Академический Документы
Профессиональный Документы
Культура Документы
to the present
Transformation of world society and state through worldwide military
revolution
NetCentricTruther
Keywords: Revolution In Military Affairs, Net-Centric Warfare, Net-Centric Oper-
ations, Weapons Of Mass Effect, Effects-Based Operations, Sense-and-Respond, Co-
operative Engagement Capability, Sensor Grid, Information Grid, Engagement Grid,
Global Information Grid, Ubiquitous Computing, Smart Grid, Information Warfare,
C4ISR, C2, Andrew Marshall, Office Of Net Assessment, John Boyd, Donald Rums-
feld, Arthur K. Cebrowski, Thomas M. Barnett, Alvin Toffler, Michel Foucault, Gilles
Deleuze, Conflict Short Of War, Military Operations Other Than War, Noncombat-
ant Evacuation Operations, Panopticon, Social Networking, Office Of Force Transfor-
mation, Blue Force Tracking, Data Mining, Zbigniew Brzezinski, Smart Meter, Full
Spectrum Dominance, Cybersecurity, Energy Efficiency, PositiveID, Radio Frequency
Identification (RF ID), Asymmetrical Warfare, Asymmetric Threat, Counterinsur-
gency, Precision Engagement, Force Multiplier, Cognitive Capacity, Carbon Credits,
Psychological Operations, Dataveillance
Abstract
Notice: Personal opinion has been withheld as much as possible.
All of the claims within this document have been documented and sourced. As
little as possible is left to the author’s own interpretation of the facts.
Contents
1 Synopsis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1
2
VIII References 55
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
1 Synopsis
• The Global Information Grid and the Internet of Things are computer
network-related and are completely dependent on IPv6 as the underlying
protocol.
• The ’Internet of Things’ will engulf the entire Planet - a so-called ’Object
Naming Service’ will take on the role of DNS-server so that all these
’things’ can be identified by uniquely addressable, human-comprehensible
names.
• Network-centric warfare is codified by a three-layered network, consisting
of a ’sensor grid’, an ’information grid’, and an ’engagement grid’. Users
access this network by way of C4ISR-systems (C4ISR stands for Com-
mand, Control, Communications, Computers, Intelligence, Surveillance
and Reconnaissance - it is a military buzzword that can be accurately
summarized as referring to a shared ’network’ where practically every-
body within the Defense Department all communicate to each other with,
allowing them to jointly execute and co-ordinate missions. The biggest
difference between earlier iterations of the same systems - C2, C3I - is the
central role that ’computers’ now play within that systematic process)
• Almost all of the technology that is being purpose-made for the ’Revo-
lution In Military Affairs’ is being spearheaded by ongoing technological
developments within the ICT private sector - ’sense and respond’ at the
same time allows for a new supply chain for both business affairs as well
as those of war. A precedent can be found in the utilization of Opera-
tions Research and Game Theory in general - Operations Research was
a shared doctrine between the Allied Forces during World War II before
being widely adopted as a business doctrine worldwide.
• The ’Revolution in Military Affairs’ is inextricably linked to the ongoing
transition to the ’information age’. The ’information age’ is driven first
and foremost by computers - ’content’ and ’information’ is now king, and
this, it is argued, will change the entire fabric and social stratification of
society.
1 Synopsis 4
2. Second Wave - The industrial age that replaced the ’agrarian age’. Power
was now centralized in the hands of the companies with finance capital to
back them up instead of plantation owners. This coincided with a major
relocation to the major cities.
3. Third Wave - The ongoing ’third wave’ that intends to replace the ’indus-
trial age’. This ’third wave’ is characterized by rapid, continuous change -
continual habituation to the new norms and an information-centric ’econ-
omy’ that won’t really sell real tangible ’products’ as much as it sells
’information-based services’ and intangible products. For instance, con-
sider the example of a mobile communications provider such as Vodafone
- the ’product’ that is being sold is not so much the mobile phone unit,
but the ability to communicate with each other worldwide for a certain
agreed-upon price. This ’ability’ (or rather ’service’) is not in the hands of
the individual user, but in the hands of the provider - and can be revoked
or its terms of conditions changed at any given time.
The first books penned by Toffler were rather optimistic in tone and rather
incredulous in terms of the claims and predictions being made. This rapidly
made way in the ’90 for more militaristic follow-up books that laid the emphasis
on the ’revolution in military affairs’ that would actually bring the ’information
age’ into being.
2 From the industrial age to the information age 6
His most noteworthy book is his bestseller from 1970, entitled ’Future Shock’[29].
The titular ’shock’ from the book Future Shock refers to the ’shock effect’ that
people experience when rapid changes are being wrought in their society. In
the book, Toffler proposes that the rapid pace at which these changes will be
rammed through will bring Joe and Jane Average into a disillusioned state of
affairs - suffering from a ’Future Shock’. On a related note, ’Information over-
load’ has today become a very real problem that was first introduced in this
book - the information age opens the floodgates to ’information’ in such a way
that it can impair and empower the individual in equal measure, to the extent
that those who cannot handle will far outweigh the ones that do. The book is
actually more relevant today than it was back in the ’70s - precisely because
such terms as ’information overload’ are now easily recognizable and identifiable
in today’s society - think of the Internet and the daily flood of e-mails, forums,
news sites, differences in opinions, rumors, controversies, scandals, and so forth.
Fig. 2: "Alvin Toffler’s book Future Shock[29] concerns itself with a societal
shift from the industrial age to the information age. This is the ’future
shock’ alluded to in the title - this change will be so disruptive, and the
pace of technological development will be so rapid, that large segments
of the population will experience stress, mass disorientation, an increase
in domestic violence and be engulfed in general crisis situations. While
in this ’future shock’, people will be suffering from an affliction known as
’information overload’ - too much information can cause a detrimental
effect in people by overloading one’s cognitive senses, This is being taken
advantage of from a psychological warfare perspective. 99 percent of
modern-day wars is psychological and is waged with the distribution
and control/denial of information."
2 From the industrial age to the information age 8
• Islamic civilization
• Hindu civilization
• Chinese civilization
• Japanese civilization
the institute that dictates foreign politics the government of the United States - it has sister
institutes in Great-Britain and the European Union.
2 The European version is called the ’European Union Council On Foreign Relations’; its
British equivalent ’Royal Institute of International Affairs’. It has a branch within every
Commonwealth country; they were also being referred to as the ’round-table groups’ by Carrol
Quigley in his book, Tragedy And Hope.
9
away and make room for a “society of control”. The primary modus operandi,
as the name alludes, is “control”. How this differs from the pre-2001 western
society is that previously, mere engendering of ’discipline’ and application of
best-practice doctrines was enough to ensure ’good’ behavior - ’good’ in the
sense that the individuals’ personal needs were subordinate to that of the ’com-
mon good’, like having to fulfill your role as a ’homo economicus’ to keep the
current economic system afloat, paying your taxes to pay off the national debt,
contributing to society (very ambiguous in nature but commonly employed as
a slogan), and so on. In direct contrast to all of this, the ’society of control’
does not ’encourage’ discipline - it enforces compliance, and makes sure that
your compliance is guaranteed. The stakeholders within this system (’chief in-
formation officers’, corporate bureaucrats, social workers, defense establishment
figures) no longer consider the concept of ’personal responsibility’ as being a
crucial factor to maintaining a healthy and stable society, but rather, prefer a
more conformist approach - ’good behavior’, self-discipline is now ’quantified’,
and rational approaches exist (such as surveillance; questionnaires, data mining
of forum posts/tweets/e-mails) to measure and determine individual and mass
public behavior/opinion.Deleuze covered all of this in his postscript “The Soci-
eties of Control”, as well as alluding to the fact that in order for this to succeed,
the unions had to be on board with this new ’society of control’, lest they be
classified as a potential threat to the new system.
