Notes from Policy in the Data Age: Data Enablement for the Common Good

Policy in the Data Age: Data Enablement for the Common Good


By Karim Tadjeddine and Martin Lundqvist

Digital McKinsey August 2016

By virtue of their sheer size, visibility, and economic clout, national, state or provincial, and local governments are central to any societal transformation effort, in particular a digital transformation. Governments at all levels, which account for 30 to 50 percent of most countries’ GDP, exert profound influence not only by executing their own digital transformations but also by catalyzing digital transformations in other societal sectors

The data revolution enables governments to radically improve quality of service

Government data initiatives are fueling a movement toward evidence-based policy making. Data enablement gives governments the tool they need to be more efficient, effective, and transparent while enabling a significant change in public-policy performance management across the entire spectrum of government activities.

Governments need to launch data initiatives focused on:

  • better understanding public attitudes toward specific policies and identifying needed changes
  • developing and using undisputed KPIs that reveal the drivers of policy performance and allow the assignment of targets to policies during the design phase
  • measuring what is happening in the field by enabling civil servants, citizens, and business operators to provide fact-based information and feedback
  • evaluating policy performance, reconciling quantitative and qualitative data, and allowing the implementation of a continuous-improvement approach to policy making and execution
  • opening data in raw, crunched, and reusable formats.

The continuing and thoroughgoing evolution taking place in public service is supported by a true data revolution, fueled by two powerful trends.

First, the already low cost of computing power continues to plummet, as does the cost
of data transportation, storage, and analysis. At the same time, software providers have rolled out analytics innovations such as machine learning, artificial intelligence, automated research, and visualization tools. These developments have made it possible for nearly every business and government to derive insights from large datasets.

Second, data volumes have increased exponentially. Every two years the volume of digitally generated data doubles, thanks to new sources of data and the adoption of digital tools.

To capture the full benefit of data, states need to deliver on four key imperatives:

  • Gain the confidence and buy-in of citizens and public leaders
  • Conduct a skills-and-competencies revolution
  • Fully redesign the way states operate
  • Deploy enabling technologies that ensure interoperability and the ability to handle massive data flows

Because data-specific skills are scarce, governments need to draw on their internal capabilities to advance this revolution. Civil servants are intimately familiar with their department’s or agency’s challenges and idiosyncrasies, and they are ideally positioned to drive improvements—provided they are equipped with the necessary digital and analytical skills. These can be developed through rotational, training, and coaching programs, with content targeted to different populations. The US is building the capabilities of its employees through its DigitalGov University, which every year trains 10,000 federal civil servants from across the government in digital and data skills.

More generally, governments should train and incentivize civil servants to embed data discovery and analytics processes in their workplaces. That means that all civil servants’ end-user computing platforms must feature data discovery and analytics tools.

governments must carry out a major cultural shift in order to break down silos and barriers. Such a transformed culture is characterized by a “test and learn” mind-set that believes “good enough is good to go.”

Cultures that facilitate governments’ data transformations are also characterized by
open, collaborative, and inclusive operating models for data generation and data usage. They facilitate the participation of public agencies, private-sector companies, start-ups, and society as a whole.

Notes from Information Warfare Principles and Operations

Notes from the book Information Warfare Principles and Operations by Edward Waltz

***

This ubiquitous and preeminent demand for information has shaped the current recognition that war fighters must be information warriors—capable of understanding the value of information in all of its roles: as knowledge, as target, as weapon.

• Data—Individual observations, measurements, and primitive messages form the lowest level. Human communication, text messages, electronic queries, or scientific instruments that sense phenomena are the major sources of data.

• Information—Organized sets of data are referred to as information. The organizational process may include sorting, classifying, or indexing and linking data to place data elements in relational context for subsequent searching and analysis.

• Knowledge—Information, once analyzed and understood, is knowledge. Understanding of information provides a degree of comprehension of both the static and dynamic relationships of the objects of data and the ability to model structure and past (and future) behavior of those objects. Knowledge includes both static content and dynamic processes. In the military context, this level of understanding is referred to as intelligence.

Information is critical for the processes of surveillance, situation assessment, strategy development, and assessment of alternatives and risks for decision making.

Information in the form of intelligence and the ability to forecast possible future outcomes distinguishes the best warriors.

The control of some information communicated to opponents, by deception (seduction and surprise) and denial (stealth), is a contribution that may provide transitory misperception to an adversary.

The supreme form of warfare uses information to influence the adversary’s perception to subdue the will rather than using physical force.

 

The objective of A is to influence and coerce B to act in a manner favorable to A’s objective. This is the ultimate objective of any warring party—to cause the opponent to act in a desired manner: to surrender, to err or fail, to withdraw forces, to cease from hostilities, and so forth. The attacker may use force or other available influences to achieve this objective. The defender may make a decision known to be in favor of A (e.g., to acknowledge defeat and surrender) or may fall victim to seduction or deception and unwittingly make decisions in favor of A.

Three major factors influence B’s decisions and resulting actions (or reactions) to A’s attack.

The capacity of B to act

The will of B to act

The perception of B

 

 

 

Information warfare operations concepts are new because of the increasing potential (or threat) to affect capacity and perception in the information and perception domains as well as the physical domain. These information operations are also new because these domains are vulnerable to attacks that do not require physical force alone. Information technology has not changed the human element of war. It has, however, become the preeminent means by which military and political decision makers perceive the world, develop beliefs about the conflict, and command their forces.

Information targets and weapons can include the entire civil and commercial infrastructure of a nation. The military has traditionally attacked military targets with military weapons, but IW introduces the notion that all national information sources and processes are potential weapons and targets.

Col. Richard Szafranski has articulated such a view, in which the epistemology (knowledge and belief systems) of an adversary is the central strategic target and physical force is secondary to perceptual force [6].

Economic and psychological wars waged over global networks may indeed be successfully conducted by information operations alone.

Information superiority is the end (objective) of information operations (in the same sense that air superiority is an objective), while the operations are the means of conduct (in the sense that tactical air power is but one tool of conflict).

Since the Second World War, the steady increase in the electronic means of collecting, processing, and communicating information has accelerated the importance of information in warfare in at least three ways.

First, intelligence surveillance and reconnaissance (ISR) technologies have extended the breadth of scope and range at which adversaries can be observed and targeted, extending the range at which forces engage. Second, computation and communication technologies supporting the command and control function have increased the rate at which information reaches commanders and the tempo at which engagements can be conducted. The third area of accelerated change is the integration of information technology into weapons, increasing the precision of their delivery and their effective lethality.

The shift is significant because the transition moves the object of warfare from the tangible realm to the abstract realm, from material objects to nonmaterial information objects. The shift also moves the realm of warfare from overt physical acts against military targets in “wartime” to covert information operations conducted throughout “peacetime” against even nonmilitary targets. This transition toward the dominant use of information (information-based warfare) and even the targeting of information itself (information warfare, proper) [8] has been chronicled by numerous writers.

 

 

According to the Tofflers, the information age shift is bringing about analogous changes in the conduct of business and warfare in ten areas.

  1. Production—The key core competency in both business and warfare is information production.

In business, the process knowledge and automation of control, manufacturing, and distribution is critical to remain competitive in a global market; in warfare, the production of intelligence and dissemination of information is critical to maneuvering, supplying, and precision targeting.

  1. Intangible values—The central resource for business and warfare has shifted from material values (property resources) to intangible information. The ability to apply this information discriminates between success and failure.
  2. Demassification—As information is efficiently applied to both business and warfare, production processes are shifting from mass production (and mass destruction) to precision and custom manufacturing (and intelligence collection, processing, and targeting).
  3. Worker specialization—The workforce of workers and warriors that performs the tangible activities of business and war is becoming increasingly specialized, requiring increased training and commitment to specialized skills.
  4. Continuous change—Continuous learning and innovation characterize the business and workforces of information-based organizations because the information pool on which the enterprise is based provides broad opportunity for understanding and improvement. Peter Senge has described the imperative for these learning organizations in the new information-intensive world [12].
  5. Scale of operations—As organizations move from mass to custom production, the teams of workers who accomplish tangible activities within organizations will become smaller, more complex teams with integrated capabilities. Business units will apply integrated process teams, and military forces will move toward integrated force units.
  6. Organization—Organizations with information networks will transition from hierarchical structure (information flows up and down) toward networks where information flows throughout the organization. Military units will gain flexibility and field autonomy.

8.Management—Integrated, interdisciplinary units and management teams will replace “stovepiped” leadership structures of hierarchical management organizations.

  1. Infrastructure—Physical infrastructures (geographic locations of units, physical placement of materials, physical allocation of resources) will give way to infrastructures that are based upon the utility of information rather than physical location, capability, or vulnerability.
  2. Acceleration of processes—The process loops will become tighter and tighter as information is applied to deliver products and weapons with increasing speed. Operational concurrence, “just-in-time” delivery, and near-real-time control will characterize business and military processes.

 

 

 

an information-based age in which:

  • Information is the central resource for wealth production and power.
  • Wealth production will be based on ownership of information—the creation of knowledge and delivery of custom products based on that knowledge.
  • Conflicts will be based on geoinformation competitions over ideologies and economies.
  • The world is trisected into nations still with premodern agricultural capabilities (first wave), others with modern industrial age capabilities (second wave), and a few with postmodern information age capabilities (third wave).

 

The ultimate consequences, for not only wealth and warfare, will be the result of technology’s impact on infrastructure, which influences the social and political structure of nations, and finally, that impact on the global collection of nations and individuals.

Table 1.2 illustrates one cause-and-effect cascade that is envisioned. The table provides the representative sequence of influences, according to some futurists, that has the potential even to modify our current structure of nation states, which are defined by physical boundaries to protect real property.

 

“Cyberwar is Coming!” by RAND authors John Arquilla and David Ronfeldt distinguished four basic categories of information warfare based on the expanded global development of information infrastructures (Table 1.3) [16].

Net warfare (or netwar)—This form is information-related conflict waged against nation states or societies at the highest level, with the objective of disrupting, damaging, or modifying what the target population knows about itself or the world around it.

The weapons of netwar include diplomacy, propaganda and psychological campaigns, political and cultural subversion, deception or interference with the local media, infiltration of computer databases, and efforts to promote dissident or opposition movements across computer networks [17].

Political warfare—Political power, exerted by institution of national policy, diplomacy, and threats to move to more intense war forms, is the basis of political warfare between national governments.

Economic warfare—Conflict that targets economic performance through actions to influence economic factors (trade, technology, trust) of a nation intensifies political warfare from the political level to a more tangible level

Command and control warfare (C2W)—The most intense level is conflict by military operations that target opponent’s military command and control.

 

The relationships between these forms of conflict may be viewed as sequential and overlapping when mapped on the conventional conflict time line that escalates from peace to war before de-escalation to return to peace

Many describe netwar as an ongoing process of offensive, exploitation, and defensive information operations, with degrees of intensity moving from daily unstructured attacks to focused net warfare of increasing intensity until militaries engage in C2W.

Martin Libicki, has proposed seven categories of information warfare that identify specific type of operations [21].

  1. Command and control warfare—Attacks on command and control systems to separate command from forces;
  2. Intelligence-based warfare—The collection, exploitation, and protection of information by systems to support attacks in other warfare forms;
  3. Electronic warfare—Communications combat in the realms of the physical transfer of information (radioelectronic) and the abstract formats of information (cryptographic);
  4. Psychological warfare—Combat against the human mind;
  5. Hacker warfare—Combat at all levels over the global information infrastructure;
  6. Economic information warfare—Control of economics via control of information by blockade or imperialistic controls;
  7. Cyber warfare—Futuristic abstract forms of terrorism, fully simulated combat, and reality control are combined in this warfare category and are considered by Libicki to be relevant to national security only in the far term.

 

Author Robert Steele has used two dimensions to distinguish four types of warfare.

Steele’s taxonomy is organized by dividing the means of conducting warfare into two dimensions.

  • The means of applying technology to conduct the conflict is the first dimension. High-technology means includes the use of electronic information-based networks, computers, and data communications, while low-technology means includes telephone voice, newsprint, and paper-based information.
  • The type of conflict is the second dimension, either abstract conflict (influencing knowledge and perception) or physical combat.

the principles of information operations apply to criminal activities at the corporate and personal levels (Table 1.5). Notice that these are simply domains of reference, not mutually exclusive domains of conflict; an individual (domain 3), for example, may attack a nation (domain 1) or a corporation (domain 2).

Numerous taxonomies of information warfare and its components may be formed, although no single taxonomy has been widely adopted.

1.5.1 A Functional Taxonomy of Information Warfare

A taxonomy may be constructed on the basis of information warfare objectives, functions (countermeasure tactics), and effects on targeted information infrastructures [29]. The structure of such a taxonomy (Figure 1.3) has three main branches formed by the three essential security properties of an information infrastructure and the objectives of the countermeasures for each.

Availability of information services (processes) or information (content) may be attacked to achieve disruption or denial objectives.

Integrity of information services or content may be attacked to achieve corruption objectives (e.g., deception, manipulation of data, enhancement of selective data over others).

Confidentiality (or privacy) of services or information may be attacked to achieve exploitation objectives.

  • Detection—The countermeasure may be (1) undetected by the target, (2) detected on occurrence, or (3) detected at some time after the after occurrence.
  • Response—The targeted system, upon detection, may respond to the countermeasure in several degrees: (1) no response (unprepared), (2) initiate audit activities, (3) mitigate further damage, (4) initiate protective actions, or (5) recover and reconstitute.

One type of attack, even undetected, may have minor consequences, for example, while another attack may bring immediate and cascading consequences, even if it is detected with response. For any given attack or defense plan, this taxonomy may be used to develop and categorize the countermeasures, their respective counter-countermeasures, and the effects to target systems.

the air force defines information warfare as any action to deny, exploit, corrupt, or destroy the enemy’s information and its functions; protecting ourselves against those actions; and exploiting our own military information functions.

 1.6 Expanse of the Information Warfare Battlespace

As indicated in the definitions, the IW battlespace extends beyond the information realm, dealing with information content and processes in all three realms introduced earlier in our basic functional model of warfare.

  • The physical realm—Physical items may be attacked (e.g., destruction or theft of computers; destruction of facilities, communication nodes or lines, or databases) as a means to influence information. These are often referred to as “hard” attacks.
  • The information infrastructure realm—Information content or processes may be attacked electronically (through electromagnetic transmission or over accessible networks, by breaching information security protections) to directly influence the information process or content without a physical impact on the target. These approaches have been distinguished as indirect or “soft” attacks.
  • The perceptual realm—Finally, attacks may be directly targeted on the human mind through electronic, printed, or oral transmission paths. Propaganda, brainwashing, and misinformation techniques are examples of attacks in this realm.

 

Viewed from an operational perspective, information warfare may be applied across all phases of operations (competition, conflict, to warfare) as illustrated in Figure 1.5.

(Some lament the nomenclature “information warfare” because its operations are performed throughout all of the phases of traditional “peace.” Indeed, net warfare is not at all peaceful, but it does not have the traditional outward characteristics of war.)

Because information attacks are occurring in times of peace, the public and private sectors must develop a new relationship to perform the functions of indication and warning (I&W), security, and response.

1.7 The U.S. Transition to Information Warfare

The U.S. Joint Chiefs of Staff “Joint Vision 2010,” published in 1996, established “information superiority” as the critical enabling element that integrates and amplifies four essential operational components of twenty-first century warfare.

  1. Dominant maneuver to apply speed, precision, and mobility to engage targets from widely dispersed units;
  2. Precision engagement of targets by high-fidelity acquisition, prioritization of targets, and joint force command and control;
  3. Focused logistics to achieve efficient support of forces by integrating information about needs, available transportation, and resources;
  4. Full-dimension protection of systems processes and forces through awareness and assessment of threats in all dimensions (physical, information, perception).

Nuclear and information war are both technology-based concepts of warfare, but they are quite different. Consider first several similarities. Both war forms are conceptually feasible and amenable to simulation with limited scope testing, yet both are complex to implement, and it is difficult to accurately predict outcomes. They both need effective indications and warnings, targeting, attack tasking, and battle damage assessment. Nevertheless, the contrasts in the war forms are significant. Information warfare faces at least four new challenges beyond those faced by nuclear warfare.

The first contrast in nuclear and information war is the obvious difference in the physical effects and outward results of attacks. A nuclear attack on a city and an information warfare attack on the city’s economy and infrastructure may have a similar functionaleffect on its ability to resist an occupying force, but the physical effects are vastly different.

 

Second, the attacker may be difficult to identify, making the threat of retaliatory targeting challenging. Retaliation in kind and in proportion may be difficult to implement because the attacker’s information dependence may be entirely different than the defender’s.

The third challenge is that the targets of information retaliation may include private sector information infrastructures that may incur complex (difficult to predict) collateral damages.

Finally, the differences between conventional and nuclear attacks are distinct. This is not so with information operations that may begin as competition, escalate to conflict, and finally erupt in to large-scale attacks that may have the same functional effects as some nuclear attacks.

In the future, the IW continuum may be able to smoothly and precisely escalate in the dimensions of targeting breadth, functional coverage, and impact intensity. (This does not imply that accurate effects models exist today and that the cascading effects of information warfare are as well understood as nuclear effects, which have been thoroughly tested for over three decades.)

1.8 Information Warfare and the Military Disciplines

Organized information conflict encompasses many traditional military disciplines, requiring a new structure to orchestrate offensive and defensive operations at the physical, information, and perceptual levels of conflict.

