European Union Copyright Directive in Europe).

6.1

Governing of intellectual ideas - and rights pertaining to these ideas

Intellectual ideas, the prime currency of the information age, can now be patented, and rights pertaining to these ideas can be dened and enforced using a methodology called DRM. DRM technology is mostly proprietary and non-standardized in nature at the moment, with every corporation having its own specic implementation of DRM16 , but one can already see a consolidated move towards specic standards - in the movie industry with MPEG-7, MPEG21, HDCP, and DTCP-IP, for example (see the accompanying footnote). DRM gives the information provider more authoritative control over what the user is allowed to do with the content/information granted to him as part of the initial exchange (buying information/content for an agreed-upon sum of money). A couple of additional rules and rule sets that can be dictated by DRM would include (for instance), the right to copy the single track he purchased on iTunes to a non-proprietary MP3 player not belonging to Apple. Another
16 The movie industry, on the other hand, is making a conscious eort to throw its consolidated weight behind eorts such as MPEG-7 and MPEG-21, the two of which will combine to oer the content provider a broad range of DRM features that will enable him to stipulate restrictions on who gets to view the content, who gets to copy it, and so on. To clear up any confusion, MPEG-7 and MPEG-21 are not new videocodecs with strict DRM features, but are merely metadata containers that can be embedded/encapsulated in pre-existing video and audio streams of any kind. MPEG-21 will also be a boon in terms of data-mining - all content inside the audio or video-data can be tagged - speakers can be identied in an audio clip by name, a music/audio genre can be dened for specic portions of the same audio le, and so on. Furthermore, MPEG-21 oers a query-based language that will allow the data-miner to quickly retrieve relevant information based on a specic search query.

6 Private sector in the information age enabled by the RMA

41

limitation enforced by DRM could be the right to listen to said single x amount of times before the user has to pay a small charge again. End-User License Agreements and intellectual property rights are bringing about a shift in power between the supplicant and supplier of information.

6.2

Utilisation of the Sensor/Information Grid by the private Sector

As for why industry execs are warming up to the non-military opportunities provided by technologies such as the Sensor/Information Grid, consider a talk given by Jesse Schell, professor at Carnegie Mellon University, at the DICE Summit 2010 (a convention geared for videogame industry executives). In this monologue, Schell makes it known that, from a videogame designer perspective, the panopticon provided by the Global Information Grid oers game designers the chance to create games out of the most trivial everyday manual tasks. In this prediction of what the future will entail, he foresees a world where nearly everything would be turned into a game because of disposable technology such as embedded sensors and screens in nearly every object, from the packaging of your food all the way to household appliances. The principal reward system in this new society would be based on credits using the sensor grid and the sense and respond supply chain. For instance, if a person were to look at an advertising billboard, the consumer would earn a couple of credits; if he reads a book from start to nish instead of merely icking through it (it is presumed that every page inside the hardbound book will have a built-in sensor that will somehow trigger the information network whenever the page has been icked or looked at), he will earn additional credits than if he were to merely ick through it. The concept of these credits are already familiar to owners of games consoles such as the Xbox 360 and PlayStation3 - people are rewarded based upon their achievements and the way they use their tools/toys. In this world, the baton of social engineers would be passed down to videogame developers/designers - who have an innate knack for guring out what makes a certain mechanical activity fun - thus opening the door for an even more abusive variant of Skinnerian behavioral techniques that could literally train and re-educate people into how to behave. And this seems to be the central crux of Schells argument - that even though we might today regard this as being very Brave New World-esque, at the same time, this could help make people strive towards becoming better and more responsible people - if one were to take a certain Doublethink disposition and merely put on a brave face. The engine driving the architectural backbone for this behaviorist paradise is the Sense & Respond supply chain, which was covered previously in paragraph [].

6 Private sector in the information age enabled by the RMA

42

Fig. 14: Jesse Schell, Carnegie Mellon University professor, recognizes in the worldwide sensor network the means to a new frontier in social engineering and social control, but ruled over by game developers instead of conventional social engineers. In this behaviorist landscape, every mechanical action performed manually by the user is turned into a game. Here is a quote from Jesse Schell in an interview with CNN: "New video gaming systems are coming out [Xbox 360] that track every joint of your body [Project Natal]. Its basically going to become a normal thing for us to allow Microsoft to put a three-dimensional camera on top of your television set looking at you, which sounds like a Big Brother scenario if ever I heard one, but, still, its what were going to allow. I think people will nd a great deal of their lives co-opted by games, sort of like how we saw advertising co-opt huge amounts of our lives in the 20th century. "

43

Part V. Next step for the RMA Transhumanism/Singularity


Transhumanism is a growing movement of intellectuals/academics/ideologues who want to upgrade their biological body with cyborg/computer parts. This sub sector of futurists is now co-operating with the bio-ethics sector to push through drastic changes in the law that will allow for the possibility to realize a transhumanist future world. What these individuals have in common is a yearning to become posthuman - to become more than human, a fusion between man and machine, perhaps even totally cybernetic. Transhumanists are not only calling for the right to self-modication/selfmutilation - they also want to extend the concept of citizenship to the rest of the animal kingdom. A key determining factor in the right to citizenship/personhood is the concept of cognitive capacity (cognitive capacity is an euphemism for brain capacity). Machines with superior Articial Intelligence capabilities would be entitled to citizenship rights under proposed legislation pushed by transhumanists.