3 Network-Centric Warfare
"Network-Centric Warfare. This RMA candidate was proposed
by Vice Admiral Arthur K. Cebrowski and his colleagues in Joint
Staff/J-6 (Cebrowski and Garstka, 1998). The network-centric war-
3 This as attested by Carroll Quigley in his book, ’Tragedy and Hope’. (Carroll Quigley was
a professor at Georgetown University that holds the distinction of being one of Bill Clinton’s
mentors). In his book, he said of war on p831: “Any war performs two rather contradictory
services for the social context in which it occurs. On the one hand, it changes the minds of
men, especially the defeated, about the factual power relationship between the combatants.
And, on the other hand, it alters the factual situation itself, so that changes which in peacetime
might have occurred over decades are brought about in a few years”
3 Network-Centric Warfare 10
ing its origins [which she erroneously believes to be the US Navy]: “However, the idea really
comes from Sun Microsystems, when the president of Sun [Microsystems] talked about that
it’s not the computer, but it’s the computer in the networked condition or the networked
environment, it’s about network-centric computing - in other words, it is just a word which
goes on the phenomenon of the Information Age.”
3 Network-Centric Warfare 11
3. Engagement grid
Lastly there is the ’engagement grid’. The ’engagement grid’ is on occasion
likened to the executable layer within ’Network-Centric Warfare’ - because
it is within this grid that the actual ’transaction’ occurs, whether that
’transaction’ entails death for the enemy that was just perceived by one of
the sensors, or an ’information assault’ on the hapless individual that was
just ’sensed’ by a commercial company’s sensor grid at a shopping mall.
op basis van het ’sensor netwerk’ die een evenement heeft gedetecteerd
en het ’informatie netwerk’ waarover alle onderlinge communicatie tussen
soldaten, machines en vliegtuigen plaatsvindt, is er ook een derde soort
’netwerk’ dat men in staat stelt om iets te ’doen’ aan dit evenement wat
zojuist is opgetreden.
’audiovisual’ temporal input into the wider information flow, this new supply
chain would be impossible to achieve.
What Sense & Respond (S&R) basically entails is this - based upon an
’incident’ that has been perceived by a ’sensor’, an ’event’ is broadcasted onto
the wider interconnected network. In case some unit on the wider network
perceives this ’event’ to be of strategic importance, a suitable reaction can be
planned and coordinated instantaneously - this is what is understood as the
so-called ’respond’ end of the supply chain cycle.
To put this within the context of pre-existing communicative concepts, think
of B.F. Skinner’s ’stimulus-response’ theory, and add to that a relationship
between a machine/process and an organic subject, such as an individual or
groups of people5 .
Once arrived onto the scene of the ’sensed’ event, the UAV, by way of its
built-in camera, will determine that the subject that caused the ’event’ to be
generated (the ’event’ in this case being the detection of ’movement’ within
a certain area) is an enemy belonging to one of the local militias. Next, the
UAV ’sends’/’broadcasts’ on the information network/grid video footage or a
still image of the threat so that the other entities on the network have pictorial
evidence of this threat, and know where to hit it (this is what is also known
as ’situational awareness’ - the ability for everyone - whether it be soldiers,
machines, unmanned drones and whatnot - to have one shared holistic overview
of the battlespace).
Based on the ’threat level’ posed by the enemy, a decision can then be
formulated as to whether to engage the enemy/neutralise it (a nice-sounding
euphemism essentially for killing it), or take no action at all. For the purposes
of this hypothetical example, the decision has been made to take out the enemy.
Further, in this example, it is not up to a human to make this decision to kill the
enemy - this is agreed upon without human intervention by the system itself.
This brings us to the so-called ’system of systems’, or the so-called ’emergent be-
havior’ that will be exhibited by these interconnected UAVs/warfighters/systems
- everything will participate, strategize and communicate with each other using
a technique called the ’Cooperative Engagement Capability’ whereby each and
every single device, while still operating as one in a so-called ’swarm network’,
will have its own mechanism/algorithms to be able to come to a definitive con-
clusion on whether to engage the enemy based upon the threat assessment or
leave it up to the other units.
The ’engagement grid’ now comes into play. The engagement grid is a net-
work that makes use of the ’sensor’ and ’information’ grids to perfectly pinpoint
the ’target’ to be ’engaged’. Given the ’units’ available on the ’engagement grid’
(as in - the warfighters - armed UAVs that are currently patrolling the area),
the ’target’ can then be taken out with precision military strikes.
Fig. 4: ’Information sensors’ enable new ways of warfare - the new supply chain
’sense and respond’ is both applicable to business problems as well as
those of war.
3 Network-Centric Warfare 15
Warfare’. The hypothetical example takes place in a warzone where the United
States is embroiled in a guerilla war against local insurgents. A broad array of
sensors have been installed in this warzone. Now, suppose that the sensors are
’motion capture’-based, and that one of the sensors in this array detects move-
ment in the warzone that does not belong to that of the ’blue team’ (which
would be the good guys, the guys on your side), but to the ’red team’ (the
enemy). The sensor ’passes’ the notification of this ’event’ (event: a Red Team
’node’ moved inside the warzone) to the wider ’information network/grid’ (in
network-parlance, we would use the term ’broadcasting’ instead of ’passing on’
when referring to transmitting something to every node on a network). Fol-
lowing the broadcasting of the notification, one of the UAVs (Unmanned Aerial
Vehicle) that is currently patrolling the area picks up on this broadcast and
decides to scour the area. The UAV’s inclination to investigate ’events’ of this
nature depends on what all the other UAVs within the vicinity are currently
doing - in this case, they are all currently preoccupied with something else,
hence it’s the UAV’s prerogative to investigate this ’event’. If it senses that
the ’event’ consists of a key enemy hostile, it will destroy the enemy using its
onboard weapons.
The scenario for this example was an Intelligence-Surveillance-Reconnaisance
mission making use of a Sense & Respond supply chain (the sensors that form
the sensor grid; the information grid that the sensors and the UAVs/warfighters
both use; and finally, the engagement grid [].
Of Action6 . The next phase in the RMA agenda would involve a counter-
insurrection/counter-insurgency scenario where the military needed to respond
with military force against an increasingly disillusioned populace ready to go on
the offensive.
The following document from 1994 lays out a hypothetical scenario concern-
ing the potential implementation of the RMA and its causative effects. There
are many similiarities between the real sequence of events that unfolded in Iraq
and the fictional scenario provided in this document, with the only key differ-
ence being that the ’counter-insurgency’ operation in the fictional scenario took
place in Cuba instead of Iraq.