1.9 Information and Peace

Information technology not only provides new avenues for conflict and warfare, but it also provides new opportunities for defense, deterrence, deescalation, and peace.

In War and Anti-War, the Tofflers argue that while the third-wave war form is information warfare, the third-wave peace form is also driven by the widespread availability of information to minimize misunderstanding of intentions, actions, and goals of competing parties. Even as information is exploited for intelligence purposes, the increasing availability of this information has the potential to reduce uncertainty in nation states’ understanding of each other. Notice, however, that information technology is a two-edged sword, offering the potential for cooperation and peace, or its use as an instrument of conflict and war. As with nuclear technology, humankind must choose the application of the technology.

information resources provide powerful tools to engage nations in security dialogue and to foster emerging democracies by the power to communicate directly to those living under hostile, undemocratic regimes. The authors recommended four peace-form activities that may be tasked to information peacemakers.

  1. Engage undemocratic states and aid democratic traditions—Information tools, telecommunications, and broadcast and computer networks provide a means to supply accurate news and unbiased editorials to the public in foreign countries, even where information is suppressed by the leadership.
  2. Protect new democracies—Ideological training in areas such as democratic civil/military relationships can support the transfer from military rule to democratic societies.
  3. Prevent and resolve regional conflicts—Telecommunication and network information campaigns provide a means of suppressing ethnonationalist propaganda while offering an avenue to provide accurate, unbiased reports that will abate rather than incite violence and escalation.
  4. Deter crime, terrorism, and proliferation, and protect the environment—Information resources that supply intelligence, indications and warnings, and cooperation between nations can be used to counter transnational threats in each of these areas.

1.10 The Current State of Information Warfare

At the writing of this book, it has been well over a decade since the concept of information warfare was introduced as a critical component of the current revolution in military affairs (RMA).

1.10.1 State of the Military Art

The U.S. National Defense University has established a School of Information Warfare and Strategy curriculum for senior officers to study IW strategy and policy and to conduct directed research at the strategic level.

The United States is investigating transitional and future legal bases for the conduct of information warfare because the character of some information attacks (anonymity, lack of geospatial focus, ability to execute without a “regulated force” of conventional “combatants,” and use of unconventional information weapons) are not consistent with current accepted second-wave definitions in the laws of armed conflict.

1.10.2 State of Operational Implementation

The doctrine of information dominance (providing dominant battlespace awareness and battlespace visualization) has been established as the basis for structuring all command and control architectures and operations. The services are committed to a doctrine of joint operations, using interoperable communication links and exchange of intelligence, surveillance, and reconnaissance (ISR) in a global command and control system (GCCS) with a common software operating environment (COE).

1.10.3 State of Relevant Information Warfare Technology

The technology of information warfare, unlike previous war forms, is driven by commercial development rather than classified military research and development.

Key technology areas now in development include the following:

  • Intelligence, surveillance, and reconnaissance (ISR) and command and control (C2) technologies provide rapid, accurate fusion of all-source data and mining of critical knowledge to present high-level intelligence to information warfare planners. These technologies are applied to understand geographic space (terrain, road networks, physical features) as well cyberspace (computer networks, nodes, and link features).
  • Information security technologies include survivable networks, multilevel security, network and communication security, and digital signature and advanced authentication technologies.
  • Information technologies, being developed in the commercial sector and applicable to information-based warfare, include all areas of network computing, intelligent mobile agents to autonomously operate across networks, multimedia data warehousing and mining, and push-pull information dissemination.
  • Electromagnetic weapon technologies, capable of nonlethal attack of information systems for insertion of information or denial of service.
  • Information creation technologies, capable of creating synthetic and deceptive virtual information (e.g., morphed video, synthetic imagery, duplicated virtual realities).

1.11 Summary

Information warfare is real. Information operations are being conducted by both military and non-state-sponsored organizations today. While the world has not yet witnessed nor fully comprehended the implications of a global information war, it is now enduring an ongoing information competition with sporadic conflicts in the information domain.

 

Szafranski, R., (Col. USAF), “A Theory of Information Warfare: Preparing for 2020,” Airpower Journal, Vol. 9, No. 1, Spring 1995.

Part I
Information-Based Warfare

Information, as a resource, is not like the land or material resources that were central to the first and second waves.

Consider several characteristics of the information resource that make it unique, and difficult to quantify.

  • Information is abstract—It is an intangible asset; it can take the form of an entity (a noun—e.g., a location, description, or measurement) or a process (a verb—e.g., a lock combination, an encryption process, a patented chemical process, or a relationship).
  • Information has multiple, even simultaneous uses—The same unit of information (e.g., the precise location and frequency of a radio transmitter) can be used to exploit the transmissions, to selectively disrupt communications, or to precisely target and destroy the transmitter. Information about the weather can be used simultaneously by opposing forces, to the benefit of both sides.
  • Information is inexhaustible, but its value may perish with time—Information is limitless; it can be discovered, created, transformed, and repeated, but its value is temporal: recent information has actionable value, old information may have only historical value.
  • Information’s relationship to utility is complex and nonlinear—The utility or value of information is not a function simply of its volume or magnitude. Like iron ore, the utility is a function of content, or purity; it is a function of the potential of data, the content of information, and the impact of knowledge in the real world. This functional relationship from data to the impact of knowledge is complex and unique to each application of information technology.

2.1 The Meaning of Information

The observation process acquires data about some physical process (e.g., combatants on the battlefield, a criminal organization, a chemical plant, an industry market) by the measurement and quantification of observed variables. The observations are generally formatted into reports that contain items such as time of observation, location, collector (or sensor or source) and measurements, and the statistics describing the level of confidence in those measurements. An organization process converts the data to information by indexing the data and organizing it in context (e.g., by spatial, temporal, source, content, or other organizing dimensions) in an information base for subsequent retrieval and analysis. The understanding process creates knowledge by detecting or discovering relationships in the information that allow the data to be explained, modeled, and even used to predict future behavior of the process being observed. At the highest (and uniquely human) level, wisdom is the ability to effectively apply knowledge to implement a plan or action to achieve a desired goal or end state.

We also use the terminology creation or discovery to refer to the effect of transforming data into useful knowledge. Several examples of discovering previously unknown knowledge by the processes of analyzing raw data include the detection or location of a battlefield target, the identification of a purchasing pattern in the marketplace, distinguishing a subtle and threatening economic action, the cataloging of the relationships between terrorist cells, or the classification of a new virus on a computer network.

The authors of the Measurement of Meaning have summed up the issue:

[Meaning] certainly refers to some implicit process or state which must be inferred from observables, and therefore it is a sort of variable that contemporary psychologists would avoid dealing with as long as possible. And there is also, undoubtedly, the matter of complexity—there is an implication in the philosophical tradition that meanings are uniquely and infinitely variable, and phenomena of this kind do not submit readily to measurement [2].

In the business classic on the use of information, The Virtual Corporation, Davidow and Malone [3] distinguish four categories of information (Table 2.2).

  • Content information—This describes the state of physical or abstract items. Inventories and accounts maintain this kind of information; the military electronic order of battle (EOB) is content information.
  • Form information—This describes the characteristics of the physical or abstract items; the description of a specific weapon system in the EOB is a form.
  • Behavior information—In the form of process models this describes the behavior of objects or systems (of objects); the logistics process supporting a division on the battlefield, for example, may be modeled as behavior information describing supply rate, capacity, and volume.
  • Action information—This is the most complex form, which describes reasoning processes that convert information to knowledge, upon which actions can be taken. The processes within command and control decision support tools are examples of Davidow’s action information category.

In a classic text on strategic management of information for business, Managing Information Strategically, the authors emphasized the importance of understanding its role in a particular business to develop business strategy first, then to develop information architectures.

  • Information leverage—In this strategy, IT enables process innovation, amplifying competitive dimensions. An IBW example of this strategy is the application of data links to deliver real-time targeting to weapons (sensor-to-shooter applications) to significantly enhance precision and effectiveness.

Information product—This strategy captures data in existing processes to deliver information or knowledge (a by-product) that has a benefit (market value) in addition to the original process. Intelligence processes in IBW that collect vast amounts of data may apply this strategy to utilize the inherent information by-products more effectively. These by-products may support civil and environmental applications (markets) or support national economic competitive processes [6].

• Information business—The third strategy “sells” excess IT capacity, or information products and services. The ability to share networked computing across military services or applications will allow this strategy to be applied to IBW applications, within common security boundaries.

2.2 Information Science

We find useful approaches to quantifying data, information, and knowledge in at least six areas: the epistemology and logic branches of philosophy, the engineering disciplines of information theory and decision theory, the semiotic theory, and knowledge management. Each discipline deals with concepts of information and knowledge from a different perspective, and each contributes to our understanding of these abstract resources. In the following sections, we summarize the approach to define and study information or knowledge in each area.

2.2.1 Philosophy (Epistemology)

The study of philosophy, concerned with the issues of meaning and significance of human experience, presumes the existence of knowledge and focuses on the interpretation and application of knowledge. Because of this, we briefly consider the contribution of epistemology, the branch of philosophy dealing with the scope and extent of human knowledge, to information science.

Representative of current approaches in epistemology, philosopher Immanuel Kant [7] distinguished knowledge about things in space and time (phenomena) and knowledge related to faith about things that transcend space and time (noumena). Kant defined the processes of sensation, judgment, and reasoning that are applied to derive knowledge about the phenomena. He defined three categories of knowledge derived by judgment:

(1) analytic a priori knowledge is analytic, exact, and certain (such as purely theoretical, imaginary constructs like infinite straight lines), but often uninformative about the world in which we live;

(2) synthetic a priori knowledge is purely intuitive knowledge derived by abstract synthesis (such as purely mathematical statements and systems like geometry, calculus, and logic), which is exact and certain; and

(3) synthetic a posteriori knowledge about the world, which is subject to human sense and perception errors.

2.2.2 Philosophy (Logic)

Philosophy has also contributed the body of logic that has developed the formal methods to describe reasoning. Logic uses inductive and deductive processes that move from premises to conclusions through the application of logical arguments.

The general characteristics of these forms of reasoning can be summarized.

  1. Inductive arguments can be characterized by a “degree of strength” or “likelihood of validity,” while deductive arguments are either valid (the premises are true and the conclusion must always be true) or invalid (as with the non sequitur, in which the conclusion does not follow from the premises). There is no measure of degree or uncertainty in deductive arguments; they are valid or invalid—they provide information or nothing at all.
  2. The conclusions of inductive arguments are probably, but not necessarily, true if all of the premises are true because all possible cases can never be observed. The conclusions of a deductive argument must be true if all of the premises are true (and the argument logic is correct).
  3. Inductive conclusions contain information (knowledge) that was not implicitly contained in the premises. Deductive conclusions contain information that was implicitly contained in the premises. The deductive conclusion makes that information (knowledge) explicit.

To the logician, deduction cannot provide “new knowledge” in the sense that the conclusion is implicit in the premises.

2.2.3 Information Theory

The engineering science of information theory provides a statistical method for quantifying information for the purpose of analyzing the transmission, formatting, storage, and processing of information.

 

2.2.4 Decision Theory

Decision theory provides analytical means to make decisions in the presence of uncertainty and risk by choosing among alternatives. The basis of this choice is determined by quantifying the relative consequences of each alternative and choosing the best alternative to optimize some objective function.

Decision theory distinguishes two categories of utility functions that provide decision preferences on the basis of value or risk [12].

  • Value—These utility functions determine a preferred decision on the basis of value metrics where no uncertainty is present.
  • Risk—These functions provide a preferred decision in the presence of uncertainty (and therefore a risk that the decision may not deliver the highest utility).

While not offering a direct means of measuring information per se, utility functions provide a means of measuring the effect of information on the application in which it is used. The functions provide an intuitive means of measuring effectiveness of information systems.

2.2.5 Semiotic Theory

  1. S. Peirce (1839–1914) introduced philosophical notions, including a “semiotic” logic system that attempts to provide a “critical thinking” method for conceptual understanding of observations (data) using methods of exploratory data analysis [13]. This system introduced the notion of abduction as a means of analyzing and providing a “best explanation” for a set of data. Expanding on the inductive and deductive processes of classical logic, Peirce viewed four stages of scientific inquiry [14].
  • Abduction explores a specific set of data and creates plausible hypotheses to explain the data.
  • Deduction is then applied to refine the hypothesis and develops a testable means of verifying the hypothesis using other premises and sets of data.
  • Induction then develops the general explanation that is believed to apply to all sets of data viewed together in common. This means the explanation should apply to future sets of data.
  • Deduction is finally applied, using the induced template to detect the presence of validated explanations to future data sets.

2.2.6 Knowledge Management

The management of information, in all of its forms, is a recognized imperative in third-wave business as well as warfare. The discipline of “knowledge management” developed in the business domain emphasizes both information exploitation (identified in Table 2.5) and information security as critical for businesses to compete in the third-wave marketplace.

Information Value (I v ) = [Assets − Liabilities] − Total Cost of Ownership

Where, assets include
At = The assets derived from the information at time of arrival

An = The assets if the information did not arrive;
Lt = The liabilities derived from the information at time of arrival;

Ln = The liabilities if the information did not arrive;
In = Total cost associated with the information;
I1 = The cost to generate the information;
I2 = The cost to format the information;
I3 = The cost to reformat the information;
I4 = The cost to duplicate the information;
I5 = The cost to transmit or transport the information (distribute);

I6 = The cost to store the information;
I7 = The cost to use the information, including retrieval.

 

The objective of knowledge management is ultimately to understand the monetary value of information. These measures of the utility of information in the discipline of business knowledge management are based on capital values.

 

2.4 Measuring the Utility of Information in Warfare

The relative value of information can be described in terms of the information performance within the information system, or in terms of the effectiveness (which relates the utility), or the ultimate impact of information on the user.

Utility is a function of both the accuracy and timeliness of information delivered to the user. The utility of estimates of the state of objects, complex situations, or processes is dependent upon accuracies of locations of objects, behavioral states, identities, relationships, and many other factors. Utility is also a function of the timeliness of information, which is often perishable and valueless after a given period. The relationships between utility and many accuracy and timeliness variables are often nonlinear and always highly dependent upon both the data collection means and user application.

The means by which the utility of information and derived knowledge is enhanced in practical systems usually includes one (or all) of four categories of actions.

  • Acquire the right data—The type, quality, accuracy, timeliness, and rate of data collected have a significant impact on knowledge delivered.
  • Optimize the extraction of knowledge—The processes of transforming data to knowledge may be enhanced or refined to improve efficiency, throughput, end-to-end speed, or knowledge yield.
  • Distribute and apply the knowledge—The products of information processes must be delivered to users on time, in understandable formats, and in sufficient quantity to provide useful comprehension to permit actions to be taken.
  • Ensure the protection of information—In the competitive and conflict environments, information and the collection, processing, and distribution channels must be protected from all forms of attack. Information utility is a function of both reliability for and availability to the user.

Metrics in a typical military command and control system that may be used to measure information performance, effectiveness, and military utility, respectively.

  • Sensor detection performance at the data level influences the correlation performance that links sensor data, and therefore the inference process that detects an opponent’s hostile action (event).
  • Event detection performance (timeliness and accuracy) influences the effectiveness of reasoning processes to assess the implications of the event.
  • Effectiveness of the assessment of the impact on military objectives influences the decisions made by commanders and, in turn, the outcome of those responses. This is a measure of the utility of the entire information process. It is at this last step that knowledge is coupled to military decisions and ultimately to military utility.

2.5 Translating Science to Technology

information, as process and content, is neither static nor inorganic. To view information as the static organized numbers in a “database” is a limited view of this resource. Information can be dynamic process models, capable of describing complex future behavior based on current measurements. Information also resides in humans as experience, “intuitive” knowledge, and other perceptive traits that will always make the human the valuable organic element of information architectures.

3

The Role of Technology in Information-Based Warfare

We now apply the information science principles developed in the last chapter to describe the core informationprocessing methods of information-based warfare: acquisition of data and creation of “actionable” knowledge.

The knowledge-creating process is often called exploitation—the extraction of military intelligence (knowledge) from collected data. These are the processes at the heart of intelligence, surveillance, and reconnaissance (ISR) systems and are components of most command and control (C2) systems. These processes must be understood because they are, in effect, the weapon factories of information-based warfare and the most lucrative targets of information warfare [1].

3.1 Knowledge-Creation Processes

Knowledge, as described in the last chapter, is the result of transforming raw data to organized information, and then to explanations that model the process from which the data was observed. The basic reasoning processes that were introduced to transform data into understandable knowledge apply the fundamental functions of logical inference.

In each reasoning case, collected data is used to make more general or more specific inferences about patterns in the data to detect the presence of entities, events, or relationships that can be used to direct the actions of the user to achieve some objective.

In the military or information warfare domain, these methods are used in two ways. First, both abduction (dealing with specific cases) and induction (extending to general application) are used to learn templates that describe discernible patterns of behavior or structure (of an opponent). Because both are often used, we will call this stage abduction-induction [2].

Second, deductive processes are used in the exploitation or intelligence analysis to detect and understand situations and threats based on the previously learned patterns. This second phase often occurs in a hierarchy of knowledge elements.

3.2 Knowledge Detection and Discovery

Two primary categories of knowledge-creation processes can be distinguished, based on their approach to inference. Each is essential to information-based warfare exploitation processes that seek to create knowledge from volumes of data described.