Utopia
The English Puritans, the Jacobins, the Bolsheviks, were in each case simply power seekers using the hopes of the masses in order to win a privileged position for themselves. Power can sometimes be won or maintained without violence, but never without fraud, because it is necessary to make use of the masses, and the masses would not co-operate if they knew that they were simply serving the purposes of a minority. In each great revolutionary struggle the masses are led on by vague dreams of human brotherhood, and then, when the new ruling class is well established in power, they are thrust back into servitude. This is practically the whole of political history, as Burnham sees it. - Second Thoughts on James Burnham, George Orwell[22]

Like the proselytes of every revolutionary movement, transhumanists also share this yearning for the creation of a perfect society. In that sense it very much resembles mutilated Marxism - technology, rather than enslaving people, will liberate the masses. Utopians of the futurist school believe that food production and the distribution of goods can be shared and turned into a communal commodity because of the fact that machines will perform all the necessary work. A global brain will guard over the city/town and do all the necessary decision-making at the behest of the citizens. The central premise in all of this is that theres enough food and enough goods to go around for everyone - nanofactories will be utilized in order to be able to create anything at the molecular level on demand.

8 Dystopia

44

Another utopian inclination is to regard technology as a great equalizer for people with disabilities (such as the blind, the crippled, etc.) - by giving them the means to bionic eyesight or the ability to walk again through prosthetics.

7.1

Example

An example of the kind of utopian scenarios imagined by transhumanists is portrayed in the 2008 documentary Zeitgeist Addendum. About halfway through the documentary, the public is sold on a tentative project called Venus Project, a project headed by futurist Jacque Fresco. The manifesto of this future society has clear Marxist overtones - money is a corrupting force, a swindle that leads to rigid social stratication, and hence the only solution to combat this evil is by making redundant the very concept of money - and in eect relegating to the scrap heap the basic reward system that goes with it. This is what Jacque Fresco understands by a resource-based economy - which would replace the aging economic monetary system. The resources would be administered and rationed out by computers making educated guesses about the Earths carrying capacity (a buzzword from environmentalist doctrine) - Jacque Fresco believes that by taking the decisions out of the hands of bureaucrats and instead letting computers do the running of the state, this essentially removes the state.

Dystopia

What ies in the face of these utopian fantasies of a better world are some of the statements made by transhumanist pioneers. For instance, Kevin Warwick, made the following comment in an interview: Clearly, the world is going to be dominated either by intelligent machines, or cyborgs, or a combination - thats where the future is going. So, the future for an ordinary everyday human - I guess there will be some sort of subspecies, just like we have cows now - so we will have humans in the future. There will be other creatures of the species - cyborgs, intelligent machines - that are the dominant lifeforms on Earth. And as a cyborg - if a human came to see me and he starts making silly noises - a bit like a cow does now - if a cow comes to me and says: "moo, moo, moo", Im not going to say: "Yeah, thats a great idea, Im going to do what you tell me", so itll be with a human. Theyll come in and start making these silly noises that we call speech and human language and so on - and these trivial noises Im not going to do those silly things - why should I? This creature is absolutely stupid in comparison to me - Kevin Warwick

9 Start of transhumanism (Application within the RMA)

45

In the above snippet, Kevin Warwick imagines a future world scenario where cyborgs (or rather, transhumanists - to be more human than human) will not consider normal human beings to be their equals, but rather their inferiors. This would give rise to a new socially stratied class system where the willingness to modify your biological body would get you up the food chain. Instead of creating a more equal society as the utopian version of this future scenario would have us believe, in Kevin Warwicks version of this same future world scenario, technological snobism would on the contradictory lead to even more inequality between those with a brainchip, and those without (which would therefore not be able to integrate into a society where logistics and supply and demand are all governed by the sense and respond supply chain). As computers become an ever-more encompassing part of ones everyday lives, it becomes likely that those who will hold conscientious objections to having to upgrade their body with machine parts will become stigmatized and pigeonholed as a luddite or even a new Amish. Richard A. Clarke, prolic counter-terrorism author, has even oated the concept of the future being rife with BioLuddites anti-transhumanist terrorists that try to disrupt and prevent the transhumanist society from being brought into existence. It is interesting how opposition to this social change doctrine leads to one being termed a terrorist.

Start of transhumanism (Application within the RMA)

The rst incremental steps towards a transhumanist society is to be found in the implantable brainchip. The US Air Force has already revealed in its Vision 2020 document how it intends to make this mandatory for the average soldier: The implanted microscopic brain chip performs two functions. First, it links the individual to the IIC [Information Integration Center], creating a seamless interface between the user and the information resources (in-time collection data and archival databases). In essence, the chip relays the processed information from the IIC to the user. Second, the chip creates a computer-generated mental visualization based upon the users request. The visualization encompasses the individual and allows the user to place himself into the selected battlespace. - US Air Force - Vision 2020 - Chapter 4 - System Description[2]

Part VI. Evil in the RMA


Kant made the following statement: Each person has a fundamental right to be respected and treated as a free and equal rational person capable of making his or her own decisions

46

Fig. 15: Article from Edge Magazine, November 2002 - Controversy surrounds the conclusions he derives from these experiments. [Kevin] Warwick sees himself as a pioneer of a new race of human-machines which will eventually take over the running of the world, thanks to their enhanced brains and bodies.