“Potential or possible supporters of the insurgency around the
world were identified using the Comprehensive Interagency Inte-
grated Database. These were categorized as "potential" or "active,"
with sophisticated computerized personality simulations used to de-
velop, tailor, and focus psychological campaigns for each.
Individuals and organizations with active predilections to sup-
port the insurgency were targets of an elaborate global ruse using
computer communications networks and appeals by a computer-
generated insurgent leader."
"Psychological operations included traditional propaganda as well
as more aggressive steps such as drug-assisted subliminal condition-
ing.” - The Revolution in Military Affairs And Conflict Short Of
War, Steven Metz, James Kievit, 7-25-1994, US Army War College[20]
This document suggests that creating ’computer-generated’ terrorist insurgent
leaders to claim responsibility for ’staged raids’ and ’attacks’ would be an in-
tegral factor in ’Information Operations’. The intent would be to mislead, to
confuse, to lead would-be insurgents and terrorist sympathizers along a specific
path that has been anticipated beforehand by the ones running the ’Information
Operation’. This would constitute a ’deception operation’, with the specific aim
to infer behavior, midnsets and loyalty to a particular tribe or militia.
Further, the document notes that ’deception’, although frequently used by
the military, is somehow thought of as ’un-American’, and thereby difficult to
sell as being a good thing.
Various ’crisis management’/’threat inference’ have been used during the
2006/2007 Iraq insurgency to determine ’hostile intent’ among the insurgents
and try to ’infer’ possible ’Course of Actions’ to plan against. For more infor-
mation, see the References section ([4]).
6 People labouring under the misconception that Bush’s ’Mission Accomplished’ speech
was testament to the general perceived incompetence and ineptitude surrounding him as a
Commander-In-Chief should read the document “The RMA And War Powers” by Lukasz
Kamienski, contributor to the Strategic Insight, a periodical by the Center for Contemporary
Conflict (CCC). Written in the immediate aftermath of the 2003 Iraqi invasion, it conceded
that: “the RMA is making longer wars that might trigger the War Powers Act less likely,
establishing de facto authority for Presidents to make war.”[19]
3 Network-Centric Warfare 18
two having their own demarcated areas of interests and their own (incom-
patible) communication protocols. This required the standardization of
all protocols and bringing all the various disparate forms of communica-
tion available to the Marines and the Navy together and interoperable by
way of an all-encompassing communications network framework.
• Information had to be ’shared’ between agencies and access to the infor-
mation should be governed using ’role-based access control’. To make a
long story short, the ’culture’ of the organisations involved had to be open
to change instead of resistant and hostile to change - they had to ’evolve’.
Previously, the prevailing tendency within the various disparate agencies
was to ’hoard’ information - certain agencies were opposed to each other
and didn’t like to share information inbetween each other. All this internal
infighting had to make way for a new business culture based on ’sharing’ of
information - this would require shared ’communities of interest’, agreed-
upon semantics, and agreed-upon rulesets amongst the various agencies
participating with each other as a joint force.
• The commercial sector had to invest more heavily in defense-related projects,
and at the same time, the Defense Department shoud incentivize private
companies doing so. There was the perception that the commercial sector
had outperformed military-grade computer projects and hardware on a
much tighter budget - and this ’waste’ in terms of military spending and
duplication of technology (the wheel had to be reinvented by the military
while a commercial product would do just as well, and be a lot cheaper)
was an issue that people like Rumsfeld felt could be avoided by fostering
stronger ties with the private sector.
The shrinking Pentagon budgets during the ’90s (after the fall of the Berlin Wall
and the subsequent collapse of the Soviet Union) allowed the private commercial
industry sector to spearhead technological development and innovation, rather
than the defense sector in the Cold War days. The Defense and the intelligence
agencies regarded this as a troubling development. They were of the opinion
that the defense department should be able to benefit from the success of the
private sector
Secretary of Defense Donald Rumsfeld addressed the Pentagon on September
10, 2001 (a day before the terrorist attacks on September 11, 2001) to declare a
23
significant change in the way the Defense Department would be run from now
on. One of the newspaper headlines read: “Rumsfeld declares war on Pentagon
bureaucracy”. In this talk, Rumsfeld heavily criticized the conservative stance
of Pentagon bureaucrats and was of the opinion that taxpayer money was being
spilt on projects that for all intents and purposes could have been provided by
the private sector - and save lots of money and time. Force transformation,
agility, interoperability were all among the keynote subjects - but above all,
the need for an ’RMA’ was no longer regarded as optional, but rather as a
necessity. At the same time, Rumsfeld also acknowledged that not everyone
within the Pentagon would appreciate these far-reaching changes, to which he
had the following to say: “Well, fine, if there is to be a struggle, so be it.” 8 .
A day later, on September 11 2001, a couple of military ’wargames’ had been
originally ’planned’, including ’Global Guardian’ and ’Vigilant Guardian’. Cu-
riously enough, some of the ’wargames’ very much resembled the actual Septem-
ber 11 attacks - for instance, the wargame co-ordinated and conducted by the
’National Reconnaissance Office’ had as its premise a plane that would fly into
one of the towers of the NRO due to a mechanical glitch.9 A spokesperson of the
NRO had the following to say about the ’wargame’: “It was just an incredible
coincidence that this happened to involve an aircraft crashing into our facility,
as soon as the real world events began, we canceled the exercise”. Another
wargame that had the trappings of a terrorist attack that occurred shortly af-
ter September 11, 2001 was known as “Operation Tripod” - however, this one
was scheduled to be held a day after September 11, 2001 (which was cancelled
after 9/11). In this wargame, a bio-terror threat hit New York (think along the
lines of Anthrax or an H1N1/H5N1 virus as being the ’threat’) - during which
the entire population of the city had to be ’ring-vaccinated’. Rudolph Giuliani,
then-Mayor of New York, as well as representatives of FEMA and the FBI were
to have been involved in this stillborn wargame.
Bush wasted no time in declaring the ’War on Terror’ following the 9/11 ter-
rorist attacks, with Bush’s first decision being the uniliteral invasion of Afghanistan.
The ’War On Terror’ is an euphemism for the ’Revolution in Military Affairs’ -
it is a ’buzzword’ meant for public consumption that is specifically tailored to
fit in with the naming scheme behind various other social doctrines in America
that masqueraded as wars, such as ’The War On Poverty’ (LBJ), ’The War On
Cancer’ (Nixon), and ’The War On Drugs’ (Reagan)10 .
8 Also mentioned in this keynote address by Rumsfeld was that trillions of dollars were
missing/stolen from the Pentagon, and that the Pentagon could not account for the money
lost and where it ended up going[25].
9 The NRO is the branch of the Department of Defense that concerns itself with the utili-
and therefore instantly dismissive of any kind of socialist programs, were instead sold on these
’social change’ programs by the government adopting a misleading slogan to mask the social
program, such as ’The War on Cancer’, or ’The War on Drugs’. Others have commented in
the wake of the 9/11 terrorist attacks that the ’War on Terror’ would play itself out more or
less like the ’War on Drugs’ - also hinting further at the socialist change doctrine behind the
purported and veiled ’war’ on ’terror’.