The abductive-inductive process, data mining, discovers previously unrecognized patterns in data (new knowledge about characteristics of an unknown pattern class) by searching for patterns (relationships in data) that are in some sense “interesting.” The discovered candidates are usually presented to human users for analysis and validation before being adopted as general cases.

The deductive exploitation process, data fusion, detects the presence of previously known patterns in many sources of data (new knowledge about the existence of a known pattern in the data) by searching for specific templates in sensor data streams to understand a local environment.

datasets used by these processes for knowledge creation are incomplete and dynamic and contain data contaminated by noise. These factors make the following process characteristics apply:

  • Pattern descriptions—Data mining seeks to induce general pattern descriptions (reference patterns, templates, or matched filters) to characterize data understood, while data fusion applies those descriptions to detect the presence of patterns in new data.
  • Uncertainty in inferred knowledge—The data and reference patterns are uncertain, leading to uncertain beliefs or knowledge.
  • Dynamic state of inferred knowledge—The process is sequential and inferred knowledge is dynamic, being refined as new data arrives.
  • Use of domain knowledge—Knowledge about the domain (e.g., constraints or context) may be used in addition to observed data.

 

3.3 Knowledge Creation in the OODA Loop

The observe-orient-decide-act (OODA) model of command and control introduced earlier in Chapter 1 may now be expanded to show the role of the knowledge-creation processes in the OOD stages of the loop. Figure 3.3 details these information functions in the context of the loop.

Observe functions include technical and human collection of data. Sensing of signals, pixels, and words (signals, imagery, and human intelligence) forms the core of information-based warfare observation.

Orient functions include data mining to discover or learn previously unknown characteristics in the data that can be used as templates for detection and future prediction in data fusion processes.

Decide functions include both automated and human processes. Simple, rapid responses can be automated upon the detection of preset conditions, while the judgment of human commanders is required for more complex, critical decisions that allow time for human intervention.

3.4 Deductive Data Fusion

Data fusion is an adaptive knowledge-creation process in which diverse elements of similar or dissimilar observations (data) are aligned, correlated, and combined into organized and indexed sets (information), which are further assessed to model, understand, and explain (knowledge) the makeup and behavior of a domain under observation

The process is performed cognitively by humans in daily life (e.g., combining sight, sound, and smells to detect a threat) and has long been applied for manual investigations in the military, intelligence, and law enforcement. In recent decades, the automation of this process has been the subject of intense research and development within the military, particularly to support intelligence and command and control

Deduction is performed at the data, information, and knowledge levels.

The U.S. DoD Joint Directors of Laboratories (JDL) have established a reference process model of data fusion that decomposes the process into four basic levels of information-refining processes (based upon the concept of levels of information abstraction).

  • Level 1: object refinement—Correlation of all data to refine individual objects within the domain of observation. (The JDL model uses the term object to refer to real-world entities; however, the subject of interest may be a transient event in time as well.)
  • Level 2: situation refinement—Correlation of all objects (information) within the domain to assess the current situation.
  • Level 3: meaning refinement—Correlation of the current situation with environmental and other constraints to project the meaning of the situation (knowledge). (The meaning of the situation refers to its implications to the user, such as threat, opportunity, or change. The JDL adopted the terminology threat refinement for this level; however, we adopt meaning refinement as a more general term encompassing broader applications than military threats.)
  • Level 4: process refinement—Continual adaptation of the fusion process to optimize the delivery of knowledge against a defined knowledge objective.

The technology development in data fusion has integrated disciplines such as the computer sciences, signal processing, pattern recognition, statistical analysis, and artificial intelligence to develop R&D and operational systems.

3.5 Abductive-Inductive Data Mining

Data mining is a knowledge-creation process in which large sets of data (in data warehouses) are cleansed and transformed into organized and indexed sets (information), which are then analyzed to discover hidden and implicit but previously undefined patterns that reveal new understanding of general structure and relationships (knowledge) in the data of a domain under observation.

The object of discovery is a “pattern,” which is defined as a statement in some language, L, that describes relationships in subset Fs of a set of data F such that:

  1. The statement holds with some certainty, c;
  2. The statement is simpler (in some sense) than the enumeration of all facts in Fs [11].

Mined knowledge, then, is formally defined as a pattern that is (1) interesting, according to some user-defined criterion, and (2) certain to a userdefined measure of degree.

Data mining (also called knowledge discovery) is distinguished from data fusion by two key characteristics.

  • Inference method—Data fusion employs known patterns and deductive reasoning, while data mining searches for hidden patterns using abductive-inductive reasoning.
  • Temporal perspective—The focus of data fusion is retrospective (determining current state based on past data), while data mining is both retrospective and prospective, focused on locating hidden patterns that may reveal predictive knowledge.

While there is no standard reference model for fusion, the general stages of the process as shown in Figure 3.5 illustrate a similarity to the data fusion process [14–16]. Beginning with sensors and sources, the data warehouse is populated with data, and successive functions move the data toward learned knowledge at the top. The sources, queries, and mining processes may be refined, similar to data fusion. The functional stages in the figure are described in the sections that follow.

Data Warehouse

Data from many sources are collected and indexed in the warehouse, initially in the native format of the source. One of the chief issues facing many mining operations is the reconciliation of diverse databases that have different formats (e.g., field and record sizes or parameter scales), incompatible data definitions, and other differences. The warehouse collection process (flow-in) may mediate between these input sources to transform the data before storing in common form [17].

Data Cleansing

The warehoused data must be inspected and cleansed to identify and correct or remove conflicts, incomplete sets, and incompatibilities common to combined databases. Cleansing may include several categories of checks.

  • Uniformity checks verify the ranges of data, determine if sets exceed limits, and verify that formats versions are compatible.
  • Completeness checks evaluate the internal consistency of datasets to make sure , for example, that aggregate values are consistent with individual data components (e.g., “verify that total sales is equal to sum of all regional sales, and that data for all sales regions is present”).
  • Conformity checks exhaustively verify that each index and reference exists.
  • Genealogy checks generate and check audit trails to primitive data to permit analysts to “drill down” from high-level information.

Data Selection and Transformation

The types of data that will be used for mining are selected on the basis of relevance. For large operations, initial mining may be performed on a small set, then extended to larger sets to check for the validity of abducted patterns. The selected data may then be transformed to organize all data into common dimensions and to add derived dimensions as necessary for analysis.

Data Mining Operations

Mining operations may be performed in a supervised manner in which the analyst presents the operator with a selected set of “training” data in which the analyst has manually determined the existence of pattern classes.

Discovery Modeling

Prediction or classification models are synthesized to fit the data patterns detected. This is the proscriptive aspect of mining: modeling the historical data in the database (the past) to provide a model to predict the future.

Visualization

The human analyst uses visualization tools that allow discovery of interesting patterns in the data. The automated mining operations “cue” the operator to

discovered patterns of interest (candidates), and the analyst then visualizes the pattern and verifies if, indeed, it contains new and useful knowledge.

On-line analytic processing (OLAP) refers to the manual visualization process in which a data manipulation engine allows the analyst to create data views from the human perspective, and to perform the following categories of functions:

  1. Multidimensional analysis of the data across dimensions, through relationships (e.g., hierarchies), and in perspectives natural to the analyst (rather than inherent in the data);
  2. Transformation of the viewing dimensions or slicing of the multidimensional array to view a subset of interest;
  3. Drill down into the data from high levels of aggregation, downward into successively deeper levels of information;
  4. Reach through from information levels to the underlying raw data, including reaching beyond the information base back to raw data by the audit trail generated in genealogy checking;
  5. Modeling of hypothetical explanations of the data, in terms of trend analysis and extrapolations.

Refinement Feedback

The analyst may refine the process by adjusting the parameters that control the lower level processes, as well as requesting more or different data on which to focus the mining operations.

3.6 Integrating Information Technologies

On-line analytic processing (OLAP) refers to the manual visualization process in which a data manipulation engine allows the analyst to create data views from the human perspective, and to perform the following categories of functions:

  1. Multidimensional analysis of the data across dimensions, through relationships (e.g., hierarchies), and in perspectives natural to the analyst (rather than inherent in the data);
  2. Transformation of the viewing dimensions or slicing of the multidimensional array to view a subset of interest;
  3. Drill down into the data from high levels of aggregation, downward into successively deeper levels of information;
  4. Reach through from information levels to the underlying raw data, including reaching beyond the information base back to raw data by the audit trail generated in genealogy checking;
  5. Modeling of hypothetical explanations of the data, in terms of trend analysis and extrapolations.

 

3.6 Integrating Information Technologies

It is natural that a full reasoning process would integrate the discovery processes of data mining with the detection processes of data fusion to coordinate learning and application activities.

(Nonliteral target signatures refer to those signatures that extend across many diverse observation domains and are not intuitive or apparent to analysts, but may be discovered only by deeper analysis of multidimensional data.)

3.7 Summary

The automation of the reasoning processes of abduction, induction, and deduction provides the ability to create actionable knowledge (military intelligence) from large volumes of data collected in IBW. As the value of information increases in all forms of information warfare, even more so is the importance of developing these reasoning technologies. While the scope of the global information infrastructure (and global sensing) increases, these technologies are required to extract meaning (and commercial value) from the boundless volumes of data available.

Data fusion and mining processes are yet on the initial slope of the technology development curve, and development is fueled by significant commercial R&D investments. Integrated reasoning tools will ultimately provide robust discovery and detection of knowledge for both business competition and information warfare.

4

Achieving Information Superiority Through Dominant Battlespace Awareness and Knowledge

The objective of information-based warfare is ultimately to achieve military goals with the most efficient application of information resources. Fullspectrum dominance is the term used to describe this effective application of military power by information-based planning and execution of military opera-tions. The central objective is the achievement of information superiority or dominance. Information superiority is the capability to collect, process, and disseminate an uninterrupted flow of information while exploiting or denying an adversary’s ability to do the same. It is that degree of dominance in the information domain that permits the conduct of operations without effective opposition

Dominant battlespace awareness (DBA)—The understanding of the current situation based, primarily, on sensor observations and human sources;

Dominant battlespace knowledge (DBK)—The understanding of the meaning of the current situation, gained from analysis (e.g., data fusion or simulation).

DBK is dependent upon DBA, and DBA is dependent on the sources of data that observe the battlespace. Both are necessary for information superiority.

4.1 Principles of Information Superiority

Information superiority is a component of an overall strategy for application of military power and must be understood in that context.

Massed effects are achieved by four operating concepts that provide a high degree of synergy from widely dispersed forces that perform precision targeting of high-lethality weapons at longer ranges.

  1. Dominant maneuver—Information superiority will allow agile organizations with high-mobility weapon systems to attack rapidly at an aggressor’s centers of gravity across the full depth of the battlefield. Synchronized and sustained attacks will be achieved by dispersed forces, integrated by an information grid.
  2. Precision engagement—Near-real-time information on targets will permit responsive command and control, and the ability to engage and reengage targets with spatial and temporal precision (“at the right place, just at the right time”).
  3. Focused logistics—Information superiority will also enable efficient delivery of sustainment packages throughout the battlefield, optimizing the logistic process.
  4. Full-dimension protection—Protection of forces during deployment, maneuver, and engagement will provide freedom of offensive actions and can be achieved only if superior information provides continuous threat vigilance.

Information superiority must create an operational advantage to benefit the applied military power and can be viewed as a precondition for these military operations in the same sense that air superiority is viewed as a precondition to certain strategic targeting operations.

DBA provides a synoptic view, in time and space, of the conflict and supplies the commander with a clear perception of the situation and the consequences of potential actions. It dispels the “fog of war” described by Clausewitz.

To be effective, DBA/DBK also must provide a consistent view of the battlespace, distributed to all forces—although each force may choose its own perspective of the view. At the tactical level, a continuous dynamic struggle occurs between sides, and the information state of a side may continuously change from dominance, to parity, to disadvantage.

The information advantage delivered by DBA/DBK has the potential to deliver four categories of operational benefits:

Battlespace preparation—Intelligence preparation of the battlespace (IPB) includes all activities to acquire an understanding of the physical, political, electronic, cyber, and other dimensions of the battlespace. Dimensions such as terrain, government, infrastructure, electronic warfare, and telecommunication/computer networks are mapped to define the structure and constraints of the battlespace [10]. IPB includes both passive analysis and active probing of specific targets to detail their characteristics. Orders of battle and decision-making processes are modeled, vulnerabilities and constraints on adversaries’ operations are identified, and potential offensive responses are predicted. The product of this function is comprehension of the battlespace environment.

Battlespace surveillance and analysis—Continuous observation of the battlespace and analysis of the collective observations provide a detailed understanding of the dynamic states of individual components, events, and behaviors from which courses of action and intents can be inferred. The product is comprehensive state information.

Battlespace visualization—This is the process by which the commander (1) develops a clear understanding of the current state with relation to the enemy and environment, (2) envisions a desired end state that represents mission accomplishment, and then (3) subsequently visualizes the sequence of activities that moves the commander’s force from its current state to the end state. The product of this visualization is human comprehension and a comprehensive plan.

Battlespace awareness dissemination—Finally, the components of awareness and knowledge are distributed to appropriate participants at appropriate times and in formats compatible with their own mission. The product here is available and “actionable” knowledge.

4.1.1 Intelligence, Surveillance, and Reconnaissance (ISR)

Intelligence, the information and knowledge about an adversary obtained through observation, investigation, analysis, or understanding, is the product that provides battlespace awareness.

The process that delivers strategic and operational intelligence products is generally depicted in cyclic form (Figure 4.3), with six distinct phases :

  • Collection planning—Government and military decision makers define, at a high level of information abstraction, the knowledge that is required to make policy, strategy, or operational decisions. The requests are parsed into information required to deduce the required answers. This list of information is further parsed into the individual elements of data that must be collected to form that required information base. The required data is used to establish a plan of collection, which details the elements of data needed and the targets (people, places, and things) from which the data may be obtained.
  • Collection—Following the plan, human and technical sources of data are tasked to perform the collection. Table 4.4 summarizes the major collection sources, which include both open and closed access sources and human and technical means of acquisition.
  • Processing—The collected data is indexed and organized in an information base, and progress on meeting the requirements of the collection plan is monitored. As a result of collection, this organized data may adjust the plan on the basis of received data.
  • Analysis—The organized information base is processed using deductive inference techniques (described earlier in Chapter 3) that fuse all source data in an attempt to answer the requester’s questions.
  • Production—Intelligence may be produced in the format of dynamic visualizations on a war fighter’s weapon system or in formal reports to policymakers. Three categories of formal strategic and tactical intelligence reports are distinguished by their past, present, and future focus: (1) current intelligence reports are news-like reports that describe recent events or indications and warnings; (2) basic intelligence reports provide complete descriptions of a specific situation (order of battle or political situation, for example); and (3) intelligence estimates attempt to predict feasible future outcomes as a result of current situations, constraints, and possible influences [16].
  • Application—The intelligence product is disseminated to the user, providing answers to queries and estimates of accuracy of the product delivered. Products range from strategic intelligence estimates in the form of large hardcopy or softcopy documents for policy makers, to real-time displays that visualize battlespace conditions for a war fighter.

 

4.1.1.1 Sources of Intelligence Data

A taxonomy of intelligence data sources (Table 4.4) includes sources that are openly accessible or closed

two HUMINT sources are required to guide the technical intelligence sources. HUMINT source A provides insight into trucking routes to be used, allowing video surveillance to be focused on most likely traffic points. HUMINT source B, closely related to crop workers, monitors the movements of harvesting crews, providing valuable cueing for airborne sensors to locate crops and processing facilities. The technical sources also complement the HUMINT sources by providing verification of uncertain cues and hypotheses for the HUMINT sources to focus attention.

4.1.1.3 Automated Intelligence Processing

The intelligence process must deal with large volumes of source data, converting a wide range of text, imagery, video, and other media types into processed products. Information technology is providing increased automation of the information indexing, discovery, and retrieval (IIDR) functions for intelligence, especially the exponentially increasing volumes of global OSINT

The information flow in an automated or semiautomated facility (depicted in Figure 4.5) requires digital archiving and analysis to ingest continuous streams of data and manage large volumes of analyzed data. The flow can be broken into three phases: capture and compile, preanalysis, and exploitation (analysis).

The preanalysis phase indexes each data item (e.g., article, message, news segment, image, or book chapter) by (1) assigning a reference for storage; (2) generating an abstract that summarizes the content of the item and metadata describing the source, time, reliability-confidence, and relation to other items (“abstracting”); and (3) extracting critical descriptors that characterize the contents (e.g., keywords) or meaning (“deep indexing”) of the item for subsequent analysis. Spatial data (e.g., maps, static imagery, video imagery) must be indexed by spatial context (spatial location) and content (imagery content). The indexing process applies standard subjects and relationships, maintained in a lexicon and thesaurus that is extracted from the analysis information base. Following indexing, data items are clustered and linked before entry into the analysis base. As new items are entered, statistical analyses are performed to monitor trends or events against predefined templates that may alert analysts or cue their focus of attention in the next phase of processing. For example, if analysts are interested in relationships between nations A and B, all reports may be scored for a “tension factor” between those nations, and alerts may be generated on the basis of frequency, score intensity, and sources of incoming data items.