47

Fig. 16: Jose Delgado of Yale University was a pioneer in the development of brainchips, the development of which can be traced back to the 60s. Delgado was able to bring cats, dogs and bulls from a state of near passivity into a t of rage using a special contraption he called a stimoceiver. After the success he had achieved with animals, he then proceeded to apply the same technology and doctrines onto people (most of the people used as guinea pigs for these experiments were drawn from the prisons and mental wards since they more or less lacked the Constitutional rights and privileges that would protect them from being abused or misled into participating on experiments that might prove extremely detrimental and risky to their own wel-being. The electronic stimulation and control of the mind has been perfected to such a degree now that Intel has proudly announced that it envisions that by 2020 a great many of their customers will have opted for an implantable brainchip. (see References, Intel Wants Brain Implants In Its Customers Heads By 2020; also see the article from Playboy Magazine, January 1990, "Mind Control", by Larry Collins). The study of cybernetics and the Revolution in Military Aairs that has as its entire premise the pursuit and utilization of radical new technologies, seeks to deny people these basic fundamental rights - by treating them as cogs in a wheel. No adequate attempt has been made either by government, by the defense establishment or by private companies to explain to them the exact ramications of the information age. All kinds of revolutionary steps and measures have been undertaken to help fulll one specic agenda (namely, creating an information age by pursuing a ). Public debate has been stied and discouraged by way of coercion, the exploitation of fear (fear of terrorism, fear of inuenza-like viruses, fear of economic crisis), apathy (I have nothing to hide) and the exploitation of naivety and ignorance (for instance, by promoting various social networking sites without warning them of the inherent dangers of sharing ones private information). A conscious attempt is also made to collude the actual technological progress in the eld of augmented brainchips, and the purpose behind them. The US Air Force manifesto, Air Force 2025, written back in 1996, tacitly admits that the aim is to gradually get people to become acclimatized to brainchips, and that they are aware that few would be comfortable with being asked (or, worse

48

still, forced) into putting brainchips inside their head. The author admits that he hopes these conscientuous objections will have disappeared by the year 2025 to the point where infantry soldiers will be mandated as part of standard protocol to be implanted with them. To allay any fears concerning what exactly can be done with brainchips, a white lie is introduced that could be accurately summarized as: Dont worry, this brainchip will only enable the person to control technology - it cannot be used to control the person itself. That claim on its face could be discounted out of hand - because the techical capabilities to allow for this type of control have been with us for at least a few decades now. Jose Delgado was vanaf 1965 bezig met experimenten waarbij hij zogenaamde stimoceivers (elektroden) in het brein implanteerde van apen, muizen, katten, honden en stieren. Door stimulering van de hypothalamus was het mogelijk voor hem om met een remote control applicatie het onderwerp aggressief, passief of wanhopig te maken. Tevens was het mogelijk om middels deze stimulering het beest met een soort joystick-achtige contraptie te bedienen. Nadat zijn experiment met een stier in de ring een succes bleek te zijn, ging hij deze technologie verder ontwikkelen voor toepassing op mensen. Maar dit document uit 1996 laat de lezer doen geloven dat dit niet de bedoeling is in dit geval - erg moeilijk om te geloven, aangezien het leger altijd al een regimentatief systeem is geweest waarin een duidelijke hierarchie in zit - en dat er gedaan moet worden wat de Commandant of Generaal zegt, zonder dat gewetensbezwaren daarbij in de weg kunnen zitten. Dit is tevens het kwaad dat ik zie in de manier waarop deze transitie naar het informatietijdperk wordt doorgevoerd - achterhouding van informatie, natuurlijke angst van het volk voor bepaalde invasieve handelingen wegnemen door ze als kinderen te behandelen, en een bepaald soort hedonisme stimuleren (veel drinken, veel sexuele promiscuiteit, veel oppervlakkig feesten) zodat men afgeleidt is van de maatschappelijke veranderingen die, eenmaal doorgevoerd, voor altijd zullen gelden en voor een lange tijd niet onderhevig zijn aan reformering17 .
17 Some food for thought: utilitarianism is based on the principle of hedonism - the greatest happiness principle operates under the assumption that the only two intrinsic values worth quantifying in this world are pain and pleasure. Bentham was squarely against the concept of intrinsic rights (it was also out of similar convictions that he wrote a scathing essay on the American Declaration of Independence, which formed part of the British governments ocial rebuttal to the pbulication of said document in July 1776). Even the concept of absolute moral value judgements were nonsense according to Bentham - instead, he had thought up a couple of variables (or vectors, if you may) that would calculate the pain or pleasure eect of any given action. This is what is known as the hedonistic calculus. Coincidentally, it is interesting to point out that in the current era were living in, there has been a gradual implementation of the panopticon on the whole of society, while at the same time we have seen an increase in hedonistic behavior (think of the various sexual fetishes of today, the halfnaked starlets such as Lady Gaga, Beyonce and Rihanna posing and singing suggestively in various schlock music clips aired by MTV and TMF, the coma-drinking prevalent in Europe, the constant 365 days per year partying that has become the norm on college campuses, vast promiscuity and a rapid increase in one-night stands and a substantial rise in divorces, the normalisation of extramarital aairs, indelity, and so on. What is a constant in all of this? Pain and pleasure - pain is felt when someone has been cheated on by his spouse/partner, while the inverse of pain, namely pleasure, is experienced after having committed the umpteenth