4 Privatization of the intelligence agencies/military contractors 24
4.1 In-Q-Tel
In-Q-Tel is a so-called ’venture capital firm’ set up by the CIA[27]. The concept
behind In-Q-Tel came from former CIA-agent Ruth A. David[27], now employed
by ANSER Institute/Analytic Services (which in turn is a sister company of
RAND Corporation).
In-Q-Tel served as the proverbial capital injection arm of the CIA that would
fund ’high-risk’ companies - for instance, companies that were treading in un-
explored territory and therefore would need to take huge financial risks. Well-
known companies in the public eye that have received capital injection from
In-Q-Tel include: Google, KeyHole, and Facebook11 .
11 There’s a worrying trend to be noticed here - an ’intelligene agency’ that not only interferes
(and collaborates) with the private sector, but through a joint venture capital proxy tries to
’redirect’, ’stimulate’ and encourage ’emerging trends’ that will help facilitate the retrieval
of information meeting the demands/needs of the ’intelligence agencies’. After the initiative
’Total Information Awareness’ purportedly fell through because of public controversy, all of
a sudden the private sector filled its void with companies such as ’Facebook’, ’MySpace’,
’Hyves’ and ’YouTube’ taking over the baton - all of these services combined more or less fit
the inintial sought-after goals of the ’Total Information Awareness’ program, and resemble a
sort of LifeLog - a self-maintained ’diary’ held by the individual - the only difference being
that the user regards ’Facebook’ as a ’benevolent’ corporation and regards the exchange of his
personal information as being ’fun’ and merely a ’socializing/personal’ escapade. The original
intent of the Total Information Awareness has thus morphed and made the intrusion into
one’s life and the data-and-intelligence gathering abilities of these services such as Facebook
seem less invasive and threatening, because of the ’consumer/supplicant’ participating in a
’consumer/supplier’ transaction - the consumer in this case is the ’Facebook user’ making use
of the ’free service’ while ’Facebook’ is the ’supplier’ - the Internet communications service
provider that segregates and puts people into tight-knit communities/clusters/hives.
4 Privatization of the intelligence agencies/military contractors 25
4.3 Keyhole
Keyhole, a company founded in 2001, specialised in visual satellite imagery
applications. Funding was provided by Sony, Nvidia, and, most notably, the
CIA’s ’venture capital’ firm, In-Q-Tel.
Keyhole was subsequently purchased in 2004 by Google. While the company
and its products were relatively obscure prior to and following its acquisition
by Google, millions of people to date currently make use of its software/services
without them knowing it - Google’s software, Google Earth, was in actuality a
spruced-up, branded version of Keyhole’s ’Earth Viewer’ - Google itself having
made little to no modifications to the code. The satellites used by Google Earth
consists of the KH reconnaisance and Loral Skynet satellites. The company
name itself (’KeyHole’) was an allusion to these ’KH reconnaissance satellites’
- these satellites formed part of the original ’eye-in-the-sky’ system for the use
5 Rollout of the ’Global Information Grid’ 27
auditoral, scent, visual - and broadcast a notification of such and such event
occurring on the wider ’information grid/network’).
The ’glue’ that binds all of these three disparate networks together, is what
is referred to as an ’enterprise architecture’. But ’enterprise architecture’ is
but a conceptual outline for a framework - it cannot exist by itself. Thus, the
Department of Defense have developed an actual framework modelled on the
Zachman Framework called ’Department Of Defense Architecture Framework’
(DoDAF)12 - its implementation being the ’Global Information Grid’ . This
’global network’ facilitates the army and other stakeholders within the system
to coordinate and execute ’Network-Centric Operations’ in joint operations, at
any location in the world, at any time. This ’Global Information Grid’ will cover
the entirety of North-America as well as the European Union.
2003.
5 Rollout of the ’Global Information Grid’ 29
For Europe[1]
To connect all of the ’endpoints’ within the network, (think of all the sen-
sors/cameras/UAVs), every device has to have its own uniquely addressable
network address. This is the real reason behind the worldwide migration from
IPv4 to the IPv6-protocol - the leap from 32bit adressing (IPv4) to 128bit ad-
dressing (IPv6) will lead to an enormous increase in the amount of available
end-to-end, point-to-point connected devices/nodes on the Internet.
To this end, IPv6 makes it possible to elevate the current-day Internet to a
so-called ’Internet of things’ - the addressing capacity is big enough to give every
grain of sand on the world’s beaches an IP-address - thereby making each and
every grain of sand uniquely addressable. 13 . RFID-transponders on products,
identification cards and travel products will also be integrated into this new
’Internet of Things’.
The Revolution in Military Affairs (or 4th generation warfare, whatever term
you may prefer) and the accompanying transformation of the military began
with Operation Desert Storm (also known as the first Gulf War). Desert Storm
would be the first of a series of 4th generation warfare trial runs that would
prove to be a perfect battle laboratory because of the relatively barren land-
scape - practically no undulations in terrain. Like the aforementioned quote by
Thomas P.M. Barnett would highlight - one of Arthur K. Cebrowski’s proteges
- the agenda was there before the ’big, sexy opponent’ was determined. This
proved to be a recurring problem in the post-Cold War. Where previously the
Soviets proved to be useful to the department defense in the sense that every
expenditure requested and granted by Congress was in the name of thwarting
Soviet expansionism, now that argument would fall flat on its face, since the
big, existential ideological enemy was gone. All of a sudden, there was talk of
doing away with the entire Pentagon altogether by seasoned military vets, and
there was a sudden decline of willingness to put up the cash for ever-more ex-
pensive Pentagon weapon projects when an entire stockpile of nuclear weapons
was now essentially rotting away, with the likelihood of it ever proving to be of
13 Denk aan het Burger-Service Nummer onder het eID initiatief van de Nederlandse regering
- ter vervanging van het Sofi-nummer, maar dan uniek addresseerbaar middels het Internet.
Het Burger-Service Nummer is enkel voor diensten met de ’overheid’.
5 Rollout of the ’Global Information Grid’ 30
turn are further strengthened by the means to communication that allows these
people to organize independent of any broader, mass-market system. People
can form ’connections’ between each other where previously there would not be
the inclination to form an connection or group in the first place.
A gathering of like minded people comprises an information loop, and this
information flow is obviously not ’controlled’ or ’authorized’ by a wider mass-
market system. This raises all kinds of problems from a jurisdictive perspective.
Are people in danger of violating the ’intellectual copyright proprietor’ holders’
rights to selling wares under the Commodore brand when users are selling refur-
bished Commodore 64 units on the Internet, or setting up dedicated webshops
for them? Is it within the holder of the ’intellectual property right’ to demand
that this webshop cease any and all activities in selling or profiting from prod-
ucts perusing the Commodore brand - even though the unit that is being sold
has been taken out of production for at least the better part of three decades
now and the Commodore brand is a part of the original machine title? A couple
of tools have been provided to intellectual copyright proprietors over the years
to help relinquish their loss of control over uncontrolled information flows - in
the form of laws such as the ’Digital Millennium Copyright Act’ (DMCA, North
America) and the EUCD (European Union Copyright Directive). Even further
still, further binding ’intellectual IP/copyright’ laws are putting the pressure on
ISPs, website providers and the like to engage in self-policing on what users can
and cannot post or upload due to fear of litigation on behalf of the third party
(the ISP, the website hosting provider, and so on).