The third, exploitation, phase of processing presents data to the human intelligence analyst for examination using visualization tools to bring to focus the most meaningful and relevant data items and their interrelationships.

The categories of automated tools that are applied to the analysis information base include the following [25]:

  • Interactive search and retrieval tools permit analysts to search by topic, content, or related topics using the lexicon and thesaurus subjects.
  • Structured judgment analysis tools provide visual methods to link data, synthesize deductive logic structures, and visualize complex relationships between datasets. These tools enable the analyst to hypothesize, explore, and discover subtle patterns and relationships in large data volumes—knowledge that can be discerned only when all sources are viewed in a common context.
  • Modeling and simulation tools model hypothetical activities, allowing modeled (expected) behavior to be compared to evidence for validation or projection of operations under scrutiny.
  • Collaborative analysis tools permit multiple analysts in related subject areas, for example, to collaborate on the analysis of a common subject.
  • Data visualization tools present synthetic views of data and information to the analyst to permit patterns to be examined and discovered. Table 4.6 illustrates several examples of visualization methods applied to the analysis of large-volume multimedia data.

 

4.2 Battlespace Information Architecture

We have shown that dominant battlespace awareness is achieved by the effective integration of the sensing, processing, and response functions to provide a comprehensive understanding of the battlespace, and possible futures and consequences.

At the lowest tier is the information grid, an infrastructure that allows the flow of information from precision sensors, through processing, to precision forces.

This tier is the forward path observe function of the OODA loop, and the feedback path distribution channel to control the act function of the loop and collaborative exchange paths. The grid provides for secure, robust transfer of four categories of information (Table 4.8) across the battlespace: (1) information access, (2) messaging, (3) interpersonal communications, and (4) publishing or broadcasting.

Precision information direction tailors the flow of information on the grid, responding dynamically to the environment to allocate resources (e.g., bandwidth and content) to meet mission objectives. The tier includes the data fusion and mining processes that perform the intelligence-processing functions described in previous sections. These processes operate over the information grid, performing collaborative assessment of the situation and negotiation of resource allocations across distributed physical locations

The highest tier is effective force management, which interacts with human judgment to provide the following:

• Predictive planning and preemption—Commanders are provided predictions and assessments of likely enemy and planned friendly COAs with expected outcomes and uncertainties. Projections are based upon the information regarding state of forces and environmental constraints (e.g., terrain and weather). This function also provides continuous monitoring of the effectiveness of actions and degree of mission accomplishment. The objective of this capability is to provide immediate response and preemption rather than delayed reaction.

• Integrated force management—Because of the information grid and comprehensive understanding of the battlespace, force operations can be dynamically synchronized across echelons, missions, components, and coalitions. Both defense and offense can be coordinated, as well as the supporting functions of deployment, refueling, airlift, and logistics.

• Execution of time-critical missions—Time-critical targets can be prosecuted by automatic mission-to-target and weapon-to-target pairings, due to the availability (via the information grid) of immediate sensorderived targeting information. Detection and cueing of these targets permit rapid targeting and attack by passing targeting data (e.g., coordinates, target data, imagery) to appropriate shooters.

Force management is performed throughout the network, with long-term, high-volume joint force management occurring on one scale, and time-critical, low-volume, precision sensor-toshooter management on another. Figure 4.7 illustrates the distinction between the OODA loop processes of the time-critical sensor-to-shooter mission and the longer term theater battle management mission.

4.3 Summary

Dominant battlespace awareness and knowledge is dependent upon the ability to both acquire and analyze the appropriate data to comprehend the meaning of the current situation, the ability to project possible future courses of action, and the wisdom to know when sufficient awareness is achieved to act.

Part II
Information Operations for Information Warfare

5

Information Warfare Policy, Strategy, and Operations

Preparation for information warfare and the conducting of all phases of information operations at a national level requires an overarching policy, an implementing strategy developed by responsible organizations, and the operational doctrine and personnel to carry out the policy.

Information warfare is conducted by technical means, but the set of those means does not define the military science of C2W or netwar. Like any form of competition, conflict, or warfare, there is a policy that forms the basis for strategy, and an implementing strategy that governs the tactical application of the technical methods. While this is a technical book describing the methods, the system implementations of information warfare must be understood in the context of their guiding implementation.

Because of the uncertainty of consequences and the potential impact of information operations on civilian populations, policy and strategy must be carefully developed to govern the use of information operations technologies—technologies that may even provide capabilities before consequences are understood and policies for their use are fully developed.

5.1 Information Warfare Policy and Strategy

The technical methods of information warfare are the means at the bottom of a classical hierarchy that leads from the ends (objectives) of national security policy. The hierarchy proceeds from the policy to an implementing strategy, then to operational doctrine (procedures) and a structure (organization) that applies at the final tactical level the technical operations of IW. The hierarchy “flows down” the security policy, with each successive layer in the hierarchy implementing the security objectives of the policy.

Security Policy

Policy is the authoritative articulation of the position of a nation, defining its interests (the objects being secured), the security objectives for those interests, and its intent and willingness to apply resources to protect those interests. The interests to be secured and the means of security are defined by policy. The policy may be publicly declared or held private, and the written format must be concise and clear to permit the implementing strategy to be traceable to the policy.

Any security policy addressing the potential of information warfare must consider the following premises:

  1. National interest—The national information infrastructure (NII), the object of the information security policy, is a complex structure comprised of public (military and nonmilitary) and private elements. This infrastructure includes the information, processes, and structure, all of which may be attacked. The structure, contents, owners, and security responsibilities must be defined to clearly identify the object being

protected. The NII includes abstract and physical property; it does not include human life, although human suffering may be brought on by collateral effects.

  1. New vulnerabilities—Past security due to geographic and political positions of a nation no longer applies to information threats, in which geography and political advantages are eliminated. New vulnerabilities and threats must be assessed because traditional defenses may not be applicable.
  2. Security objective—The desired levels of information security must be defined in terms of integrity, authenticity, confidentiality, nonrepudiation, and availability.
  3. Intent and willingness—The nation must define its intent to use information operations and its willingness to apply those weapons. Questions that must be answered include the following:
    • What actions against the nation will constitute sufficient justification to launch information strikes?
    • What levels of information operations are within the Just War Doctrine? What levels fall outside?
    • What scales of operations are allowable, and what levels of direct and collateral damage resulting from information strikes are permissible?
    • How do information operations reinforce conventional operations?
    • What are the objectives of information strikes?
    • What are the stages of offensive information escalation, and how

are information operations to be used to de-escalate crises?

  1. Authority—The security of highly networked infrastructures like the NII requires shared authorities and responsibilities for comprehensive protection; security cannot be assured by the military alone. The authority and roles of public and private sectors must be defined. The national command authority and executing military agencies for offensive, covert, and deceptive information operations must be defined. As in nuclear warfare, the controls for this warfare must provide assurance that only proper authorities can launch offensive actions.
  2. Limitations of means—The ranges and limitations of methods to carry out the policy may be defined. The lethality of information operations, collateral damage, and moral/ethical considerations of conducting information operations as a component of a just war must be defined.
  3. Information weapons conventions and treaties—As international treaties and conventions on the use (first use or unilateral use) of information operations are established, the national commitments to such treaties must be made in harmony with strategy, operations, and weapons development.

essential elements of security policy… that may now be applied to information warfare by analogy include the following:

Defense or protection—This element includes all defensive means to protect the NII from attack: intelligence to assess threats, indications and warning to alert of impending attacks, protection measures to mitigate the effects of attack, and provisions for recovery and restoration. Defense is essentially passive—the only response to attack is internal.

Deterrence—This element is the threat that the nation has the will and capability to conduct an active external response to attack (or a preemptive response to an impending threat), with the intent that that the threat alone will deter an attack. A credible deterrence requires (1) the ability to identify the attacker, (2) the will and capability to respond, and (3) a valued interest that may be attacked [5]. Deterrence includes an offensive component and a dominance (intelligence) component to provide intelligence for targeting and battle damage assessment (BDA) support.

Security Strategy

National strategy is the art and science of developing and using the political, economic, and psychological powers of a nation, together with its armed forces, during peace and war, to secure national objectives.

The strategic process (Figure 5.2) includes both strategy developing activities and a complementary assessment process that continuously monitors the effectiveness of the strategy.

 

The components of a strategic plan will include, as a minimum, the following components:

  • Definition of the missions of information operations (public and private, military and nonmilitary);
  • Identification of all applicable national security policies, conventions, and treaties;
  • Statement of objectives and implementation goals;
  • Organizations, responsibilities, and roles;
  • Strategic plan elements:
    1. Threats, capabilities, and threat projections;
    2. NII structure, owners, and vulnerabilities;
    3. Functional (operational) requirements of IW capabilities (time phased);
    4. Projected gaps in ability to meet national security objectives, and plan to close gaps and mitigate risks;
    5. Organizational plan;
    6. Operational plan (concepts of operations);
    7. Strategic technology plan;
    8. Risk management plan;
  • Performance and effectiveness assessment plan.

5.2 An Operational Model of Information Warfare

Information operations are performed in the context of a strategy that has a desired objective (or end state) that may be achieved by influencing a target (the object of influence).

Information operations are defined by the U.S. Army as

Continuous military operations within the Military Information Environment (MIE) that enable, enhance and protect the friendly force’s ability to collect, process, and act on information to achieve an advantage across the full range of military operations; information operations include interacting with the Global Information Environment (GIE) and exploiting or denying an adversary’s information and decision capabilities

The model recognizes that targets exist in (1) physical space, (2) cyberspace, and (3) the minds of humans. The highest level target of information operations is the human perception of decision makers, policymakers, military commanders, even entire populations. The ultimate targets and the operational objective are to influence their perception to affect their decisions and resulting activities.

for example, the objective perception for targeted leaders may be “overwhelming loss of control, disarray, and loss of support from the populace.”

These perception objectives may be achieved by a variety of physical or abstract (information) means, but the ultimate target and objective is at the purely abstract perceptual level, and the effects influence operational behavior. The influences can cause indecision, delay a decision, or have the effect of biasing a specific decision. The abstract components of this layer include objectives, plans, perceptions, beliefs, and decisions.

Attacks on this intermediate layer can have specific or cascading effects in both the perceptual and physical layers.

5.3 Defensive Operations

The U.S. Defense Science Board performed a study of the defensive operations necessary to implement IW-defense at the national level, and in this section we adapt some of those findings to describe conceptual defensive capabilities at the operational level.

Offensive information warfare is attractive to many [potential adversaries] because it is cheap in relation to the cost of developing, maintaining, and using advanced military capabilities. It may cost little to suborn an insider, create false information, manipulate information, or launch malicious logic-based weapons against an information system connected to the globally shared telecommunication infrastructure. In addition, the attacker may be attracted to information warfare by the potential for large nonlinear outputs from modest inputs

Threat Intelligence, I&W

Essential to defense is the understanding of both the external threats and the internal vulnerabilities that may encounter attack. This understanding is provided by an active intelligence operation that performs external assessments of potential threats [16] and internal assessments of vulnerabilities.

The vulnerability assessment can be performed by analysis, simulation, or testing. Engineering analysis and simulation methods exhaustively search for access paths during normal operations or during unique conditions (e.g., during periods where hardware faults or special states occur). Testing methods employ “red teams” of independent evaluators armed with attack tools to exhaustively scan for access means to a system (e.g., communication link, computer, database, or display) and to apply a variety of measures (e.g., exploitation, disruption, denial of service, or destruction).

Protection Measures (IW-Defense)

Based on assessments of threats and vulnerabilities, operational capabilities are developed to implement protection measures (countermeasures or passive defenses) to deny, deter, limit, or contain attacks against the information infrastructure. All of these means may be adopted as a comprehensive approach, each component providing an independent contribution to overall protection of the infrastructure.

The prevention operations deploy measures at three levels.

Strategic-level activities seek to deter attacks by legal means that ban attacks, impose penalties or punishment on offenders, or threaten reprisals.

Operational security (OPSEC) activities provide security for physical elements of the infrastructure, personnel, and information regarding the infrastructure (e.g., classified technical data).

Technical security (INFOSEC) activities protect hardware, software, and intangible information (e.g., cryptographic keys, messages, raw data, information, knowledge) at the hardware and software levels.

The functions of tactical response include the following:

  • Surveillance—Monitor overall infrastructure status and analyze, detect, and predict effects of potential attacks. Generate alert status reports and warn components of the infrastructure of threat activity and expected events.
  • Mode control—Issue controls to components to modify protection levels to defend against incipient threat activities, and to oversee restoration of service in the postattack period.
  • Auditing and forensic analysis—Audit attack activity to determine attack patterns, behavior, and damage for future investigation, effectiveness analysis, offensive targeting, or litigation.
  • Reporting—Issue reports to command authorities.

5.4 Offensive Operations

Offensive operational capabilities require the capability to identify and specify the targets of attack (targeting) and then to attack those targets. These two capabilities must be able to be performed at all three levels of the operational model, as presented earlier in Section 5.2. In addition to these two, a third offensive capability is required at the highest (perceptual) level of the operational model: the ability to manage the perceptions of all parties in the conflict to achieve the desired end.

Public and civil affairs operations are open, public presentations of the truth (not misinformation or propaganda) in a context and format that achieves perception objectives defined in a perception plan. PSYOPS also convey only truthful messages (although selected “themes” and emphases are chosen to meet objectives) to hostile forces to influence both the emotions and reasoning of decision makers. PSYOPS require careful tailoring of the message (to be culturally appropriate) and selection of the media (to ensure that the message is received by the target population). The message of PSYOPS may be conveyed by propaganda or by actions.

military deception operations are performed in secrecy (controlled by operational security). These operations are designed to induce hostile military leaders to take operational or tactical actions that are favorable to, and exploitable by, friendly combat operations

They have the objective of conveying untruthful information to deceive for one of several specific purposes.

  1. Deceit—Fabricating, establishing, and reinforcing incorrect or preconceived beliefs, or creating erroneous illusions (e.g., strength or weakness, presence or nonexistence);
  2. Denial—Masking operations for protection or to achieve surprise in an attack operation;
  3. Disruption—Creating confusion and overload in the decision-making process;
  4. Distraction—Moving the focus of attention toward deceptive actions or away from authentic actions;
  5. Development—Creating a standard pattern of behavior to develop preconceived expectations by the observer for subsequent exploitation.

All of these perception management operations applied in military combat may be applied to netwar, although the media for communication (the global information infrastructure) and means of deceptive activities are not implemented on the physical battlefield. They are implemented through the global information infrastructure to influence a broader target audience.

Intelligence for Targeting and Battle Damage Assessment

The intelligence operations developed for defense also provide support to offensive attack operations, as intelligence is required for four functions.

  1. Target nomination—Selecting candidate targets for attack, estimating the impact if the target is attacked;
  2. Weaponeering—Selecting appropriate weapons and tactics to achieve the desired impact effects (destruction, temporary disruption or denial of service, reduction in confidence in selected function); the process targets vulnerability, weapon effect, delivery accuracy, damage criteria, probability of kill, and weapon reliability;
  3. Attack plan—Planning all aspects of the attack, including coordinated actions, deceptions, routes (physical, information infrastructure, or perception), mitigation of collateral damage, and contingencies;
  4. Battle damage assessment (BDA)—Measuring the achieved impact of the attack to determine effectiveness and plan reattack, if necessary.

Attack (IW-Offense) Operations

Operational attack requires planning, weapons, and execution (delivery) capabilities. The weapons include perceptual, information, and physical instruments employed to achieve the three levels of effect in the operational model.

Offensive operations are often distinguished as direct and indirect means.

Indirect attacks focus on influencing perception by providing information to the target without engaging the information infrastructure of the target. This may include actions to be observed by the target’s sensors, deception messages, electronic warfare actions, or physical attacks. External information is provided to influence perception, but the target’s structure is not affected.

Direct attacks specifically engage the target’s internal information, seeking to manipulate, control, and even destroy the information or the infrastructure of the target.

Offensive information warfare operations integrate both indirect and direct operations to achieve the desired effects on the target. The effectiveness of attacks is determined by security (or stealth), accuracy, and direct and collateral effects.

5.5 Implementing Information Warfare Policy and Strategy

This chapter has emphasized the flow-down of policy to strategy, and strategy to operations, as a logical, traceable process. In theory, this is the way complex operational capabilities must be developed. In the real world, factors such as the pace of technology, a threatening global landscape, and dynamic national objectives force planners to work these areas concurrently—often having a fully developed capability (or threat) without the supporting policy, strategy, or doctrine to enable its employment (or protection from the threat).

6
The Elements of Information Operations

Information operations are the “continuous military operations within the military information environment that enable, enhance, and protect the friendly force’s ability to collect, process, and act on information to achieve an advantage across the full range of military operations; information operations include interacting with the global information environment and exploiting or denying an adversary’s information and decision capabilities”

Some information operations are inherently “fragile” because they are based on subtle or infrequent system vulnerabilities, or because they rely on transient deceptive practices that if revealed, render them useless. Certain elements of IO have therefore been allocated to the operational military, while others (the more fragile ones) have been protected by OPSEC within the intelligence communities to reduce the potential of their disclosure.

6.1 The Targets of Information Operations

The widely used term information infrastructure refers to the complex of sensing, communicating, storing, and computing elements that comprise a defined information network conveying analog and digital voice, data, imagery, and multimedia data. The “complex” includes the physical facilities (computers, links, relays, and node devices), network standards and protocols, applications and software, the personnel who maintain the infrastructure, and the information itself. The infrastructure is the object of both attack and defense; it provides the delivery vehicle for the information weapons of the attacker while forming the warning net and barrier of defense for the defender. Studies of the physical and abstract structure of the infrastructure are therefore essential for both the defender and the targeter alike.