49

Fig. 17: Ever-increasing hedonism in a panoptical society - Maxim - March 2010 - Sex - Cheat And Dont Get Caught - Women Tell You How. An extract from the article: "Dont want to sh o the company pier? Open a branch oce, like Danielle, a 29-year old photographer, who cheats only on business trips. "I love my boyfriend, but monogamy is for the birds," she says. "I enjoy fucking new guys, then going home to the man who loves me. Id never want him to run into them, so I only do it in other cities"

10 Dehumanization

50

10 10.1

Dehumanization Dehumanization of war

The total rationalisation of war has been attempted before, but succeeded only in perpetuating more irrationality instead of less. A good example of this is the policy by Robert McNamara during the Vietnam war to introduce body counts - by which the performance of a battalion of soldiers was measured by them reaching their quota for the given week or day. Underachieving battalions could expect to be disciplined or punished for failing to meet their targets hence why every battalion tried to achieve their targets, irrespective of the means by which they had to achieve it. This led to soldiers willfully executing countless innocent civilians to reach the quota - a quintessential example of institutionalized evil brought about by bad and failed policies, either by sheer malpractice or irresponsible ethical behavior on the part of the policy makers. A similar dehumanization process is currently ongoing in the current RMA wars - Afghanistan and Iraq. For instance, a video leaked by Wikileaks showed a Western journalist in Iraq being mowed down by the Army, as well as the rst responders that came to the mans aid. There are a couple of factors at play here - in the rst place, the UAV/gundrone attender is far removed from the actual battleeld, his only outlook into the real world being this monitor he peers through and an input device in the form of a joystick - not unlike playing a videogame. He then identies a perceived enemy, and asks for permission to shoot. Once being authorized to shoot to kill, he proceeds to take him out as quickly as possible. When the ground troops eventually tell him that he even managed to kill and maim several children, the soldier in question reacts nonchalanty: Dan hadden die kinderen daar maar niet moeten zijn. There is a real sense of detachment and lack of personal responsibility on display here. The self-centeredness and lack of a moral compass could be explained by the sense of detachment that tele-existence/tele-presence helps engender in the person ten eerste kan hij de gevolgen van zijn acties niet in levende lijve zien - hij ziet het vanuit een monitor/TV scherm. Ten tweede is hij op Pavloviaanse manier geconditioneerd thuis om met een joystick via een computerspel zoals Call Of Duty: Modern Warfare 2 zogenaamde search-and-destroy operaties uit te voeren. The man-machine interface consists of a HUD, a gun and a visor, and every target that pops up on the screen has to be neutralized. Current-day rstperson shooters are commonly developed in co-operation with defense contracators and have the added psychological side eect of hardening the would-be soldier prior to becoming enlisted in the Army.. Er zijn zoveel gesimuleerde moorden gepleegd in een virtuele omgeving - zoveel gesimuleerde moorden vertoont op TV en in lms - dat de actie vermoorden is genormaliseerd - het vormt onderdeel
sexual act with a mistress or lover that has eluded his or hers partner. Mainstream media is capitalizing on these changing morality rulesets - Ashley Madison is an online dating service for people currently in a relationship who want to have sex with someone else, while Maxim has advertised on the cover of its April 2010 issue an article with the headline Sex - Cheat And Dont Get Caught - Women Will Tell You How.

10 Dehumanization

51

van de cultuur waarin de soldaat is opgegroeid. Het verminderen van dit kwaad:Een oplossing zou kunnen zijn - een soort Three Laws Of Asimov ingebouwd in een UAV of robot dat hen ervan weerbiedt om onrechtvaardige handelingen uit te voeren. Te denken valt aan de Three Directives van Robocop (1987, Paul Verhoeven). Maar zelfs zon oplossing is niet immuun voor corruptie - zo werd Robocop namelijk ook een vierde, verborgen directief gegeven: onder geen enkele omstandigheid mocht hij een van de bestuurshebbenden van het bedrijf dat hem gemaakt had, OCP (OmniConsumer Products), aanvallen of arresteren. Mocht het nu net het geval zijn dat de adjunct-directeur van het bedrijf, Dick Jones, zelf schuldig was aan moord en Robocop hiervan het belastend bewijsmateriaal had, maar niet kon optreden tegen zijn superieur.

10.2

Dehumanization of the person

As a result of the shift to the information age, long-standing attitudes with regards to privacy have been shaken or irreparably severed. An often-quoted slogan after the 9/11 terrorist attacks was that one had to be corralled into giving up their liberties for security, which was followed a few years later by a more or less indierent attitude with regards to the right to privacy. The rise of social networking and the newly granted ability by the individual user with an Internet connection to form communities or clans consisting of people that (prior to the Internet age) he would not have the foggiest chance of ever meeting with has all led towards a certain kind of identity management becoming the average persons only form of currency. To reiterate a previous statement made in this document that would put this into perspective: In an information age, the primary currency is information. Previous to the information age, the general publics daily activities were more or less indirectly governed by institutions through the willfull and conditioned consent of that very same mass public. Institutions of intimicacy, such as dating, romance, and personal relationships, all followed certain rulesets, and nearly all hinged on the ability of the average individual to retain their own private feelings of intimicacy and aection - feelings and thoughts which are not known to anyone but that person, and only that person alone. In the information age, this long-cherished idea of inner sanctum makes way for a form of identity management whereby one projects a digital facade of ones own identity online. Using the popular social networking sites, blogs, Twitter and the like, people choose to input massive amounts of personal information about themselves for what amounts to little or no commercial incentive or personal gain - the primary impetus being to socialize for socialisms sake. By letting others know about your sexual escapades, letting people know about their own personal break-up vis-a-vis Twitter and posting pictures of a party you visited the other day are all ways of creating a personal dialogue that revolves around you. As this document astutely points out:

10 Dehumanization

52

In other words, the labor of the new individual is a labor of selfpresentation. Strangely enough, this labor of self-presentation, which used to be the domain of celebrities such as movie or rock stars, is now a full-time labor for many individuals, who, for example, wear their emotions on their t-shirts or sweatpants that read MILF in Training, Jerk Magnet, Your Boyfriend Wants Me, or Juicy. - Public Intimacy and the New Face (Book) of Surveillance: The Role of Social Media in Shaping Contemporary Dataveillance One can see where this idea became about to the point where it rewired the general publics daily lives so drastically. For instance, witness the rapid explosion of so-called reality television shows (such as Big Brother, Survivor) where supposed average common-day folk become the subject of attention in a major hit TV series, where they compete with each other for prizes. Most of the time this race to the top leads to a lot of backstabbing, heated ghts and general hostile behavior towards each other. What is central in all of this, is that the people inside this gameshow are constantly being monitored. Therefore, in order to become popular with the viewing audience, one has to project an external persona of oneself - in order to stay interesting to the television crowd, or sway the crowd if you will (similar to what gladiators used to do in gladiatorial events in Rome). By donning T-shirts with texts such as MILF in training, Jerk Magnet, or Your Boyfriend Wants Me, the fashion industry is capitalizing on this newfound desire to self-project ones own embellished persona to the outside world - but in such a way that it binds the intimitate act/intent with this desire self-presentation. Whereas previously dating or intercourse between a man and a woman was bound by a strict ruleset of how to pick up a girl and how not to, in this information age the woman wears a couple of inner self status notications on her shirt - such as MILF in training - signs which act more or less like sensors for the men who, from a Network-Centric Warfare perspective, pick up on these sensors through the information grid, and then reespond/engage the object of desire in kind - in eect skipping the foreplay altogether. One constant in all of this is an increase in voyeurism, but most of all the eradication of an inner sanctum for your thoughts and feelings - everything that matters when it comes to intimicacy, becomes personal - socialised. Everyone has a right to know ones inner feelings, ones inner thoughts, and ones inner likes and dislikes - presumably out of some need to become all interconnected like a global village. So, because the average John Doe or Jane Doe does not exercise much power in the role provided to him by society, he instead makes this trip into the self and lets his whole world revolve around self-projection - the external hologram of his inner self that he projects to the outside world, completely willingly, and without any enforcement or mandate on the part of government. Rather, new, free services such as Facebook, Youtube, Myspace, blogs, Twitter, and the rapid rise of the Internet helped bring all this about, one medium of exchange after another one part of a jigsaw puzzle perfectly falling into place to form a

10 Dehumanization

53

panoptical sense-and-respond society.

10.3

Dehumanization of surveillance and intelligence gathering


An important characteristic of the new surveillance is that it relies on a machine based, automated collection of personal information. Even the most innocuous transactions leave [a] data trail that can be stored for later analysis(Gandy, 2002; Marx, 2004) - Public Intimacy and the New Face (Book) of Surveillance: The Role of Social Media in Shaping Contemporary Dataveillance

It is well understood by now that, by reducing people to mere numbers on a broadsheet, the person is eectively dehumanized - he or she has become just another insignicant number forming part of a larger population set. This same dehumanizing procedure is now also being applied to scientic inquiry, data mining, surveillance and spying, all of which is being performed by machines (intelligent ones at that - cameras, sensors, UAVs) rather than a real private inspector spying on you. Because storage is cheap and plentiful, it enables the institutions in charge of surveillance camera networks to store everything for future reference without the inconvenience of having to delete camera footage of inconsequential days because the server is running out of storage space. Third, data mining rationalizes surveillance by removing humans from the interpretation process. The dehumanization of the analyses is important: because it removes the so-called human bias from the interpretation process. As such, when combined with the fact that contemporary data mining relies on quantication of information (a seemingly dispassionate and objective method of interpreting the social world), this dehumanization projects an aura of objectivity, consequently making it even more dicult to challenge its premise (and the ndings it provides). - Public Intimacy and the New Face (Book) of Surveillance: The Role of Social Media in Shaping Contemporary Dataveillance The institution would argue that this helps make the case for mass surveillance, since human bias or abuse is taken out of the equation by removing the human element - the camera or ground sensor does not act discriminatory, but merely perceives a certain event (such as motion, sound or an image) and based upon this triggering event, the datamining services can then kick into gear and pull up relevant information about the object in question (for example, a man or a woman that is caught in suspicious behavior). Anything that could go wrong, and does go wrong mostly when talking about surveillance and potential privacy abuse, is blamed on the human element. By having machines do all the work, like the author of the article above states so eloquently, an aura of objectivity is projected, making it dicult to argue against the central premise behind this method of surveillance.