"There are only two places where socialism works – one is a beehive
and the other is an anthill." - Sir Ian Stewart-Richardson
This often-quoted line by Sir Ian Stewart-Richardson approaches socialism from
a purely organizational perspective. The beehive and the anthill both have a
rigid hierarchy, with the lower classes (which is composed of infinitely more units
14 A good example is to be found in the recent Sony-Linux fiasco. The PlayStation3 games
console has been advertised as of 2006 with the promise of being ’more’ than a games console
- touting its ability to install a secondary operating system on the built-in harddrive. This
made it possible to install an operating system such as Linux or BSD without voiding your
warranty by having to crack the system’s security system. Sony was prepared to allow people
this relative freedom because they were reasonably confident no harm could be done while
being sand boxed in a ’virtual environment’ governed by the PS3’s Hypervisor - Linux running
as a ’guest’ Operating System meant it could not directly address the physical hardware -
therefore, there was no conceivable risk of a hacker using the Linux OS to hack the underlying
security subsystem of the PS3. However, Sony eventually got cold feet when a certain hacker
known by the handle ’Geohot’ had succeeded in partially ’cracking’ the hypervisor. Citing so-
called ’security risk’s as an excuse to ram through this change in policy, as of April 2010 Sony
has decided to retroactively remove the Linux/OtherOS functionality from every PlayStation3
connected to the Internet through a firmware update (Firmware version 3.21). This helped
anger and enrage many individuals as well as private universities and defense-run departments
such as the US Air Force - what further aggravates the situation is that by not upgrading the
firmware to revision 3.21 (the ’Linux-busting’ firmware), Sony deems you a threat/security
risk and therefore no longer eligible to access their ’PlayStation Network service or any other
service provided by Sony to their PlayStation3 game console for that matter. Even legal users
are duped in this way because of so-called security risk’s - the argument Sony is putting forth
is that they have only provided you with a end-user license agreement to use the PlayStation3
game console you bought, but that they are perfectly within their rights (as per the EULA
you are required to sign before using the PS3) to withdraw or remove any service or feature
their system provides if it runs the risk of threatening intellectual copyright or posing the
risk of being a security threat. Fiasco’s such as this can only help fuel the controversial
debate surrounding ’intellectual copyright’ - the Sony-PS3 Linux case study illustrates that
the delicate balance of power between that of the consumer and the producer/corporation has
broken down - with the one on the losing end appearing to be the consumer.
5 Rollout of the ’Global Information Grid’ 33
These disciplines are all lumped together under the broad banner of ’Social
Computing’. This is a computer-related sociological engineering branch that
makes use of the various disciplines of information gathering/trafficking (data
mining, data bases, knowledge bases) to create useable statistical data sources
(’proximity networks, ’friendship networks’, ’sexual networks’, ’social networks’,
and so on). This data can then be cross-referenced with GIS and GPS-systems
5 Rollout of the ’Global Information Grid’ 34
Fig. 10: An example of data mining in ’social networks’ inferred by one’s mobile
phone usage - there are two kinds of ’social networks’ on display here
based on the same data source - a ’friendship’ network and a ’proximity’
network. This gives the analyst a reasonably accurate snapshot of the
geographical spreading of one’s inner social circle. All of this combines
to form a total snapshot of one’s daily social interactions. To view the
complete presentation, see ’Inference In Complex Social Systems[13]’
(consult the ’References’ section).’
35
5.2.1.1.3 Threat inference This analysis can be used for marketing pur-
poses (think Google’s AdSense) - but it can also be used for defense purposes.
’Threat inference’ is concerned with the modelling of insurrections and terrorist
threats, and in the process creating a so-called ’Course of Action’. The objective
is as follows - what ’threat’ lurks beneath the intentions and deeds of a single
individual or a group of persons, and which steps have to be taken to neutralise
this threat? A couple of systems by George Mason University (in close cooper-
ation with the US Air Force) are being used to determine the best ’Course of
Action’ for any given situation. Starting with Pythia (an improved offshoot of
CAESAR II/Eb), sociological factors now play an important part and heavily
influence the next most desired Course of Action path to be travelled in the
branching tree of possible decisions.
A couple of examples of ’threat-inference’ / ’temporal crisis management’
systems :
• Commander’s Predictive Environment (CPE)
• CAESAR III (George Mason University)
• Pythia (previously known as CAESAR II/Eb, George Mason University)
• TEMPER (George Mason University)
• JSIMS (Joint Simulation Systems)
by-the-mile by 2012, with government-mandated GPS tracker boxes installed inside every
car.
39
Fig. 13: From the article "Sense and Respond - the Next Generation Business
Model[30]" by Seungjin Whang: "Minority Report, Steven Spielberg’s
sci-fi movie release in 2002 has the following scene: John Anderton
(Tom Cruise), after having eyeballs replaced to escape police detection,
walks into an apparal store (the Gap). The camera in the store scans
his eyes, and the flat TV panel instantaneously starts an advertisement
showing a holographic image of a woman, "Hello, Mr. Yakamoto! Wel-
come back to the Gap. How did those assorted tank tops work out for
you? Come on in and see how good you look in one of our new Win-
ter sweaters." Well, this scene (prepared with the help of MIT Media
Lab) demonstrates the next generation of business model - sense and
respond."
6 Private sector in the information age enabled by the RMA 40
idated weight behind efforts such as MPEG-7 and MPEG-21, the two of which will combine
to offer the content provider a broad range of DRM features that will enable him to stipulate
restrictions on who gets to view the content, who gets to copy it, and so on. To clear up any
confusion, MPEG-7 and MPEG-21 are not new videocodecs with strict DRM features, but
are merely metadata containers that can be embedded/encapsulated in pre-existing video and
audio streams of any kind. MPEG-21 will also be a boon in terms of data-mining - all content
inside the audio or video-data can be ’tagged’ - speakers can be identified in an audio clip by
name, a music/audio genre can be defined for specific portions of the same audio file, and so
on. Furthermore, MPEG-21 offers a query-based language that will allow the data-miner to
quickly retrieve relevant information based on a specific search query.
6 Private sector in the information age enabled by the RMA 41
limitation enforced by DRM could be the right to listen to said single x amount
of times before the user has to pay a small charge again. End-User License
Agreements and intellectual property rights are bringing about a shift in power
between the supplicant and supplier of information.