Three infrastructure categories are most commonly identified.

The global information infrastructure (GII) includes the international complex of broadcast communications, telecommunications, and computers that provide global communications, commerce, media, navigation, and network services between NIIs. (Note that some documents refer to the GII as the inclusion of all NIIs; for our purposes, we describe the GII as the interconnection layer between NIIs.)

The national information infrastructure (NII) includes the subset of the GII within the nation, and internal telecommunications, computers, intranets, and other information services not connected to the GII. The NII is directly dependent upon national electrical power to operate, and the electrical power grid is controlled by components of the NII.

The defense information infrastructure (DII) includes the infrastructure owned and maintained by the military (and intelligence) organizations of the nation for purposes of national security. The DII includes command, control, communications, and computation components as well as dedicated administration elements. These elements are increasingly integrated to the NII and GII to use commercial services for global reach but employ INFOSEC methods to provide appropriate levels of security.

The critical infrastructures identified by the U.S. President’s Commission on Critical Infrastructure Protection (PCCIP) include five sectors

  1. Information and communications (the NII)
  2. Banking and finance
  3. Energy
  4. Physical distribution
  5. Vital human services

Attackers may seek to achieve numerous policy objectives by attacking these infrastructures. In order to achieve these policies, numerous intermediate attack goals may be established that can then be achieved by information infrastructure attacks. Examples of intermediate goals might include the following:

  • Reduce security by reducing the ability of a nation to respond in its own national interest;
  • Weaken public welfare by attacking emergency services to erode public confidence in the sustainment of critical services and in the government;
  • Reduce economic strength to reduce national economic competitiveness.

Two capabilities are required for the NII:

  • Infrastructure protection requires defenses to prevent and mitigate the effects of physical or electronic attack.
  • Infrastructure assurance requires actions to ensure readiness, reliability, and continuity—restricting damage and providing for reconstitution in the event of an attack.

 

The conceptual model provides for the following basic roles and responsibilities:

  • Protected information environment—The private sector maintains protective measures (INFOSEC, OPSEC) for the NII supported by the deterrent measures contributed by the government. Deterrence is aimed at influencing the perception of potential attackers, with the range of responses listed in the figure. The private sector also holds responsibility for restoration after attack, perhaps supported by the government in legally declared emergencies.
  • Attack detection—The government provides the intelligence resources and integrated detection capability to provide indications and warnings (strategic) and alerts (tactical) to structured attacks.
  • Attack response—The government must also ascertain the character of the attack, assess motives and actors, and then implement the appropriate response (civil, criminal, diplomatic, economic, military, or informational).
  • Legal protection—In the United States, the government also holds responsibility (under the Bill of Rights, 1791, and derivative statues cited below) for the protection of individual privacy of information, including oral and wire communications [26]; computers, e-mail, and digitized voice, data, and video [27]; electronic financial records and the transfer of electronic funds [28,29]; and cellular and cordless phones and data communications [30]. This is the basis for civil and criminal deterrence to domestic and international criminal information attacks on the NII.

While the government has defined the NII, the private sector protects only private property, and there is no coordinated protection activity. Individual companies, for example, provide independent protection at levels consistent with their own view of risk, based on market forces and loss prevention.

IO attacks, integrated across all elements of critical infrastructure and targeted at all three levels of the NII, will attempt to destabilize the balance and security of these operations. The objective and methodology is to:

  • Achieve perception objectives at the perceptual level, causing leadership to behave in a desired manner.
  • This perception objective is achieved by influencing the components of the critical infrastructure at the application level.
  • This influence on the critical infrastructure is accomplished through attacks on the information infrastructure, which can be engaged at the physical, information, and perceptual layers.

6.1.3 Defense Information Infrastructure (DII)

The DII implements the functional “information grid”. In the United States, the structure is maintained by the Defense Information Systems Agency (DISA), which established the following definition:

The DII is the web of communications networks, computers, software, databases, applications, weapon system interfaces, data, security services, and other services that meet the information-processing and transport needs of DoD users across the range of military operations. It encompasses the following:

  1. Sustaining base, tactical, and DoD-wide information systems, and command, control, communications, computers, and intelligence (C4I) interfaces to weapons systems.
  2. The physical facilities used to collect, distribute, store, process, and display voice, data, and imagery.
  3. The applications and data engineering tools, methods, and processes to build and maintain the software that allow command and control (C2), intelligence, surveillance, reconnaissance, and mission support users to access and manipulate, organize, and digest proliferating quantities of information.
  4. The standards and protocols that facilitate interconnection and interoperation among networks.
  5. The people and assets that provide the integrating design, management, and operation of the DII, develop the applications and services, construct the facilities, and train others in DII capabilities and use.

Three distinct elements of the U.S. DII are representative of the capabilities required by a third-wave nation to conduct information-based warfare.

6.2 Information Infrastructure War Forms

As the GII and connected NIIs form the fundamental interconnection between societies, it is apparent that this will become a principal vehicle for the conduct of competition, conflict, and warfare. The concept of network warfare was introduced and most widely publicized by RAND authors John Arquilla and David Ronfeldt in their classic think piece, “Cyberwar is Coming!”

The relationships between these forms of conflict may be viewed as sequential and overlapping when mapped on the conventional conflict time line that escalates from peace to war before de-escalation to return to peace (Figure 6.7). Many describe netwar as an ongoing process, with degrees of intensity moving from daily unstructured attacks to focused net warfare of increasing intensity until militaries engage in C2W. Netwar activities are effectively the ongoing, “peacetime”-up-to-conflict components of IO.

6.3 Information Operations for Network Warfare

Ronfeldt and Arquilla define netwar as a societal-level ideational conflict at a grand level, waged in part through Internetted modes of communications. It is conducted at the perceptual level, exploiting the insecurities of a society via the broad access afforded by the GII and NIIs. Netwar is characterized by the following qualities that distinguish it from all other forms:

  • Target—Society at large or influential subsets are targeted to manage perception and influence the resulting opinion. Political, economic, and even military segments of society may be targeted in an orchestrated fashion. The effort may be designed to create and foster dissident or opposition groups that may gain connectivity through the available networks.
  • Media—All forms of networked and broadcast information and communications within the NII of a targeted nation state may be used to carry out information operations. The GII may be the means for open access or illicit penetration of the NII.
  • Means—Networks are used to conduct operations, including (1) public influence (open propaganda campaigns, diplomatic measures, and psychological operations); (2) deception (cultural deception and subversion, misinformation); (3) disruption and denial (interference with media or information services); and (4) exploitation (use of networks for subversive activities, interception of information to support targeting).
  • Players—The adversaries in netwar need not be nation states. Nation states and nonstate organizations in any combination may enter into conflict. As networks increasingly empower individuals with information influence, smaller organizations (with critical information resources) may wage effective netwar attacks.

In subsequent studies, Arquilla and Ronfeldt have further developed the potential emergence of netwar as dominant form of societal conflict in the twenty-first century and have prescribed the necessary preparations for such conflicts. A 1994 U.S. Defense Science Board study concluded that “A large structured attack with strategic intent against the U.S. could be prepared and exercised under the guise of unstructured activities”

6.3.1 A Representative Netwar Scenario

The U.S. defense community, futurists, and security analysts have hypothesized numerous netwar scenarios that integrate the wide range of pure information weapons, tactics, and media that may be applied by future information aggressors.

6.4 Information Operations for Command and Control Warfare (C2W)

Information operations, escalated to physical engagement against military command and control systems, enter the realm of C2W. C2W is “the integrated use of operations security (OPSEC), military deception, psychological operations (PSYOPS), electronic warfare (EW), and physical destruction, mutually supported by intelligence to deny information to, influence, degrade, or destroy adversary command and control capabilities, while protecting friendly command and control capabilities against such actions”.

C2W is distinguished from netwar in the following dimensions:

Target—Military command and control is the target of C2W. Supporting critical military physical and information infrastructures are the physical targets of C2W.

Media—While the GII is one means of access for attack, C2W is characterized by more direct penetration of an opponent’s airspace, land, and littoral regions for access to defense command and control infrastructure. Weapons are delivered by air, space, naval, and land delivery systems, making the C2W overt, intrusive, and violent. This makes it infeasible to conduct C2W to the degree of anonymity that is possible for netwar.

Means—C2W applies physical and information attack means to degrade (or destroy) the OODA loop function of command and control systems, degrading military leaders’ perceptual control effectiveness and command response. PSYOPS, deception, electronic warfare, and physically destructive means are used offensively, and OPSEC provides protection of the attack planning.

Players—The adversaries of C2W are military organizations of nation states, authorized by their governments.

Ronfeldt and Arquilla emphasize that future C2W will be characterized by a revision in structure, as well as operations, to transform the current view of command and control of military operations:

Waging [C2W] may require major innovations in organizational design, in particular a shift from hierarchies to networks. The traditional reliance on hierarchical designs may have to be adapted to network-oriented models to allow greater flexibility, lateral connectivity, and teamwork across institutional boundaries. The traditional emphasis on command and control, a key strength of hierarchy, may have to give way to emphasis on consultation and coordination, the crucial building blocks of network designs

6.5.1 Psychological Operations (PSYOPS)

PSYOPS are planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning, and ultimately the behaviors of foreign governments, organizations, groups, and individuals. The objective of PSYOPS is to manage the perception of the targeted population, contributing to the achievement of larger operational objectives. Typical military objectives include the creation of uncertainty and ambiguity (confusion) to reduce force effectiveness, the countering of enemy propaganda, the encouragement of disaffection among dissidents, and the focusing of attention on specific subjects that will degrade operational capability. PSYOPS are not synonymous with deception; in fact, some organizations, by policy, present only truthful messages in PSYOPS to ensure that they will be accepted by target audiences.

PSYOPS are based on two dimensions: the communication of a message via an appropriate media to a target population (e.g., enemy military personnel or foreign national populations).

PSYOP activities begin with creation of the perception objective and development of the message theme(s) that will create the desired perception in the target population (Figure 6.11). Themes are based upon analysis of the psychological implications and an understanding of the target audience’s culture, preconceptions, biases, means of perception, weaknesses, and strengths. Theme development activities require approval and coordination across all elements of government to assure consistency in diplomatic, military, and economic messages. The messages may take the form of verbal, textual messages (left brain oriented) or “symbols” in graphic or visual form (right brain oriented).

6.5.2 Operational Deception

Military deception includes all actions taken to deliberately mislead adversary military decision makers as to friendly military capabilities, intentions, and operations, thereby causing the adversary to take specific actions (or inactions) that will contribute to the accomplishment of a friendly mission [60]. Deception operations in netwar expand the targets to include society at large, and have the objective of inducing the target to behave in manner (e.g., trust) that contributes to the operational mission.

Deception contributes to the achievement of a perception objective; it is generally not an end objective in itself.

Two categories of misconception are recognized: (1) ambiguity deception aims to create uncertainty about the truth, and (2) misdirection deception aims to create certainty about a falsehood. Deception uses methods of distortion, concealment, falsification of indicators, and development of misinformation to mislead the target to achieve surprise or stealth. Feint, ruse, and diversion activities are common military deceptive actions.

 

Because deception operations are fragile (their operational benefit is denied if detected), operational security must be maintained and the sequencing of deceptive and real (overt) activities must be timed to protect the deception until surprise is achieved. As in PSYOPS, intelligence must provide feedback on the deception effects to monitor the degree to which the deception story is believed.

Deception operations are based on exploitation of bias, sensitivity, and capacity vulnerabilities of human inference and perception (Table 6.9) [61]. These vulnerabilities may be reduced when humans are aided by objective decision support systems, as noted in the table.

Electronic attack can be further subdivided into four fundamental attack categories: exploitation, deception, disruption or denial, or destruction

6.5.5 Intelligence

Intelligence operations contribute assessments of threats (organizations or individuals with inimical intent, capability, and plans); preattack warnings; and postattack investigation of events.

Intelligence can be viewed as a defensive operation at the perception level because it provides information and awareness of offensive PSYOPS and deception operations.

Intelligence on information threats must be obtained in several categories:

  1. Organization threat intelligence—Government intelligence activities maintain watches for attacks and focus on potential threat organizations, conducting counterintelligence operations (see next section) to determine intent, organizational structure, capability, and plans.
  2. Technical threat intelligence—Technical intelligence on computer threats and technical capabilities are supplied by the government, academia, or commercial services to users as services.

 

6.5.6 Counterintelligence

Structured attacks require intelligence gathering on the infrastructure targets, and it is the role of counterintelligence to prevent and obstruct those efforts. Network counterintelligence gathers intelligence on adversarial individuals or organizations (threats) deemed to be motivated and potentially capable of launching a network attack.

6.5.7 Information Security (INFOSEC)

We employ the term INFOSEC to encompass the full range of disciplines to provide security protection and survivability of information systems from attacks, including the most common disciplines,

  • INFOSEC—Measures and controls that protect the information infrastructure against denial of service and unauthorized (accidental or intentional) disclosure, modification, or destruction of information infrastructure components (including data). INFOSEC includes consideration of all hardware and/or software functions, characteristics and/or features; operational procedures, accountability procedures, and access controls at the central computer facility, remote computer, and terminal facilities; management constraints; physical structures and devices; and personnel and communication controls needed to provide an acceptable level of risk for the infrastructure and for the data and information contained in the infrastructure. It includes the totality of security safeguards needed to provide an acceptable protection level for an infrastructure and for data handled by an infrastructure.
  • COMSEC—Measures taken to deny unauthorized persons information derived from telecommunications and to ensure the authenticity of such telecommunications. Communications security includes cryptosecurity, transmission security, emission security, and physical security of communications security material and information.
  • TEMPEST—The study and control of spurious electronic signals emitted by electrical equipment.
  • COMPUSEC—Computer security is preventing attackers from achieving objectives through unauthorized access or unauthorized use of computers and networks.
  • System survivability—The capacity of a system to complete its mission in a timely manner, even if significant portions of the system are incapacitated by attack or accident.

 

6.5.8 Operational Security (OPSEC)

Operations security denies adversaries information regarding intentions, capabilities, and plans by providing functional and physical protection of people, facilities, and physical infrastructure components. OPSEC seeks to identify potential vulnerabilities and sources of leakage of critical indicators [80] to adversaries, and to develop measures to reduce those vulnerabilities. While INFOSEC protects the information infrastructure, OPSEC protects information operations (offensive and defensive).

7

An Operational Concept (CONOPS) for Information Operations

Units or cells of information warriors will conduct the information operations that require coordination of technical disciplines to achieve operational objectives. These cells require the support of planning and control tools to integrate and synchronize both the defensive and offensive disciplines introduced in the last chapter.

This chapter provides a baseline concept of operations (CONOPS) for implementing an offensive and defensive joint service IO unit with a conceptual support tool to conduct sustained and structured C2W. We illustrate the operational-level structure and processes necessary to implement information operations—in support of overall military operations—on a broad scale in a military environment.

 

The 16 essential capabilities identified in the U.S. Joint Warfighter Science and Technology Plan (1997) as necessary to achieve an operational information warfare capability [1].

  1. Information consistency includes the integrity, protection, and authentication of information systems.
  2. Access controls/security services ensures information security and integrity by limiting access to information systems to authorized personnel only. It includes trusted electronic release, multilevel information security, and policies.

3.Service availability ensures that information systems are available when needed, often relying upon communications support for distributed computing.

  1. Network management and control ensures the use of reconfigurable robust protocols and control algorithms, self-healing applications, and systems capable of managing distributed computing over heterogeneous platforms and networks.
  2. Damage assessment determines the effectiveness of attacks in both a defensive capacity (e.g., where and how bad) and an offensive capacity (e.g., measure of effectiveness).
  3. Reaction (isolate, correct, act) responds to a threat, intruder, or network or system disturbance. Intrusions must be characterized and decision makers must have the capability to isolate, contain, correct, monitor surreptitiously, and so forth. The ability to correct includes recovery, resource reallocation, and reconstitution.
  4. Vulnerability assessment and planning is an all-encompassing functional capability that includes the ability to realistically assess the joint war fighter’s information system(s) and information processes and those of an adversary. The assessment of war-fighter systems facilitates the use of critical protection functions such as risk management and vulnerability analysis. The assessment of an adversary’s information system provides the basis for joint war-fighter attack planning and operational execution.
  5. Preemptive indication provides system and subsystem precursors or indications of impending attack.
  6. Intrusion detection/threat warning enables detection of attempted and successful intrusions (malicious and nonmalicious) by both insiders and outsiders.

10.Corruption of adversary information/systems can take many diverse forms, ranging from destruction to undetected change or infection of information. There are two subsets of this function: (1) actions taken on information prior to its entry into an information system, and (2) actions taken on information already contained within an information system.

  1. Defeat of adversary protection includes the defeat of information systems, software and physical information system protection schemes, and hardware.
  2. Penetration of adversary information system provides the ability to intrude or inject desired information into an adversary’s information system, network, or repository. The function includes the ability to disguise the penetration—either the fact that the penetration has occurred or the exact nature of the penetration.

13.Physical destruction of adversary’s information system physically denies an adversary the means to access or use its information systems. Actions include traditional hard kills as well as actions of a less destructive nature that cause a physical denial of service.