54

Part VII. Explanation of concepts


Much of the literature available on the Revolution in Military Aairs is swamped with acronyms. The reason behind this fondness for three- and four-letter acronyms is because of their brevity (which comes especially in handy during ISR missions - status indications can be relayed faster by speaking in acronyms rather than entire grammatically-correct sentences and terms). But the side eect is that to the layman - who is not familiar with all these terms and slogans encapsulated inside these acronyms - military documents become almost impenetratable. With this in mind, following is a list of acronyms commonly deployed by the Defense Department.

11 Acronyms

55

11

Acronyms
Term BFT C2 C3I C4ISR Explanation Acronym for: Blue Force Tracking. Acronym for: Command, Control. Acronym for: Command, Control, Communications, Intelligence. Acronym for: Command, Control, Communications, Computers, Intelligence, Surveillance, Reconnaisance. Acronym for: Closed-Circuit Television. Acronym for: Central Intelligence Agency. Acronym for: Chief Information Ocer. Chemical formula for Carbon Dioxide. Acronym for: Counter Intelligence Program. Acronym for: Defense Advanced Research Projects Agency. Acronym for: Department of Homeland Security. Acronym for: Department of Defense. Acronym for: Department of Defense Architecture Framework. Acronym for: Eects-Based Operations. Acronym for: Future Combat Systems. Outdated term for Brigade Combat Team Modernization (BCT Modernization). Acronym for: Global Information Grid. Acronym for: Geographic Information Systems. Acronym for: Global Positioning System. Acronym for: Internet Of Things. Acronym for: Intelligence, Surveillance, Reconnaisance. Acronym for: Military Operations Other Than War. Acronym for: Network-Centric Warfare. Acronym for: Network-Centric Operations. A new name for the concept Network-Centric Warfare. (NCW) Acronym for: Non-Combatant Evacuation Operations. Applied in natural disasters like Hurricane Katrina (2005). Acronym for: Non-Lethal Weapons. Acronym for: Observe, Orient, Decide, Act. Acronym for: Oce of Net Assessment. Acronym for: Private Military Corporation. Acronym for: Psychological Operations. Acronym for: Revolution In Military Aairs. Acronym for: Sense & Respond. Acronym for: Unmanned Aerial Vehicle. Acronym for: Unmanned Combat Aerial Vehicle. Acronym for: Weapons of Mass Destruction. Is a smaller subset of the broader category Weapons of Mass Eect .

CCTV CIA CIO CO2 COINTELPRO DARPA DHS DoD DoDAF EBO FCS GIG GIS GPS IOT ISR MOOTW NCW NCO NEO NLW OODA OSD PMC PSYOP RMA S&R UAV UCAV WMD

56

Part VIII. References


[1] Internet Of Things - An action plan for Europe. Technical report, Commission Of The European Communities, June 2009. URL http://ec.europa.eu/ information_society/policy/rfid/documents/commiot2009.pdf. [2] Air Force 2025, 1996. Air University. URL http://www.fas.org/spp/military/ docops/usaf/2025/. [3] Thomas P.M. Barnett. The Pentagons New Map: PowerPoint Presentation, June 2004. URL http://www.c-spanvideo.org/program/182105-1. [4] Yudhijit Bhattacharjee. Pentagon Asks Academics for Help in Understanding Its Enemies - alexander h. levis. Science Magazine, 316, April 2007. [5] James W. Canan. Military Networks Take Center Stage. Aerospace America, October 2002. URL http://www.aiaa.org/Aerospace/Article.cfm?issuetocid= 267&ArchiveIssueID=31. [6] Matthew Carr. Revolution in Military Aairs: Its why were here - The man and the doctrine at the heart of our adventurism. July 2009. URL http://tiny.cc/ vzj8j. [7] Arthur K. Cebrowski. Special Brieng on Force Transformation, by the Director of Force Transformation. November 2001. URL http://www.au.af.mil/au/awc/ awcgate/transformation/t11272001_t1127ceb.htm. [8] Larry Collins. Mind Control. Playboy Magazine, January 1990. URL http: //tiny.cc/4xx71. [9] Rhonda Copley and Eric Wagner. Improved Situational Awareness through GIS and RFID in Military Exercises. In ESRI international User Conference Proceedings, page 8, August 2006. URL http://proceedings.esri.com/library/ userconf/proc06/papers/papers/pap_2350.pdf. [10] Cori E. Dauber. YouTube War: Fighting in a World of Cameras in Every Cell Phone and Photoshop on Every Computer. November 2009. URL http://www. strategicstudiesinstitute.army.mil/pubs/display.cfm?pubID=951. [11] Gilles Deleuze. Postscript On The Societies Of Control. December 1992. URL http://users.sfo.com/~rathbone/deleuze.htm. [12] Thomas Donnelly. Rebuilding Americas Defenses. page 90, September 2000. URL http://www.newamericancentury.org/RebuildingAmericasDefenses.pdf. [13] Nathan Eagle, Alex Pentland, and David Lazer. Inferring Social Network Structure Using Mobile Phone Data. In Workshop on Social Computing, Behavioral Modeling, and Prediction, 2008. URL http://www.public.asu.edu/~huanliu/ sbp08/Presentations/Papers/04_eagle_SPB08.ppt. [14] Terrill L. Frantz. Dynamic network analysis: Automap/ora/dynet - annual tools/computational approaches/methods conference. In Inferring Adversary Intent and Estimating Behavior, Behavioral Inuences Analysis Center (BIAC) Workshop. Carnegie Mellon University, 2008. URL http://www.au.af.mil/bia/ events/conf-mar08/frantz1_mar_08.pdf.