Fig. 14: Jesse Schell, Carnegie Mellon University professor, recognizes in the
worldwide ’sensor network’ the means to a new frontier in ’social engi-
neering’ and ’social control’, but ruled over by game developers instead
of conventional social engineers. In this behaviorist landscape, every
mechanical action performed manually by the user is turned into a
’game’. Here is a quote from Jesse Schell in an interview with CNN:
"New video gaming systems are coming out [Xbox 360] that track every
joint of your body [Project Natal]. It’s basically going to become a nor-
mal thing for us to allow Microsoft to put a three-dimensional camera
on top of your television set looking at you, which sounds like a Big
Brother scenario if ever I heard one, but, still, it’s what we’re going to
allow. I think people will find a great deal of their lives co-opted by
games, sort of like how we saw advertising co-opt huge amounts of our
lives in the 20th century. "
43
7 Utopia
“The English Puritans, the Jacobins, the Bolsheviks, were in each
case simply power seekers using the hopes of the masses in order
to win a privileged position for themselves. Power can sometimes
be won or maintained without violence, but never without fraud,
because it is necessary to make use of the masses, and the masses
would not co-operate if they knew that they were simply serving
the purposes of a minority. In each great revolutionary struggle
the masses are led on by vague dreams of human brotherhood, and
then, when the new ruling class is well established in power, they are
thrust back into servitude. This is practically the whole of political
history, as Burnham sees it.” - Second Thoughts on James Burnham,
George Orwell[22]
7.1 Example
An example of the kind of utopian scenarios imagined by transhumanists is por-
trayed in the 2008 documentary ’Zeitgeist Addendum’. About halfway through
the documentary, the public is sold on a tentative project called ’Venus Project’,
a project headed by futurist Jacque Fresco.
The ’manifesto’ of this future society has clear Marxist overtones - ’money’
is a corrupting ’force’, a swindle that leads to rigid social stratification, and
hence the only solution to combat this evil is by making ’redundant’ the very
concept of ’money’ - and in effect relegating to the scrap heap the basic re-
ward system that goes with it. This is what Jacque Fresco understands by a
’resource-based economy’ - which would replace the aging ’economic monetary
system’. The resources would be administered and rationed out by computers
making ’educated’ guesses about the Earth’s ’carrying capacity’ (a buzzword
from environmentalist doctrine) - Jacque Fresco believes that by taking the de-
cisions out of the hands of bureaucrats and instead letting computers do the
running of the state, this essentially removes the ’state’.
8 Dystopia
What flies in the face of these utopian fantasies of a better world are some of
the statements made by transhumanist pioneers. For instance, Kevin Warwick,
made the following comment in an interview:
In the above snippet, Kevin Warwick imagines a future world scenario where
’cyborgs’ (or rather, ’transhumanists’ - to be more human than human) will not
consider ’normal human beings’ to be their equals, but rather their inferiors.
This would give rise to a new socially stratified class system where the willingness
to modify your biological body would get you up the food chain. Instead of
creating a more ’equal’ society as the utopian version of this future scenario
would have us believe, in Kevin Warwick’s version of this same future world
scenario, technological snobism would on the contradictory lead to even more
inequality between those with a brainchip, and those without (which would
therefore not be able to integrate into a society where logistics and supply and
demand are all governed by the ’sense and respond’ supply chain). As computers
become an ever-more encompassing part of one’s everyday lives, it becomes
likely that those who will hold conscientious objections to having to upgrade
their body with machine parts will become stigmatized and pigeonholed as a
’luddite’ or even a new ’Amish’. Richard A. Clarke, prolific counter-terrorism
author, has even floated the concept of the future being rife with ’BioLuddites’ -
anti-transhumanist ’terrorists’ that try to disrupt and prevent the transhumanist
society from being brought into existence. It is interesting how opposition to
this ’social change doctrine’ leads to one being termed a ’terrorist’.
Fig. 15: Article from Edge Magazine, November 2002 - ’Controversy surrounds
the conclusions he derives from these experiments. [Kevin] Warwick
sees himself as a pioneer of a new race of human-machines which will
eventually take over the running of the world, thanks to their enhanced
brains and bodies.’
47
Fig. 16: Jose Delgado of Yale University was a pioneer in the development of
brainchips, the development of which can be traced back to the ’60s.
Delgado was able to bring cats, dogs and bulls from a state of near
passivity into a fit of rage using a special contraption he called a ’sti-
moceiver’. After the success he had achieved with animals, he then pro-
ceeded to apply the same technology and doctrines onto people (most of
the people used as guinea pigs for these experiments were drawn from
the prisons and mental wards since they more or less lacked the Con-
stitutional rights and privileges that would protect them from being
abused or misled into participating on experiments that might prove
extremely detrimental and risky to their own wel-being. The electronic
stimulation and control of the mind has been perfected to such a degree
now that Intel has proudly announced that it envisions that by 2020
a great many of their customers will have opted for an implantable
brainchip. (see ’References’, ’Intel Wants Brain Implants In Its Cus-
tomers’ Heads By 2020’; also see the article from Playboy Magazine,
January 1990, "Mind Control", by Larry Collins’).
Dit is wat er juist niet gedaan is. In een rotvaart is een serie van revolutionaire
handelingen doorgevoerd die allemaal onderdeel vormen van 1 agenda (namelijk
de ’Revolution in Military Affairs’) terwijl het publiek ondertussen door middel
van coercie, the exploitation of fear (fear of terrorism, fear of influenza-like
viruses, fear of economic crisis) and apathy (’I have nothing to hide’) vooral
werden aangemoedigd om niet al te veel vragen te stellen, dat het allemaal wel
meeviel en vooral gewoon meegaan met de ’flow’.
Een voorbeeld hiervan is de breinchip. In een US Air Force document afkom-
stig uit 1996 wordt toegegeven dat het leger dit zou willen doorvoeren voor
2025, maar dat er op het moment van schrijven gewetensbezwaren zijn. De
auteur van dat document hoopt stiekem dat deze ’gewetensbezwaren’ zodanig
zijn afgenomen circa 2025 dat infantriesoldaten geen probleem zullen zien in het
implanteren van een breinchip - en daarna wordt er een witte leugen vertelt om
ietwat natuurlijke angst (een ’zelfoverlevings instinct’) weg te nemen bij de lezer:
“Maak je geen zorgen, deze breinchip ’controleert’ de technologie, niet de mens”.
Dit is flagrante onzin - Jose Delgado was vanaf 1965 bezig met experimenten
waarbij hij zogenaamde ’stimoceivers’ (elektroden) in het brein implanteerde
van apen, muizen, katten, honden en stieren. Door stimulering van de hypotha-
10 Dehumanization 48
lamus was het mogelijk voor hem om met een remote control applicatie het
’onderwerp’ aggressief, passief of wanhopig te maken. Tevens was het mogelijk
om middels deze stimulering het beest met een soort ’joystick’-achtige contrap-
tie te bedienen. Nadat zijn experiment met een stier in de ring een succes bleek
te zijn, ging hij deze technologie verder ontwikkelen voor toepassing op mensen.
Maar dit document uit 1996 laat de lezer doen geloven dat dit niet de bedoel-
ing is in dit geval - erg moeilijk om te geloven, aangezien het leger altijd al
een regimentatief systeem is geweest waarin een duidelijke hierarchie in zit - en
dat er gedaan moet worden wat de Commandant of Generaal zegt, zonder dat
gewetensbezwaren daarbij in de weg kunnen zitten.