  1. Defeat of adversary information transport defeats any means involved in the movement of information either to or within a given information system. It transcends the classical definition of electronic warfare by encompassing all means of information conveyance rather than just the traditional electrical means.
  2. Insertion of false station/operator into an adversary’s information system provides the ability to inject a false situation or operator into an adversary’s information system.
  3. Disguise of sources of attack encompasses all actions designed to deny an adversary any knowledge of the source of an information attack or the source of information itself. Disguised sources, which deny the adversary true information sources, often limit the availability of responses, thereby delaying correction or retaliation.

Concept of Operations (CONOPS) for Information Operations Support System (IOSS)

Section 1 General 1.1 Purpose

This CONOPS describes an information operations support system (IOSS) comprised of integrated and automated tools to plan and conduct offensive and defensive information operations.

This CONOPS is a guidance document, does not specify policy, and is intended for audiences who need a quick overview or orientation to information operations (IO).

1.2 Background

Information operations provide the full-spectrum means to achieve information dominance by: (1) monitoring and controlling the defenses of a force’s information infrastructure, (2) planning activities to manage an adversary’s perception, and (3) coordinating PSYOPS, deception, and intrusive physical and electronic attacks on the adversary’s information infrastructure.

CONOPS provides an overview of the methodology to implement an IO cell supported by the semiautomated and integrated IOSS tools to achieve information dominance objectives. The following operational benefits are accrued:

  • Synchronization—An approach to synchronize all aspects of military operations (intelligence, OPSEC, INFOSEC, PSYOPS, deception, information, and conventional attack) and to deconflict adverse actions between disciplines;
  • Information sharing—The system permits rapid, adaptive collaboration among all members of the IO team;
  • Decision aiding—An automated process to manage all IO data, provide multiple views of the data, provide multiple levels of security, and aid human operators in decision making.

 

3.3 Operational Process

Defensive planning is performed by the OPSEC and INFOSEC officers, who maintain a complete model of friendly networks and status reports on network performance. Performance and intrusion detection information is used to initiate defensive actions (e.g., alerts, rerouting, service modification, initiation of protection or recovery modes). The defensive process is continuous and dynamic, and adapts security levels and access controls to maintain and manage the level of accepted risk established at the operational level.

The flow of offensive planning activities performed by the IOSS  is organized by the three levels of planning.

• Perceptual level—The operational plan defines the intent of policy and operational objectives. The operational and perception plans, and desired behaviors of the perception targets (audiences), are defined at this level.

• Information infrastructure level—The functional measures for achieving perception goals, in the perception target’s information infrastructure, are developed at this level.

• Physical level—The specific disciplines that apply techniques (e.g., physical attack, network attack, electronic support) are tasked at this level.

The IOSS performs the decide function of the OODA loop for information operations, and the functional flow is organized to partition both the observe/orient function that provides inputs and the operational orders (OPORDS) that initiate the attack actions. The sequence of planning activities proceeds from the perceptual to the physical level, performing the flow-down operations defined in the following subsections.

3.3.1 Perception Operations The operational objectives and current situation are used to develop the desired perception objectives, which are balanced with all other operational objectives.

3.3.2 Information Infrastructure Operations At this level, the targeted information infrastructure (II) (at all ISO levels) is analyzed and tactics are developed to achieve the attack objectives by selecting the elements of the II to be attacked (targeted). The product is a prioritized high-value target (HVT) list. Using nodal analysis, targets are nominated for attack by the desired functional effect to achieve flowed-down objectives: denial, disruption, deceit, exploitation, or destruction.

Once the analysis develops an optimized functional model of an attack approach that achieves the objectives, weapons (techniques) are selected to accomplish the functional effects. This weaponeering process pairs the techniques (weapons) to targets (e.g., links, nodes, processing, individual decision makers). It also considers the associated risks due to attack detection and collateral damage and assigns intelligence collection actions necessary to perform BDA to verify the effectiveness of the attack.

3.3.3 Physical Level At the physical level, the attacking disciplines plan and execute the physical-level attacks.

Section 4 Command Relationships

4.3 Intelligence Support

IOSS requires intelligence support to detect, locate, characterize, and map the threat-critical infrastructure at three levels.

Section 5 Security 5.1 General

IO staff operations will be implemented and operated at multiple levels of security (MLS). Security safeguards consist of administrative, procedural, physical, operational, and/or environmental, personnel, and communications security; emanation security; and computer security (i.e., hardware, firmware, network, and software), as required.

Section 6 Training

6.1 General

Training is the key to successful integration of IO into joint military operations. Training of IO battle staff personnel is required at the force and unit levels, and is a complex task requiring mastery of the related disciplines of intelligence, OPSEC, PSYOPS, deception, electronic warfare, and destruction.

6.2 Formal Training

The fielding and operation of an IO cell or battle staff may require formal courses or unit training for the diverse personnel required. Training audiences include instructors, IO operators, IO battle staff cadre, system support, a broad spectrum of instructors in related disciplines, and senior officers.

7.2 Select Bibliography

Command and Control Warfare Policy

CJCSI 3210.01, Joint Information Warfare Policy, Jan. 2, 1996. DOD Directive S-3600.1, Information Warfare.

CJCSI 3210.03, Joint Command and Control Warfare Policy (U), Mar. 31, 1996.
JCS Pub 3-13.1, Joint Command and Control Warfare (C2W) Operations, Feb. 7, 1996.

Information Operations

“Information Operations,” Air Force Basic Doctrine (DRAFT), Aug. 15, 1995. FM-100-6, Information Operations, Aug. 27, 1997.
TRADOC Pam 525-69, Concept for Information Operations, Aug. 1, 1995.

Intelligence

Joint Pub 2-0, Doctrine for Intelligence Support to Joint Operations, May 5, 1995. AFDD 50, Intelligence, May 1996.
FM 34-130, Intelligence Preparation of the Battlefield, July 8, 1994.

PSYOPS, Civil and Public Affairs

JCS Pub 3-53, “Doctrine for Joint Psychological Operations,” AFDD 2.5-5, Psychological Operations, Feb. 1997.

FM 33-1, Psychological Operations, Feb. 18, 1993. FM 41-10, Civil Affairs Operations, Jan. 11, 1993. FM 46-1, Public Affairs Operations, July 23, 1992.

Operational Deception

CJCSI 3211.01, Joint Military Deception, June 1, 1993.
JCS Pub 3-58, Joint Doctrine for Operational Deception, June 6, 1994.
AR 525-21, Battlefield Deception Policy, Oct. 30, 1989.
FM 90-2, Battlefield Deception [Tactical Cover and Deception], Oct. 3, 1988. FM 90-2A (C), Electronic Deception, June 12, 1989.

Information Attack

FM 34-1, Intelligence and Electronic Warfare Operations, Sept. 27, 1994.

FM 34-37, Echelon Above Corps Intelligence and Electronic Warfare Operations, Jan. 15, 1991.

FM 34-36, Special Intelligence Forces Intelligence and Electronic Warfare Operations, Sept. 30, 1991.

Operational Security (OPSEC)

DOD Directive 5205.2, Operations Security Program, July 7, 1983. Joint Pub No. 3-54 Joint Doctrine for Operations Security.

AFI 10-1101, (Air Force), Operational Security Instruction.

AR 530-1, (Army) Operations Security, Mar. 3, 1995.

Information Security (INFOSEC)

DoD 5200.1-R, Information Security Program Regulation. AFPD 31-4, (Air Force) Information Security, Aug. 1997.
AR 380-19, (Army) Information System Security, Aug. 1, 1990.

8
Offensive Information Operations

This chapter introduces the functions, tactics, and techniques of malevolence against information systems. Offensive information operations target human perception, information that influences perception, and the physical world that is perceived. The avenues of these operations are via perceptual, information, and physical means.

Offensive information operations are malevolent acts conducted to meet the strategic, operational, or tactical objectives of authorized government bodies; legal, criminal, or terrorist organizations; corporations; or individuals. The operations may be legal or illegal, ethical or unethical, and may be conducted by authorized or unauthorized individuals. The operations may be performed covertly, without notice by the target, or they may be intrusive, disruptive, and even destructive. The effects on information may bring physical results that are lethal to humans.

Offensive operations are uninvited, unwelcome, unauthorized, and detrimental to the target; therefore, we use the term attack to refer to all of these operations.

security design must be preceded by an understanding of the attacks it must face.

Offensive information attacks have two basic functions: to capture or to affect information. (Recall that information may refer to processes or to data/information/knowledge content.) These functions are performed together to achieve the higher level operational and perceptual objectives. In this chapter, we introduce the functions, measures, tactics, and techniques of offensive operations.

  • Functions—The fundamental functions (capture and affect) are used to effectively gain a desired degree of control of the target’s information resources. Capturing information is an act of theft of a resource if captured illegally, or technical exploitation if the means is not illicit. The object of capture may be, for example, a competitor’s data, an adversary’s processed information, another’s electronic cash (a knowledgelevel resource with general liquidity), or conversations that provide insight into a target’s perception. Affecting information is an act of intrusion with intent to cause unauthorized effects, usually harmful to the information owner. The functional processes that capture and affect information are called offensive measures, designed to penetrate operational and defensive security measures of the targeted information system.
  • Tactics—The operational processes employed to plan, sequence, and control the countermeasures of an attack are the attack tactics. These tactics consider tactical factors, such as attack objectives; desired effects (e.g., covertness; denial or disruption of service; destruction, modification, or theft of information); degree of effects; and target vulnerabilities.
  • Techniques—The technical means of capturing and affecting information of humans—their computers, communications, and supporting infrastructures—are described as techniques. In addition to these dimensions, other aspects, depending upon their application, may characterize the information attacks.
  • Motive—The attacker’s motive may be varied (e.g., ideological, revenge, greed, hatred, malice, challenge, theft). Though not a technical characteristic, motive is an essential dimension to consider in forensic analysis of attacks.
  • Invasiveness—Attacks may be passive or active. Active attacks invade and penetrate the information target, while passive attacks are noninvasive, often observing behaviors, information flows, timing, or other characteristics. Most cryptographic attacks may be considered passive relative to the sender and receiver processes, but active and invasive to the information message itself.
  • Effects—The effects of attacks may vary from harassment to theft, from narrow, surgical modification of information to large-scale cascading of destructive information that brings down critical societal infrastructure.
  • Ethics and legality—The means and the effects may be legal or illegal, depending upon current laws. The emerging opportunities opened by information technology have outpaced international and U.S. federal laws to define and characterize legal attacks. Current U.S. laws, for example, limit DoD activities in peacetime. Traditional intelligence activities are allowed in peacetime (capture information), but information attacks (affect information) form a new activity (not necessarily lethal, but quite intrusive) not covered by law. Offensive information operations that affect information enable a new range of nonlethal attacks that must be described by new laws and means of authorization, even as blockades, embargoes, and special operations are treated today. These laws must define and regulate the authority for transitional conflict operations between peace and war and must cover the degree to which “affect” operations may access nonmilitary infrastructure (e.g., commercial, civilian information). The laws must also regulate the scope of approved actions, the objective, and the degree to which those actions may escalate to achieve objectives. The ethics of these attacks must also be considered, understanding how the concepts of privacy and ownership of real property may be applied to the information resource. Unlike real property, information is a property that may be shared, abused, or stolen without evidence or the knowledge of the legitimate owner.

8.1 Fundamental Elements of Information Attack

Before introducing tactics and weapons, we begin the study of offense with a complete taxonomy of the most basic information-malevolent acts at the functional level. This taxonomy of attack countermeasures may be readily viewed in an attack matrix formed by the two dimensions:

  • Target level of the IW model: perceptual, information, or physical;
  • Attack category: capture or affect.

The attack matrix (Figure 8.1) is further divided into the two avenues of approach available to the attacker:

Direct, or internal, penetration attacks—Where the attacker penetrates [1] a communication link, computer, or database to capture and exploit internal information, or to modify information (add, insert, delete) or install a malicious process;

Indirect, or external, sensor attacks—Where the attacker presents open phenomena to the system’s sensors or information to sources (e.g., media, Internet, third parties) to achieve counterinformation objectives. These attacks include insertion of information into sensors or observation of the behavior of sensors or links interconnecting fusion nodes.

In C2W, indirect attacks target the observation stage of the OODA loop, while direct attacks target the orient stage of the loop [2]. The attacker may, of course, orchestrate both of these means in a hybrid attack in which both actions are supportive of each other

Two categories of attacks that affect information are defined by the object of attack.

Content attacks—The content of the information in the system may be attacked to disrupt, deny, or deceive the user (a decision maker or process). In C2W information operations, attacks may be centered on changing or degrading the intelligence preparation of the battlefield (IPB) databases, for example, to degrade its use in a future conflict.

Temporal attacks—The information process may be affected in such a way that the timeliness of information is attacked. Either a delay in receipt of data (to delay decision making or desynchronize processes) or deceptive acceleration by insertion of false data characterizes these attacks.

8.2

The Weapons of Information Warfare

8.3.1 Network Attack Vulnerabilities and Categories

Howard has developed a basic taxonomy of computer and network attacks for use in analyzing security incidents on the Internet [5]. The taxonomy structure is based on characterizing the attack process (Figure 8.2) by five basic components that characterize any attack.

  1. Attackers—Six categories of attackers are identified (and motivations are identified separately, under objectives): hackers, spies, terrorists, corporate, professional criminals, and vandals.
  2. Tools—The levels of sophistication of use of tools to conduct the attack are identified.
  3. Access—The access to the system is further categorized by four branches.

Vulnerability exploited—Design, configuration (of the system), and implementation (e.g., software errors or bugs [7]) are all means of access that may be used.

Level of intrusion—The intruder may obtain unauthorized access, but may also proceed to unauthorized use, which has two possible subcategories of use.

 

Use of processes—The specific process or service used by the unauthorized user is identified as this branch of the taxonomy (e.g., SendMail, TCP/IP).

Use of information—Static files in storage or data in transit may be the targets of unauthorized use.

  1. Results—Four results are considered: denial or theft of service, or corruption or theft (disclosure) of information.
  2. Objectives—Finally, the objective of the attack (often closely correlated to the attacker type) is the last classifying property.

(This taxonomy is limited to network attacks using primarily information layer means, and can be considered a more refined categorization of the attacks listed in the information-layer row of the attack matrix presented earlier in Section 8.1.)

/IP).

8.4 Command and Control Warfare Attack Tactics

In military C2W, the desired attack effects are degradation of the opponent’s OODA loop operations (ineffective or untimely response), disruption of decision-making processes, discovery of vulnerabilities, damage to morale, and, ultimately, devastation of the enemy’s will to fight.

Command and control warfare has often been characterized as a war of OODA loops where the fastest, most accurate loop will issue the most effective actions [20]. The information-based warfare concepts introduced in Chapter 3 (advanced sensors, networks, and fusion systems) speed up the loop, improving information accuracy (content), visualization and dissemination (delivery), and update rates (timeliness).

Offensive information operations exploit the vulnerabilities described here and in Section 8.3.1.

Attacks exploit vulnerabilities in complex C4I systems to counter security and protection measures, as well as common human perceptual, design, or configuration vulnerabilities that include the following:

  • Presumption of the integrity of observations and networked reports;
  • Presumption that observation conflicts are attributable only to measurement error;
  • Presumption that lack of observation is equivalent to nondetection rather than denial;
  • Absence of measures to attribute conflict or confusion to potential multisource denial and spoofing.

Four fusion-specific threat mechanisms can be defined to focus information on the fusion process:

  • Exploitation threats seek to utilize the information obtained by fusion systems or the fusion process itself to benefit the adversary. Information that can be captured from the system covertly can be used to attack the system, to monitor success of IW attacks, or to support other intelligence needs.
  • Deception threats to fusion systems require the orchestration of multiple stimuli and knowledge of fusion processes to create false data and false fusion decisions, with the ultimate goal of causing improper decisions by fusion system users. Deception of a fusion system may be synchronized with other deception plots, including PSYOPS and military deceptions to increase confidence in the perceived plot.
  • Disruption of sensor fusion systems denies the fusion process the necessary information availability or accuracy to provide useful decisions. Jamming of sensors, broadcast floods to networks, overloads, and soft or temporary disturbance of selected links or fusion nodes are among the techniques employed for such disruption.
  • Finally, softand hard-kill destruction threats include a wide range of physical weapons, all of which require accurate location and precision targeting of the fusion node.

The matrix provides a tool to consider each individual category of attack against each element of the system.

8.5 IW Targeting and Weaponeering Considerations

Structured information strikes (netwar or C2W) require functional planning before coordinating tactics and weapons for all sorties at the perceptual, information, and physical levels. The desired effects, whether a surgical strike on a specific target or cascading effects on an infrastructure, must be defined and the uncertainty in the outcome must also be determined. Munitions effects, collateral damage, and means of verifying the functional effects achieved must be considered, as in physical military attacks.

8.8 Offensive Operations Analysis, Simulation, and War Gaming

The complexity of structured offensive information operations and the utility of their actions on decision makers is not fully understood or completely modeled. Analytic models, simulations, and war games will provide increasing insight into the effectiveness of these unproven means of attack. Simulations and war games must ultimately evaluate the utility of complex, coordinated, offensive information operations using closed loop models (Figure 8.11) that follow the OODA loop structure presented in earlier chapters to assess the influence of attacks on networks, information systems, and decision makers.