57

[15] Shane Harris. Features - an internet of things. Government Executive, September 2005. URL http://www.govexec.com/features/0905-01/0905-01s2.htm. [16] Jeremy Hsu. Intel wants brain implants in its customers heads by 2020 - researchers expect brain waves to operate computers, tvs and cell phones. Popular Science, November 2009. URL http://www.popsci.com/technology/article/ 2009-11/intel-wants-brain-implants-consumers-heads-2020. [17] Richard O. Hundley. Past Revolutions, Future Transformations - What can the history of RMA tell us about transforming the US military? RAND Corporation, 1999. ISBN 0833027093. URL http://www.rc.rand.org/pubs/monograph_ reports/2007/MR1029.pdf. [18] Samuel Huntington. The clash of civilizations? Foreign Aairs, 1993. URL http://www.foreignaffairs.com/articles/48950/samuel-p-huntington/ the-clash-of-civilizations. [19] Lukasz Kamienski. The RMA and War Powers. Strategic Insights, 2, September 2003. URL http://www.comw.org/rma/fulltext/0309kamienski.pdf. [20] Steven Metz and James Kievit. The Revolution in Military Aairs and Conict Short Of War. July 1994. URL http://www.strategicstudiesinstitute.army. mil/pubs/display.cfm?pubID=241. [21] Janet Miller. Commanders Predictive Environment. In Inferring Adversary Intent and Estimating Behavior, Behavioral Inuences Analysis Center (BIAC) Workshop. Air Force Research Laboratory, 2008. URL http://www.au.af.mil/ bia/events/conf-mar08/miller_cpe_mar_08.ppt. [22] George Orwell. Second Thoughts on James Burnham. Polemic, 1946. URL http://orwell.ru/library/reviews/burnham/english/e_burnh. [23] Tara OToole, Georges Benjamin, and John Thomasian. Bioterrorism Threats, February 2002. URL http://www.c-spanvideo.org/program/168814-2. [24] David M. Rorvik. Bringing The War Home. Playboy Magazine, September 1974. URL http://tiny.cc/hqgkt. [25] Donald Rumsfeld, Richard B. Myers, and Pete Aldridge. Defense business practices, September 2001. URL http://www.c-spanvideo.org/program/165947-1. [26] Fred Stein and Brian Clark. Arming with Intelligence: Data Fusion in NetworkCentric Warfare, December 2007. URL http://www.objectivity.com/media/ data-fusion-and-network-centric-warfare/default.asp. [27] Warren P. Strobell. The spy who funded me (and my start-up) - the CIAs venture capitalist in Silicon Valley. U.S. News And World Report, pages 38 39, July 2000. URL http://www.novariant.com/news/pdfs/autofarm_feature_ stories/071700USNewsCIA.pdf. [28] John D. Sutter. Why games will take over our lives. CNN, April 2010. URL http://edition.cnn.com/2010/TECH/04/05/games.schell/index.html. [29] Alvin Toer. Future Shock. 1970. ISBN 0553277375.

58

[30] Seungjin Whang. Sense and Respond - the Next Generation Business Model. May 2005. URL http://www.gsb.stanford.edu/news/research/supplychain_ whang_senserespond.shtml. [31] Rick E. Yannuzzi. In-Q-Tel: A New Partnership Between the CIA and the Private Sector. CIA, 2000. URL https://www.cia.gov/library/publications/ additional-publications/in-q-tel/index.html.

Index
9/11, 10, 19, 23 9/11 Wargames Global Guardian, 23 Operation Tripod, 23 Vigilant Guardian, 23 Analytic Services, 24 ANSER Institute, 24, 25 Apple iTunes, 40 Articial Intelligence, 43 Asimov, Isaac, 51 Barnett, Thomas P.M., 19, 21, 29 Bentham, Jeremy, 8, 38, 48 Hedonistic calculus, 48 Panopticon, 8, 38, 41, 48 BioLuddite, 45 Blackwater, 26 Total Intelligence Solutions, 26 Xe Corporation, 26 Blitzkrieg, 9 Boyd, John, 17, 18 Burnham, James, 43 Bush, George W., 16, 23, 26 C2, 3 C3I, 3 C4ISR, 3 CAESAR CAESAR II/Eb, 35 Pythia, 35 CAESAR III, 35 TEMPER, 35 Carnegie Mellon University, 36, 41, 42 Cebrowski, Arthur K., 9, 10, 29 Central Intelligence Agency (CIA), 24, 26 Cheney, Dick, 6, 16 Chief Information Ocer (CIO), 9 Clarke, Richard A., 45 Closed-circuit television (CCTV), 10 Cognitive capacity, 43 Cold War, 29 Collins, Larry, 47 Commanders Predictive Environment, 35, 37 Cooperative Engagement Capability, 13, 19, 20 Council On Foreign Relations, 8 Foreign Aairs (magazine), 8 Course Of Action (COA), 1618, 35 Crisis management, 35 Data Mining, 33 David, Ruth A., 24, 25 Deleuze, Gilles, 8, 9 Delgado, Jose, 47, 48 Stimoceiver, 47 Department of Defense, 26, 28 Oce of Force Transformation, 10 Department of Defense Architecture Framework, 28 C4ISR Architecture Framework, 28 Digital Millennium Copyright Act (DMCA), 31, 40 Digital Rights Management, 40, 41 DTCP-IP, 40 HDCP, 40 MPEG-21, 40 MPEG-7, 40 Digital Rights Management (DRM), 40 Domain Name System (DNS), 3 Edge Magazine (magazine), 46 Eects Based Operations, 15, 16 Shock And Awe, 16 End-User License Agreement (EULA), 32, 41 Enterprise architecture, 28 Supply chain, 12, 45 Zachman Framework, 28 European Union, 24, 28 European Union Copyright Directive (EUCD), 31, 40 Facebook, 24 FBI, 23 FEMA, 23 Foucault, Michel, 8 Fresco, Jacque, 44 Game Theory, 3 Geographic Information Systems (GIS), 19, 33, 35