Dit is tevens het ’kwaad’ dat ik zie in de manier waarop deze ’transitie’
naar het informatietijdperk wordt doorgevoerd - achterhouding van informatie,
natuurlijke angst van het volk voor bepaalde invasieve handelingen wegnemen
door ze als kinderen te behandelen, en een bepaald soort hedonisme stimuleren
(veel drinken, veel sexuele promiscuiteit, veel oppervlakkig feesten) zodat men
afgeleidt is van de maatschappelijke veranderingen die, eenmaal doorgevoerd,
voor altijd zullen gelden en voor een lange tijd niet onderhevig zijn aan reformer-
ing17 .
10 Dehumanization
10.1 Dehumanization of war
The total ’rationalisation’ of war has been attempted before, but succeeded only
in perpetuating more ’irrationality’ instead of less. A good example of this is
the policy by Robert McNamara during the Vietnam war to introduce ’body
17 Some food for thought: utilitarianism is based on the principle of hedonism - the greatest
happiness principle operates under the assumption that the only two intrinsic values worth
quantifying in this world are ’pain’ and ’pleasure’. Bentham was squarely against the concept
of ’intrinsic rights’ (it was also out of similar convictions that he wrote a scathing ’essay’ on the
American Declaration of Independence, which formed part of the British government’s official
rebuttal to the pbulication of said document in July 1776). Even the concept of absolute
moral value judgements were nonsense according to Bentham - instead, he had thought up
a couple of variables (or ’vectors’, if you may) that would calculate the ’pain’ or ’pleasure’
effect of any given action. This is what is known as the ’hedonistic calculus’. Coincidentally,
it is interesting to point out that in the current era we’re living in, there has been a gradual
implementation of the panopticon on the whole of society, while at the same time we have
seen an increase in hedonistic behavior (think of the various sexual fetishes of today, the half-
naked starlets such as Lady Gaga, Beyonce and Rihanna posing and singing suggestively in
various schlock music clips aired by MTV and TMF, the coma-drinking prevalent in Europe,
the constant 365 days per year partying that has become the norm on college campuses, vast
promiscuity and a rapid increase in one-night stands and a substantial rise in divorces, the
’normalisation’ of extramarital affairs, infidelity, and so on. What is a constant in all of this?
Pain and pleasure - pain is felt when someone has been cheated on by his spouse/partner, while
the inverse of pain, namely pleasure, is experienced after having committed the umpteenth
sexual act with a mistress or lover that has eluded his or her’s partner. Mainstream media is
capitalizing on these changing morality rulesets - Ashley Madison is an online dating service
for people currently in a relationship who want to have sex with someone else, while Maxim
has advertised on the cover of its April 2010 issue an article with the headline ’Sex - Cheat
And Don’t Get Caught - Women Will Tell You How’.
10 Dehumanization 49
the time this race to the top leads to a lot of backstabbing, heated fights and
general hostile behavior towards each other. What is central in all of this, is
that the people inside this gameshow are constantly being monitored. There-
fore, in order to become ’popular’ with the viewing audience, one has to project
an external ’persona’ of oneself - in order to stay interesting to the television
crowd, or sway the crowd if you will (similar to what gladiators used to do in
gladiatorial events in Rome).
By donning T-shirts with texts such as ’MILF in training’, ’Jerk Magnet’,
or ’Your Boyfriend Wants Me’, the fashion industry is capitalizing on this new-
found desire to ’self-project one’s own embellished persona’ to the outside world
- but in such a way that it binds the ’intimitate’ act/intent with this desire -
self-presentation. Whereas previously dating or intercourse between a man and
a woman was bound by a strict ruleset of how to pick up a girl and how not to,
in this ’information age’ the woman wears a couple of ’inner self’ status notifica-
tions on her shirt - such as ’MILF in training’ - signs which act more or less like
sensors for the men who, from a Network-Centric Warfare perspective, pick up
on these sensors through the ’information grid’, and then ’reespond’/’engage’
the object of desire in kind - in effect skipping the foreplay altogether.
One constant in all of this is an increase in voyeurism, but most of all the
eradication of an ’inner sanctum’ for your thoughts and feelings - everything that
matters when it comes to intimicacy, becomes ’personal’ - ’socialised’. Everyone
has a ’right’ to know one’s inner feelings, one’s inner thoughts, and one’s inner
likes and dislikes - presumably out of some need to become all ’interconnected’
like a ’global village’.
So, because the average John Doe or Jane Doe does not exercise much power
in the role provided to him by society, he instead makes this trip into the ’self’
and lets his whole world revolve around ’self-projection’ - the external hologram
of his inner self that he projects to the outside world, completely willingly, and
without any enforcement or mandate on the part of government. Rather, new,
free services such as ’Facebook’, ’Youtube’, ’Myspace’, blogs, Twitter, and the
rapid rise of the Internet helped bring all this about, one medium of exchange
after another one part of a jigsaw puzzle perfectly falling into place to form a
panoptical sense-and-respond society.
another insignificant number forming part of a larger population set. This same
dehumanizing procedure is now also being applied to scientific inquiry, data
mining, surveillance and spying, all of which is being performed by machines
(intelligent ones at that - cameras, sensors, UAVs) rather than a real private
inspector spying on you. Because storage is cheap and plentiful, it enables the
institutions in charge of surveillance camera networks to store everything for
future reference without the inconvenience of having to delete camera footage
of inconsequential days because the server is running out of storage space.
“Third, data mining rationalizes surveillance by removing hu-
mans from the interpretation process. The dehumanization of the
analyses is important: because it removes the so-called human bias
from the interpretation process. As such, when combined with the
fact that contemporary data mining relies on quantification of in-
formation (a seemingly dispassionate and objective method of inter-
preting the social world), this dehumanization projects an aura of
objectivity, consequently making it even more difficult to challenge
its premise (and the findings it provides).” - Public Intimacy and
the New Face (Book) of Surveillance: The Role of Social Media in
Shaping Contemporary Dataveillance
The institution would argue that this helps make the case for mass surveillance,
since ’human bias’ or ’abuse’ is taken out of the equation by removing the
human element - the camera or ground sensor does not act discriminatory, but
merely perceives a certain ’event’ (such as ’motion’, ’sound’ or an ’image’) and
based upon this triggering event, the datamining services can then kick into gear
and pull up relevant information about the ’object’ in question (for example, a
man or a woman that is caught in suspicious behavior). Anything that could go
wrong, and does go wrong mostly when talking about surveillance and potential
privacy abuse, is blamed on the human element. By having machines do all
the work, like the author of the article above states so eloquently, an ’aura of
objectivity’ is projected, making it difficult to argue against the central ’premise’
behind this method of surveillance.
Defense Department.
11 Acronyms
Term Explanation
BFT Acronym for: Blue Force Tracking.
C2 Acronym for: Command, Control.
C3I Acronym for: Command, Control, Communications, Intelligence.
C4ISR Acronym for: Command, Control, Communications, Computers,
Intelligence, Surveillance, Reconnaisance.
CCTV Acronym for: Closed-Circuit Television.
CIA Acronym for: Central Intelligence Agency.
CIO Acronym for: Chief Information Officer.
CO2 Chemical formula for ’Carbon Dioxide’.
COINTELPRO Acronym for: Counter Intelligence Program.
DARPA Acronym for: Defense Advanced Research Projects Agency.