Measures of performance and effectiveness are used to assess the quantitative effectiveness of IW attacks (or the effectiveness of protection measures to defend against them). The measures are categorized into two areas.

• Performance metrics quantify specific technical values that measure the degree to which attack mechanisms affect the targeted information source, storage, or channel.

• Effectiveness metrics characterize the degree to which IW objectives impact the mission functions of the targeted system.

8.9 Summary

The wide range of offensive operations, tactics, and weapons that threaten information systems demand serious attention to security and defense. The measures described in this chapter are considered serious military weapons. The U.S. director of central intelligence (DCI) has testified that these weapons must be considered with other physical weapons of mass destruction, and that the electron should be considered the ultimate precision guided weapon [65].

9
Defensive Information Operations

This chapter provides an overview of the defensive means to protect the information infrastructure against the attacks enumerated in the last chapter. Defensive IO measures are referred to as information assurance.

Information operations that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and nonrepudiation. This includes providing for the restoration of information systems by incorporating protection, detection, and reaction capabilities.

assurance includes the following component properties and capabilities:

  • Availability provides assurance that information, services, and resources will be accessible and usable when needed by the user.
  • Integrity assures that information and processes are secure from unauthorized tampering (e.g., insertion, deletion, destruction, or replay of data) via methods such as encryption, digital signatures, and intrusion detection.
  • Authentication assures that only authorized users have access to information and services on the basis of controls: (1) authorization (granting and revoking access rights), (2) delegation (extending a portion of one entity’s rights to another), and (3) user authentication (reliable corroboration of a user, and data origin. (This is a mutual property when each of two parties authenticates the other.)
  • Confidentiality protects the existence of a connection, traffic flow, and information content from disclosure to unauthorized parties.
  • Nonrepudiation assures that transactions are immune from false denial of sending or receiving information by providing reliable evidence that can be independently verified to establish proof of origin and delivery.
  • Restoration assures information and systems can survive an attack and that availability can be resumed after the impact of an attack.

While these asymmetric threats (e.g., lone teenager versus large corporation or DoD) have captured significant attention, they do not pose the more significant threat that comes in two areas.

• Internal threats (structured or unstructured)—Any insider with access to the targeted system poses a serious threat. Perverse insiders, be they disgruntled employees, suborned workers, or inserted agents, pose an extremely difficult and lethal threat. Those who have received credentials for system access (usually by a process of background and other assessments) are deemed trustworthy. Protection from malicious acts by these insiders requires high-visibility monitoring of activities (a deterrent measure), frequent activity audits, and high-level physical security and internal OPSEC procedures (defensive measures). While continuous or periodic malicious actions may be detected by network behavior monitoring, the insider inserted to perform a single (large) destructive act is extremely difficult to detect before that act. OPSEC activities provide critical protection in these cases, due to the human nature of the threat. This threat is the most difficult, and it’s risk should not be understated because of the greater attention often paid to technical threats.

• Structured external threatsAttackers with deep technical knowledge of the target, strong motivation, and the capability to mount combination attacks using multiple complex tactics and techniques also pose a serious threat. These threats may exploit subtle, even transitory, network vulnerabilities (e.g., configuration holes) and apply exhaustive probing and attack paths to achieve their objectives. While most computer vulnerabilities can be readily corrected, the likelihood that all computers in a network will have no vulnerabilities exposed at any given time is not zero. Structured attackers have the potential to locate even transient vulnerabilities, to exploit the momentary opportunity to gain access, and then expand the penetration to achieve the desired malevolent objective of attack.

9.1 Fundamental Elements of Information Assurance

The definition of information assurance includes six properties, of which three are considered to be the fundamental properties from which all others derive [20].

• Confidentiality (privacy)—Assuring that information (internals) and the existence of communication traffic (externals) will be kept secret, with access limited to appropriate parties;

  • Integrity—Assuring that information will not be accidentally or maliciously altered or destroyed, that only authenticated users will have access to services, and that transactions will be certified and unable to be subsequently repudiated (the property of nonrepudiation);
  • Availability—Assuring that information and communications services will be ready for use when expected (includes reliability, the assurance that systems will perform consistently and at an acceptable level of quality; survivability, the assurance that service will exist at some defined level throughout an attack; and restoration to full service following an attack).

These fundamentals meet the requirements established for the U.S. NII [21] and the international community for the GII.

9.2 Principles of Trusted Computing and Networking

Traditional INFOSEC measures applied to computing provided protection from the internal category of attacks.

For over a decade, the TCSEC standard has defined the criteria for four divisions (or levels) of trust, each successively more stringent than the level preceding it.

  • D: Minimal protection—Security is based on physical and procedural controls only; no security is defined for the information system.
  • C: Discretionary protection—Users (subjects), their actions, and data (objects) are controlled and audited. Access to objects is restricted based upon the identify of subjects.
  • B: Mandatory protection—Subjects and objects are assigned sensitivity labels (that identify security levels) that are used to control access by an independent reference monitor that mediates all actions by subjects.
  • A: Verified protection—Highest level of trust, which includes formal design specifications and verification against the formal security model.

The TCSEC defines requirements in four areas: security policy, accountability, assurance, and documentation.

Most commercial computer systems achieve C1 or C2 ratings, while A and B ratings are achieved only by dedicated security design and testing with those ratings as a design objective.

Networks pose significant challenges to security.

  • Heterogeneous systems—The variety of types and configurations of systems (e.g., hardware platforms, operating systems), security labeling, access controls, and protocols make security analysis and certification formidable.
  • Path security—Lack of control over communication paths through the network may expose data packets to hostile processes.
  • Complexity—The complexity of the network alone provides many opportunities for design, configuration, and implementation vulnerabilities (e.g., covert channels) while making comprehensive analysis formidable.

Trusted networks require the properties already identified, plus three additional property areas identified in the TNI.

  1. Communications integrity—Network users must be authenticated by secure means that prevent spoofing (imitating a valid user or replaying a previously sent valid message). The integrity of message contents must be protected (confidentiality), and a means must be provided to prove that a message has been sent and received (nonrepudiation).
  2. Protection from service denial—Networks must sustain attacks to deny service by providing a means of network management and monitoring to assure continuity of service.
  3. Compromise protection services—Networks must also have physical and information structure protections to maintain confidentiality of the traffic flow (externals) and message contents (internals). This requirement also imposes selective routing capabilities, which permit control of the physical and topological paths that network traffic traverse.

The concept of “layers” of trust or security is applied to networks, in which the security of each layer is defined and measures are taken to control access between layers and to protect information transferred across the layers.

9.3 Authentication and Access Control

The fundamental security mechanism of single or networked systems is the control of access to authentic users. The process of authentication requires the user to verify identity to establish access, and access controls restrict the processes that may be performed by the authenticated user or users attempting to gain authentication.

9.3.1 Secure Authentication and Access Control Functions

Authentication of a user in a secure manner requires a mechanism that verifies the identity of the requesting user to a stated degree of assurance.

Remote authentication and granting of network access is similar to the functions performed by military identification friend or foe (IFF) systems, which also require very high authentication rates. In network systems, as in IFF, cryptographic means combined with other properties provide high confidence and practical authentication. A variety of methods combining several mechanisms into an integrated system is usually required to achieve required levels of security for secure network applications.

 

 

9.5 Incident Detection and Response

Extensive studies of network intrusion detection have documented the technical challenge of achieving comprehensive detection on complex networks. There are several technical approaches to implementing detection mechanisms including the following:

  1. Known pattern templates—Activities that follow specific sequences (e.g., attempts to exploit a known vulnerability, repeated password attacks, virus code signatures, etc.) of identified threats may be used to detect incidents. For example, Courtney, a detection program developed by the Lawrence Livermore National Laboratory, specifically detects the distinctive scan pattern of the SATAN vulnerability scanning tool.
  2. Threatening behavior templatesActivities that follow general patterns that may jeopardize security are modeled and applied as detection criteria. Statistical, neural network, and heuristic detection mechanisms can detect such general patterns, but the challenge is to maintain an acceptably low false alarm rate with such general templates.
  3. Traffic analysisNetwork packets are inspected within a network to analyze source and destination as an initial filter for suspicious access activities. If packets are addressed to cross security boundaries, the internal packet contents are inspected for further evidence of intrusive or unauthorized activity (e.g., outgoing packets may be inspected for keywords, data contents; inbound packets for executable content).
  4. State-based detectionChanges in system states (i.e., safe or “trusted” to unsafe transitions as described in Section 9.2) provide a means of detecting vulnerable actions.

 

Responses to incident detections can range from self-protective measures (terminate offending session and modify security policy) to offensive reactions, if the source of attack can be identified. In order to identify attackers, entrapment measures that are used include the deliberate insertion of an apparent security hole into a system.

In order to identify attackers, entrapment measures that are used include the deliberate insertion of an apparent security hole into a system. The intruder is seduced (through the entrapment hole) into a virtual system (often called the “honey pot”) that appears to be real and allows the intruder to carry out an apparent attack while the target system “observes” the attack. During this period, the intruder’s actions are audited and telecommunication tracing activities can be initiated to identify the source of the attack. Some firewall products include such entrapment mechanisms, presenting common or subtle security holes to attackers’ scanners to focus the intruder’s attention on the virtual system.

In addition to technical detection and response for protection, conventional investigative responses to identify and locate network or electronic attack intruders are required for deterrence (e.g., to respond with criminal prosecution or military reprisal). Insight into the general methodology for investigating ongoing unstructured attacks on networks is provided by a representative response that was performed in 1994 by the Air Force Computer Emergency Response Team (AFCERT) from the U.S. Information Warfare Center [47].

  1. Auditing—Analyze audit records of attack activities and determine extent of compromise. The audit records of computer actions and telecommunication transmissions must be time-synchronized to follow the time sequence of data transactions from the target, through intermediate network systems, to the attacker. (Audit tracking is greatly aided by synchronization of all telecommunication and network logging to common national or international time standards.)
  2. Content monitoring—Covertly monitor the content of ongoing intrusion actions to capture detailed keystrokes or packets sent by the attacker in these attacks.
  3. Context monitoring—Remotely monitor Internet traffic along the connection path to determine probable telecommunication paths from source to target. This monitoring may require court-ordered “trap and trace” techniques applied to conventional telecommunication lines.
  4. End-game search—Using evidence about likely physical or cyber location and characteristics of the attacker, other sources (HUMINT informants, OSINT, other standard investigative methods) are applied to search the reduced set of candidates to locate the attacker.

 

9.6 Survivable Information Structures

Beyond the capabilities to detect and respond to attacks is the overall desired property of information system survivability to provide the following characteristics:

• Fault tolerance—Ability to withstand attacks, gracefully degrade (rather than “crash”), and allocate resources to respond;

• Robust, adaptive response—Ability to detect the presence of a wide range of complex and subtle anomalous events (including events never before observed), to allocate critical tasks to surviving components, to isolate the failed nodes, and to develop appropriate responses in near real time;

• Distribution and variability—Distributed defenses with no singlepoint vulnerability, and with sufficient diversity in implementations to avoid common design vulnerabilities that allow single attack mechanisms to cascade to all components;

• Recovery and restoration—Ability to assess damage, plan recovery, and achieve full restoration of services and information.

Survivable systems are also defined by structure rather than properties (as above), characterizing such a system as one comprised of many individual survivable clusters that “self-extend,” transferring threat and service data to less capable nodes to improve overall health of the system

The U.S. Defense Advanced Research Projects Agency (DARPA) survivability program applies a “public health system” model that applies (1) distributed immune system detection, (2) active probing to diagnose an attack and report to the general network population, (3) reassignment of critical tasks to trusted components, (4) quarantine processes to segregate untrusted components, and (5) immunization of the general network population [52]. The DARPA program is developing the technology to provide automated survivability tools for large-scale systems.

9.7 Defense Tools and Services

System and network administrators require a variety of tools to perform security assessments (evaluation of the security of a system against a policy or standard) and audits (tracing the sequence of actions related to a specific security-relevant event)

9.9 Security Analysis and Simulation for Defensive Operations

Security analysis and simulation processes must be applied to determine the degree of risk to the system, to identify design, configuration, or other faults and vulnerabilities, and to verify compliance with the requirements of the security policy and model. Depending on the system and its application, the analysis can range from an informal evaluation to a comprehensive and exhaustive analysis.

The result of the threat and vulnerability assessment is a threat matrix that categorizes threats (by attack category) and vulnerabilities (by functions). The matrix provides a relative ranking of the likelihood of threats and the potential adverse impact of attacks to each area of vulnerability. These data form the basis for the risk assessment.

The risk management process begins by assessing the risks to the system that are posed by the risk matrix. Risks are quantified in terms of likelihood of occurrence and degree of adverse impact if they occur. On the basis of this ranking of risks, a risk management approach that meets the security requirement of the system is developed. This process may require modeling to determine the effects of various threats, measured in terms of IW MOP or MOEs, and the statistical probability of successful access to influence the system.

Security performance is quantified in terms of risk, including four components: (1) percent of attacks detected; (2) percent detected and contained; (3) percent detected, contained, and recovered; and (4) percent of residual risk.

This phase introduces three risk management alternatives.

  • Accept risk—If the threat is unlikely and the adverse impact is marginal, the risk may be accepted and no further security requirements imposed.
  • Mitigate (or manage) risk—If the risk is moderate, measures may be taken to minimize the likelihood of occurrence or the adverse impact, or both. These measures may include a combination of OPSEC, TCSEC, INFOSEC, or internal design requirements, but the combined effect must be analyzed to achieve the desired reduction in risk to meet the top-level system requirements.
  • Avoid risk—For the most severe risks, characterized by high attack likelihood or severe adverse impact, or both, a risk avoidance approach may be chosen. Here, the highest level of mitigation processes are applied (high level of security measures) to achieve a sufficiently low probability that the risk will occur in operation of the system.

When the threats and vulnerabilities are understood, the risks are quantified and measures are applied to control the balance of risk to utility to meet top-level security requirements, and overall system risk is managed.

10
The Technologies of Information Warfare

The current state of the art in information operations is based on core technologies whose performance is rapidly changing, even as information technologies (sensing, processing, storage, and communication) rapidly advance. As new technologies enable more advanced offenses and defense, emerging technologies farther on the horizon will introduce radically new implications for information warfare.

10.1 A Technology Assessment

Information warfare–related technologies are categorized both by their information operations role and by three distinct levels of technology maturity.

  • Core technologies are the current state-of-the-art, essential technologies necessary to sustain the present level of information operations.
  • Enabling technologies form the technology base for the next generation of information warfare capabilities; more than incremental improvements, they will enable the next quantum enhancement in operations.
  • Emerging technologies on the far horizon have conceptual applications when feasibility is demonstrated; they offer a significant departure from current core technologies and hold the promise of radical improvements in capability, and changes in the approach to information operations.

Developers, strategists, and decision makers who create and conduct information operations must remain abreast of a wide range of technologies to conceive the possibilities, predict performance impacts, and strategically manage development to retain leadership in this technology-paced form of warfare.

U.S. panels commissioned by the federal government and independent organizations have considered global environment as well as information technology impacts in studies of the intelligence organizational aspects of information-based warfare.

  • Preparing for the 21st Century: An Appraisal of U.S. Intelligence—An appraisal commissioned by the U.S. White House and Congress.
  • IC21—The Intelligence Community in the 21st Century—A “bottom-up” review of intelligence and future organization options by the U.S. Congress.
  • Making Intelligence Smarter: The Future of U.S. Intelligence—Report of an independent task force sponsored by the Council on Foreign Relations, February 1996.

 

10.2 Information Dominance Technologies

Three general areas characterize the information dominance technologies: collection of data, processing of the data to produce knowledge, and dissemination of the knowledge to humans.

• Collection—The first area includes the technical methods of sensing physical phenomena and the platforms that carry the sensors to carry out their mission. Both direct and remote sensing categories of sensors are included, along with the means of relaying the sensed data to users.

• Processing—The degree and complexity of automation in information systems will continue to benefit from increases in processing power (measured in operations per second), information storage capacity (in bits), and dissemination volumes (bandwidth). Processing “extensibility” technologies will allow heterogeneous nets and homogeneous clusters of hardware along with operating systems to be scaled upwards to ever-increasing levels of power. These paramount technology drivers are, of course, essential. Subtler, however, are the intelligent system technologies that contribute to system autonomy, machine understanding, and comprehension of the information we handle. Software technologies that automate reasoning at ever more complex levels will enable humans to be elevated from data-control roles to informationsupervision roles and, ultimately, to knowledge-management roles over complex systems.

• Dissemination—Communication technologies that increase bandwidth and improve the effective use of bandwidth (e.g., data, information and knowledge compression) will enhance the ability to disseminate knowledge. (Enhancements are required in terms of capacity and latency.) Presentation technologies that enhance human understanding of information (“visualization” for the human visual sense, virtual reality for all senses) by delivering knowledge to human minds will enhance the effectiveness of the humans in the dominance loop.

10.2.1 Collection Technologies

Collection technologies include advanced platforms and sensing means to acquire a greater breadth and depth of data. The collection technologies address all three domains of the information warfare model: physical, information, and perceptual variables.

10.2.2 Processing Technologies

Processing technologies address the increased volume of data collected, the increased complexity of information being processed, and the fundamental need for automated reasoning to transform data to reliable knowledge.