60

George Mason University, 35 Giuliani, Rudy, 23 Global Information Grid, 3, 10, 20, 28, 38, 41 Global Positioning System (GPS), 19, 33, 35, 38 Google, 24, 26, 27, 35, 38 Google AdSense, 35 Google Earth, 19, 26, 27, 38 Guattari, Felix, 8 Gulf War Operation Desert Storm, 29 Heads Up Display (HUD), 50 Hedonism, 48, 49 Ashley Madison, 50 Huntington, Samuel, 6, 8 Hussein, Saddam, 16 Hypervisor, 32 In-Q-Tel, 2426 Information Operations, 17 Information overload, 57 Intel, 47 Intellectual copyright, 32 Internet, 30 Internet Protocol, 29 IPv4, 29 IPv6, 3, 28, 29 Internet of Things, 3, 28, 29, 38 Object Naming Service, 3 Internet Service Provider (ISP), 31 ISR, 15, 18, 54 Joint Vision 2010, 9, 10 JSIMS, 35 Kant, Immanuel, 45 KeyHole, 24, 26, 27, 38 KH Reconnaissance satellites, 26 Lewinton, Richard C., 23 LifeLog, 24 Loral Skynet, 26 Marshall, Andrew, 6 Marxism, 43, 44 Maxim (magazine), 50 McNamara, Robert, 50 Microsoft

Xbox 360, 41, 42 Project Natal, 42 Military Operations Other Than War, 37 Minority Report (movie, 2002), 39 MITRE Corporation, 4 Nanofactories, 43 National Reconnaissance Oce (NRO), 23 Network-Centric Operations, 12, 28 Network-Centric Warfare, 913, 1820, 27, 52 Engagement Grid, 913, 15, 19, 27 Information Grid, 9, 11, 12, 27 Sensor Grid, 9, 10, 12, 27 New Federalism, 24 NGO, 24 Oce of Naval Intelligence, 29 Oce of Net Assessment (OSD), 6 OODA, 15, 16, 18 Operating System, 32 BSD, 32 Linux, 32 Operations Research, 3, 18, 38 Orwell, George, 43 PATRIOT Act, 19 Pavlov, Ivan, 50 Pentagon, 29 Powell, Colin, 16 Predictive Battlespace Awareness, 18 Prince, Erik, 26 Private Military Corporation, 26 Project For A New American Century, 21 Psychological Operations, 17 Quigley, Carroll, 8, 9 Tragedy and Hope (book, 1966), 8 Radio-Frequency Identication (RF ID), 10 Radio-Frequency Identication (RFID), 12, 29, 38 RAND Corporation, 19, 24, 25

61

Revolution in Military Aairs (RMA), 3, 5, 6, 9, 16, 17, 19, 21, 23, 29, 30, 32, 35, 47, 50, 54 War on Terror, 23 Role-based access control (RBAC), 22 Royal Institute of International Aairs, 8 Rumsfeld, Donald, 6, 10, 16, 22, 23 Schell, Jesse, 41, 42 Sense & Respond (S&R), 12, 15, 18, 38, 41, 45 Situational Awareness, 13, 19 Skinner, B.F., 13, 41 Stimulus-response theory, 13 Skype, 30 Social Computing, 33 Dynamic Network Analysis, 33 Social Network Analysis, 33 Social networking, 3234 Dynamic Network Analysis, 36 Facebook, 33 Hyves, 33 Myspace, 33 Social Network Analysis, 36 Sony, 32 PlayStation3, 32, 41 OtherOS, 32 PlayStation Network, 32 Soviet Union, 22 Stein, Fred, 4 Strategic Studies Institute, 15, 16 Sun Microsystems, 10 Supply chain, 14 System of Systems (SOS), 13 The Clash of Civilizations (book, 1996), 6 Toer, Alvin, 5, 7 Future Shock (book, 1970), 5, 7 Total Information Awareness, 24 Transhumanism, 4345 Twitter, 9, 30, 51 Unmanned Aerial Vehicle (UAV), 11, 13, 15, 20, 29, 50, 51, 53 US Air Force, 25, 47 US Army War College, 17 Utilitarianism, 48 Venture capital rm, 24

Venus Project, 44 Vodafone, 5 Warwick, Kevin, 4446 Weapons of Mass Eect, 16 Weapons of Mass Destruction, 16 Wolfowitz, Paul, 6 World War II, 3 Y2K, 21 Zeitgeist Addendum (documentary, 2008), 44

You might also like