DHS Acronym for: Department of Homeland Security.
DoD Acronym for: Department of Defense.
DoDAF Acronym for: Department of Defense Architecture Framework.
EBO Acronym for: Effects-Based Operations.
FCS Acronym for: Future Combat Systems. Outdated term for ’Brigade
Combat Team Modernization’ (BCT Modernization).
GIG Acronym for: Global Information Grid.
GIS Acronym for: Geographic Information Systems.
GPS Acronym for: Global Positioning System.
IOT Acronym for: Internet Of Things.
ISR Acronym for: Intelligence, Surveillance, Reconnaisance.
MOOTW Acronym for: Military Operations Other Than War.
NCW Acronym for: Network-Centric Warfare.
NCO Acronym for: Network-Centric Operations. A new name for the
concept ’Network-Centric Warfare’. (NCW)
NEO Acronym for: Non-Combatant Evacuation Operations. Applied in
’natural disasters’ like Hurricane Katrina (2005).
NLW Acronym for: Non-Lethal Weapons.
OODA Acronym for: Observe, Orient, Decide, Act.
OSD Acronym for: Office of Net Assessment.
PMC Acronym for: Private Military Corporation.
PSYOP Acronym for: Psychological Operations.
RMA Acronym for: Revolution In Military Affairs.
S&R Acronym for: Sense & Respond.
UAV Acronym for: Unmanned Aerial Vehicle.
UCAV Acronym for: Unmanned Combat Aerial Vehicle.
WMD Acronym for: Weapons of Mass Destruction. Is a smaller subset of the
broader category ’Weapons of Mass Effect’.
55
[16] Jeremy Hsu. Intel wants brain implants in its customers’ heads by 2020 - re-
searchers expect brain waves to operate computers, tvs and cell phones. Popular
Science, November 2009. URL http://www.popsci.com/technology/article/
2009-11/intel-wants-brain-implants-consumers-heads-2020.
[17] Richard O. Hundley. Past Revolutions, Future Transformations - What can the
history of RMA tell us about transforming the US military? RAND Corpora-
tion, 1999. ISBN 0833027093. URL http://www.rc.rand.org/pubs/monograph_
reports/2007/MR1029.pdf.
[18] Samuel Huntington. The clash of civilizations? Foreign Affairs, 1993. URL
http://www.foreignaffairs.com/articles/48950/samuel-p-huntington/
the-clash-of-civilizations.
[19] Lukasz Kamienski. The RMA and War Powers. Strategic Insights, 2, September
2003. URL http://www.comw.org/rma/fulltext/0309kamienski.pdf.
[20] Steven Metz and James Kievit. The Revolution in Military Affairs and Conflict
Short Of War. July 1994. URL http://www.strategicstudiesinstitute.army.
mil/pubs/display.cfm?pubID=241.
[22] George Orwell. Second Thoughts on James Burnham. Polemic, 1946. URL
http://orwell.ru/library/reviews/burnham/english/e_burnh.
[23] Tara O’Toole, Georges Benjamin, and John Thomasian. Bioterrorism Threats,
February 2002. URL http://www.c-spanvideo.org/program/168814-2.
[24] David M. Rorvik. Bringing The War Home. Playboy Magazine, September 1974.
URL http://tiny.cc/hqgkt.
[25] Donald Rumsfeld, Richard B. Myers, and Pete Aldridge. Defense business prac-
tices, September 2001. URL http://www.c-spanvideo.org/program/165947-1.
[26] Fred Stein and Brian Clark. Arming with Intelligence: Data Fusion in Network-
Centric Warfare, December 2007. URL http://www.objectivity.com/media/
data-fusion-and-network-centric-warfare/default.asp.
[27] Warren P. Strobell. The spy who funded me (and my start-up) - the CIA’s
venture capitalist in Silicon Valley. U.S. News And World Report, pages 38–
39, July 2000. URL http://www.novariant.com/news/pdfs/autofarm_feature_
stories/071700USNewsCIA.pdf.
[28] John D. Sutter. Why games will take over our lives. CNN, April 2010. URL
http://edition.cnn.com/2010/TECH/04/05/games.schell/index.html.
[30] Seungjin Whang. Sense and Respond - the Next Generation Business Model.
May 2005. URL http://www.gsb.stanford.edu/news/research/supplychain_
whang_senserespond.shtml.
[31] Rick E. Yannuzzi. In-Q-Tel: A New Partnership Between the CIA and the Pri-
vate Sector. CIA, 2000. URL https://www.cia.gov/library/publications/
additional-publications/in-q-tel/index.html.
Index
9/11, 10, 21, 23 Cooperative Engagement Capability, 13,
9/11 Wargames 19, 20
Global Guardian, 23 Council On Foreign Relations, 8
Operation Tripod, 23 Foreign Affairs (magazine), 8
Vigilant Guardian, 23 Course Of Action (COA), 16–18, 35
Crisis management, 35
Analytic Services, 24
ANSER Institute, 24, 25 Data Mining, 33
Apple David, Ruth A., 24, 25
iTunes, 40 Deleuze, Gilles, 8, 9
Artificial Intelligence, 43 Delgado, Jose, 47
Asimov, Isaac, 50 Stimoceiver, 47
Department of Defense, 26, 28
Barnett, Thomas P.M., 21, 29 Office of Force Transformation, 10
Bentham, Jeremy, 8, 38, 48 Department of Defense Architecture Frame-
Hedonistic calculus, 48 work, 28
Panopticon, 8, 38, 41, 48 C4ISR Architecture Framework, 28
BioLuddite, 45 Digital Millennium Copyright Act (DMCA),
Blackwater, 26 31, 40
Total Intelligence Solutions, 26 Digital Rights Management, 40, 41
Xe Corporation, 26 DTCP-IP, 40
Blitzkrieg, 9 HDCP, 40
Boyd, John, 18 MPEG-21, 40
Burnham, James, 43 MPEG-7, 40
Bush, George W., 16, 23, 26 Digital Rights Management (DRM), 40
Domain Name System (DNS), 3
C2, 3
C3I, 3 Edge Magazine (magazine), 46
C4ISR, 3 Effects Based Operations, 15, 16
CAESAR Shock And Awe, 16
CAESAR II/Eb, 35 End-User License Agreement (EULA),
Pythia, 35 32, 41
CAESAR III, 35 Enterprise architecture, 28
TEMPER, 35 Supply chain, 13, 45
Carnegie Mellon University, 36, 41, 42 Zachman Framework, 28
Cebrowski, Arthur K., 9, 10, 29 European Union, 24, 28
Central Intelligence Agency (CIA), 24, European Union Copyright Directive
26 (EUCD), 31, 40
Cheney, Dick, 6, 16
Chief Information Officer (CIO), 9 Facebook, 24
Clarke, Richard A., 45 FBI, 23
Closed-circuit television (CCTV), 10 FEMA, 23
Cognitive capacity, 43 Foucault, Michel, 8
Cold War, 29 Fresco, Jacque, 44
Collins, Larry, 47
Game Theory, 3
Commander’s Predictive Environment,
Geographic Information Systems (GIS),
35, 37
19, 33, 35
59