Integrated and Intelligent Inductive (Learning) and Deductive Decision Aids

Reasoning aids for humans applying increasingly complex reasoning (integrating symbolic and neural or genetic algorithms) will enhance the effectiveness of humans. These tools will allow individuals to reason and to make decisions on the basis of projected complex outcomes across many disciplines (e.g., social, political, military, and environmental impacts). Advances in semiotic science will contribute to practical representations of knowledge and reasoning processes for learning, deductive reasoning, and self-organization.

Computing Networks (Distributed Operating Systems) With Mediated Heterogeneous Databases

Open system computing, enabled by common object brokering protocols, will perform network computing with autonomous adaptation to allocate resources to meet user demands. Mediation agents will allow distributed heterogeneous databases across networks to provide virtual object-level database functions across multiple types of media.

Precision Geospatial Information Systems

Broad area (areas over 100,000 km2) geospatial information systems with continuous update capability will link precision (~1m) maps, terrain, features, and other spatially linked technical data for analysis and prediction.

Autonomous Information Search Agents

Goal-seeking agent software, with mobile capabilities to move across networks, will perform information search functions for human users. These agents will predict users’ probable needs (e.g., a military commander’s information needs) and will prepare knowledge sets in expectation of user queries.

Multimedia Databases (Text, Audio, Imagery, Video) Index and Retrieval

Information indexing discovery and retrieval (IIDR) functions will expand from text-based to true multimedia capabilities as object linking and portable ontology techniques integrate heterogeneous databases and data descriptions. IIRD functions will permit searches and analysis by high-level conceptual queries.

Digital Organisms

Advanced information agents, capable of adaptation, travel, and reproduction will perform a wide range of intelligent support functions for human users, including search, retrieval, analysis, knowledge creation, and conjecture.

Hypermedia Object Information Bases

Object-oriented databases with hyperlinks across all-media sources will permit rapid manipulation of large collections of media across networks.

10.2.3 Dissemination and Presentation Technologies

Dissemination technologies increase the speed with which created knowledge can be delivered, while expanding the breadth of delivery to all appropriate users. Presentation technologies address the critical problems of communicating high-dimensionality knowledge to human users efficiently and effectively, even while the human is under duress.

10.3 Offensive Technologies

Current offensive technologies (Table 10.4) are essentially manual weapons requiring human planning, targeting, control, and delivery. Enabling technologies will improve the understanding of weapon effects on large-scale networks, enabling the introduction of semiautomated controls to conduct structured attacks on networks. Integrated tools (as discussed in Chapter 7) will simulate, plan, and conduct these semiautomated attacks. Emerging technologies will expand the scope and complexity of attacks to provide large-scale network control with synchronized perception management of large populations.

Computational Sociology (Cyber PSYOPS)

Complex models of the behavior of populations and the influencing factors (e.g., perceptions of economy, environment, security) will permit effective simulation of societal behavior as a function of group perception. This capability will permit precise analysis of the influence of perception management plans and the generation of complex multiple-message PSYOPS campaigns. These tools could support the concepts of “neocortal warfare” in which national objectives are achieved without force [29,30].

10.4 Defensive Technologies

Core defensive technologies (Table 10.5) now being deployed by both the military and commercial domains provide layers of security to bridge the gap between the two approaches.

  • First generation (and expensive) military “trusted” computers based on formal analysis/testing, and dedicated secure nets with strong cryptography;
  • Commercial information technologies (computers, UNIX or Windows NT operating systems, and networks) with augmenting components (e.g., firewalls, software wrappers, smart card authentication) to manage risk and achieve a specified degree of security for operation over the nonsecure GII.

Enabling technologies will provide affordable security to complex heterogeneous networks with open system augmentations that provide layers of protection for secure “enclaves” and the networks over which they communicate.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Data from Floodlines: Community and Resistance from Katrina to the Jena Six

Floodlines: Community and Resistance from Katrina to the Jena Six contains extensive information about the post-Katrina social movements that blossomed in the cracks, some indigenous and some that descended upon crisis-striken city as an opportunity to spread their ideology. Below is data from Jordan Flaherty’s accounting.

APPENDIX I

Organizations in the Struggle for Post-Katrina Justice

Below are some of the initiatives that inspired this book. More in- formation about most of these groups and their work is available elsewhere in these pages. This list is limited to organizations currently in existence at the time of publication, and is not meant to be definitive. Websites or addresses are listed when applicable.

NEW ORLEANS AND LOUISIANA SOCIAL JUSTICE ORGANIZATIONS

Advocates for Environmental Human Rights

Works for the cause of environmental justice as a human right. www.ehumanrights.org

A Fighting Chance/NOLA Investigates

Investigations for the defense in capital cases. www.nolainvestigates.com

African American Leadership Project

Agenda building, policy analysis, strategic dialogue, and consensus building. www.aalp.org

Agenda for Children

Policy work for children’s rights. www.agendaforchildren.org

American Civil Liberties Union (ACLU) of Louisiana

Legal struggles for civil rights. www.laaclu.org

American Friends Service Committee of New Orleans

Organizing against the cradle-to-prison pipeline and other campaigns. www.afsc.org/office/new-orleans-la

Black Men United for Change, Justice and Equality

Grassroots organizing among Black men from New Orleans.

Children’s Defense Fund of Louisiana

National child advocacy organization—in New Orleans, conducts Freedom Schools, among other projects. www.childrensdefense.org

Common Ground Relief Collective

Short-term relief and long-term rebuilding support. www.commongroundrelief.org

267

268 FLOODLINES

Common Ground Health Clinic

Dedicated to providing free, quality health care for New Orleans. www.commongroundclinic.org

Critical Resistance New Orleans

Prison abolition organization. www.criticalresistance.org

Deep South Center for Environmental Justice

Environmental justice organization based at Dillard University. www.dscej.org.

European Dissent

White antiracist group in New Orleans, affiliated with the People’s Institute for Survival and Beyond (PISAB).

Families and Friends of Louisiana’s Incarcerated Children (FFLIC)

Organizes among family members of incarcerated youth. www.fflic.org

Finding our Folk

Raising the voices of displaced New Orleanians. www.findingourfolk.org

Fyre Youth Squad

Young people organizing for better schools. www.myspace.com/1fyreyouth

Greater New Orleans Fair Housing Action Center

Legal struggles against housing injustice. www.gnofairhousing.org

Innocence Project New Orleans

Represents innocent prisoners serving life sentences in Louisiana and Mississippi. www.ip-no.org

Institute for Women and Ethnic Studies

Sexual and reproductive health justice among youth, women, and people of color. www.iwesnola.org

International Coalition to Free the Angola 3

A collective working to free Herman Wallace and Albert Woodfox, the two members of the Angola Three who remain in prison. www.angola3.org

Juvenile Justice Project of Louisiana

Legal and organizing work to reform juvenile justice. www.jjpl.org

Louisiana Justice Institute

Legal advocacy for civil rights and facilitation of a wide range of social justice campaigns in New Orleans and across the state. www.louisianajusticeinstitute.org

Loyola Law Clinic

Legal clinic representing indigent clients. www.law.loyno.edu/clinic

Make It Right

Founded by Brad Pitt to rebuild housing in the Lower Ninth Ward. www.makeitrightnola.org

APPENDIX I: SOCIAL JUSTICE ORGANIZATIONS 269

Mayday New Orleans

Organizing for public housing justice. www.maydaynolahousing.org

National Coalition of Blacks for Reparations in America (N’COBRA)

New Orleans chapter of national alliance working for reparations. www.ncobra.org

Nation of Islam—New Orleans

Rebuilding and antiviolence work in the city. www.noineworleans.org

Neighborhoods Partnership Network (NPN)

Network of neighborhood organizations in New Orleans. www.npnnola.com

New Orleans Food & Farm Network

Food access organization. www.noffn.org

New Orleans, Louisiana Palestine Solidarity (NOLAPS)

Organizing and activism for awareness of Palestine, linking struggles in New Orleans with the Middle East. http://nolaps.blogspot.com

New Orleans Tenants Rights Union

Organizing tenants to create concrete improvements in their situation as renters. http://nolatru.org

New Orleans Workers’ Center for Racial Justice

Building worker power, advancing racial justice, and organizing to build a social movement in post-Katrina New Orleans. www.nowcrj.org

NO/AIDS Task Force

Services and advocacy for HIV-infected individuals. www.noaidstaskforce.org

Parents Organizing Network

Supports parents in taking a powerful role in the creation of excellent public schools. www.nolaparentsguide.org

People’s Institute for Survival and Beyond (PISAB)

Antiracist community organizers and educators dedicated to building an effective movement for social transformation. www.pisab.org

Resurrection After Exoneration

Works to reconnect exonerees to their communities and provide access to those opportunities of which they were robbed. www.r-a-e.org

ReThink: Kids Rethink New Orleans Schools

Students reforming the school system post-Katrina. www.therethinkers.com

Safe Streets/Strong Communities

Campaigns for a new criminal justice system in New Orleans. www.safestreetsnola.org

School at Blair Grocery

Dedicated to the growth and development of young minds in the Lower Ninth Ward of New

270 FLOODLINES

Orleans. http://schoolatblairgrocery.blogspot.com

Stay Local! New Orleans

Supports local businesses. www.staylocal.org

Students at the Center

A writing and digital-media program for students in New Orleans public, non-charter high schools. www.sacnola.com

Survivors Village

Former public housing residents in New Orleans struggling for housing justice. www.communitiesrising.wordpress.com

Twomey Center for Peace Through Justice

Education for social justice consciousness. www.loyno.edu/twomey

UNITY of Greater New Orleans

A collaborative of sixty agencies working with homeless people in New Orleans. www.unitygno.org

Vietnamese American Young Leaders Association of New Orleans
( VAY L A )
Empowering Vietnamese American youth through services, cultural enrichment, and social change. www.vayla-no.org

VOTE: Voices of Formerly Incarcerated Persons

Building the political power of people most impacted by the criminal justice system. www.vote-nola.org

Women’s Health & Justice Initiative (WHJI)

A radical feminist of color, anti-violence, justice-based organization. The New Orleans affiliate of INCITE! Women of Color Against Violence. www.whji.org

Women With A Vision

Health care justice for women from at-risk and socially vulnerable communities. www.wwav-no.org

ARTS, CULTURE, AND COMMUNITY ORGANIZATIONS AND SPACES

2-Cent Entertainment

Grassroots youth filmmaking collective. www.2-cent.com

Artspot Productions

Theatre and arts organization. www.artspotproductions.org

Ashé Cultural Center

Black-owned cultural and community space. www.ashecac.org

APPENDIX I: SOCIAL JUSTICE ORGANIZATIONS 271

Backstreet Cultural Museum

Cultural center preserving the history and culture of Black Mardi Gras. www.backstreetmuseum.org

Community Book Center

African and African American-centered bookstore and community space. www.communitybookcenter.com

Craige Cultural Center

Community space and cultural center in the Algiers neighborhood. 1800 Newton Street, New Orleans, LA 70114

Guardians of the Flame Cultural Arts Collective

Preserving New Orleans’s Black Mardi Gras cultural traditions.

House of Dance and Feathers

Lower Ninth Ward space dedicated to preserving New Orleans culture. www.houseofdanceandfeathers.com

Iron Rail Bookstore and Infoshop

Anarchist infoshop and lending library. www.ironrail.org

Islamic Shura Council of Greater New Orleans

Organization of New Orleans’s Muslim community.

Junebug Productions

African American Arts company, preserving the civil rights traditions of the Free Southern Theatre. http://junebugproductions.blogspot.com

Lesbian, Gay, Bisexual and Transgender
Community Center of New Orleans
Builds, strengthens, and unifies the Greater New Orleans area LGBTQ community. www.lgccno.net

McKenna Museum of African American Art

Dedicated to New Orleans African American art. www.themckennamuseum.com

Mondo Bizarro

Creates original, multidisciplinary art and fosters partnerships in local, national, and interna- tional communities. www.mondobizarro.org

Neighborhood Gallery

Exposure and support for artists. www.theneighborhoodgallery.com

Neighborhood Story Project

Works with writers in neighborhoods around New Orleans to write and publish books about their communities. www.neighborhoodstoryproject.org

272 FLOODLINES

New Orleans Kid Camera Project

Uses photography training and support to help young people express themselves. www.kidcameraproject.org

PATOIS: The New Orleans Human Rights Film and Arts Festival

Organizes events, amplifies local voices, and builds community at the intersection of arts and social justice. www.patoisfilmfest.org

Porch Cultural Organization and Center

Community-based organization using the arts to effect social change. www.theporch-7.com

Social Aid and Pleasure Club Task Force

An alliance of the city’s social aid and pleasure clubs.

Tambourine and Fan

Works with young people in the Treme community to pass on New Orleans art and culture. Treme Community Center, 1600 St. Philip Street, New Orleans, LA, 70116

Tekrema Center for Art and Culture

African American community space in New Orleans’s Lower Ninth Ward. www.thetekremacenter.com

Zeitgeist Multi-disciplinary Arts Center

Film and arts space in Central City New Orleans. www.zeitgeistinc.net

OTHER SOUTHERN AND GULF COAST SOCIAL JUSTICE ORGANIZATIONS

Friends of Justice

Supports struggles against injustice in criminal cases across Texas, Louisiana, Arkansas, and Mississippi. www.friendsofjustice.wordpress.com

Institute for Southern Studies

Nonprofit research center working to bring lasting social and economic change. www.southernstudies.org

Miami Workers Center

Building working-class community power in Miami. www.theworkerscenter.org

Mississippi Immigrants’ Rights Alliance (MIRA)

Advocacy organizing and education for immigrants’ rights. www.yourmira.org

Mississippi Workers Center

Grassroots worker advocacy. 213 Main Street, Greenville, MS, 38701

Organizing in the Trenches

Founded by Caseptla Bailey and Catrina Wallace, family members of one of the Jena Six, to continue struggles for social justice. PO Box 831, Jena, LA, 71342

APPENDIX I: SOCIAL JUSTICE ORGANIZATIONS 273

Project South

Atlanta-based movement building organization. www.projectsouth.org

Southerners On New Ground (SONG)

Envisioning a world where the third-shift factory worker and the drag queen at the bar down the block see their lives as connected and are working together for liberation. www.southernersonnewground.org

Take Back the Land

Miami-based collective empowering the Black community to determine how to use land for the benefit of the community. www.takebacktheland.org

NATIONAL ALLIES

The Advancement Project

A civil rights law, policy, and communication “action tank.” www.advancementproject.org

Catalyst Project

White antiracist collective based in California. www.collectiveliberation.org

Center for Constitutional Rights

Uses law for social justice struggles. www.ccrjustice.org

ColorofChange

Online resource for racial justice organizing. www.ColorofChange.org

INCITE! Women of Color Against Violence

A national activist organization of radical feminists of color advancing a movement to end violence against women of color and their communities. www.incite-national.org

Malcolm X Grassroots Movement

Defending human rights and promoting self-determination. www.mxgm.org

National Economic and Social Rights Initiative (NESRI)

Advocacy for a human rights vision in the United States. www.nesri.org

Rainbow Push Coalition

Religious and social development organization led by Reverend Jesse Jackson Sr. www.rainbowpush.org

Right to the City Alliance

Movement-building alliance of community-based organizations. www.righttothecity.org

US Human Rights Network

Building links between organizations to promote U.S. accountability to universal human rights standards. www.ushrnetwork.org

V-Day

Founded by Vagina Monologues author Eve Ensler to stop violence against women and girls. www.vday.org

 

 

 

LETTER FROM THE PEOPLE OF NEW ORLEANS TO OUR FRIENDS AND ALLIES

December 15, 2006

 

Cherice Harrison-Nelson, director and curator, Mardi Gras Indian Hall of Fame; Royce Os- born, writer/producer; Greta Gladney, fourth- generation Lower Ninth Ward resident; Corlita Mahr, media justice advocate; Judy Watts, Pres- ident/CEO, Agenda for Children; Robert “Kool Black” Horton, Critical Resistance; Jen- nifer Turner, Community Book Center; Mayaba

Liebenthal, INCITE! Women of Color Against Violence, Critical Resistance; Norris Hender- son, co-director, Safe Streets/Strong Communi- ties; Ursula Price, outreach and investigation coordinator, Safe Streets/Strong Communities; Evelyn Lynn, managing director, Safe Streets/Strong Communities; Shana griffin, INCITE! Women of Color Against Violence;

 

Min. J. Kojo Livingston, founder, Liberation Zone/Destiny One Ministries; Shana Sassoon, New Orleans Network Neighborhood Housing Services of New Orleans; Althea Francois, Safe Streets/Strong Communities; Malcolm Suber, People’s Hurricane Relief Fund; Saket Soni, New Orleans Workers’ Justice Project; Nick Slie, I-10, Witness Project, co-artistic director, Mondo Bizarro; Catherine Jones, organizer and co-founder, Latino Health Outreach Project; Jennifer Whitney, coordinator, Latino Health Outreach Project; S. Mandisa Moore, INCITE! Women of Color New Orleans ; Aesha Rasheed, project manager, New Orleans Net- work; Dix deLaneuville, educator; Rebecca Snedeker, filmmaker; Catherine A. Galpin, RN, FACES, and Children’s Hospital; Grace Bauer, Families and Friends of Louisiana’s Incarcerated Children; Xochitl Bervera, Families and Friends of Louisiana’s Incarcerated Children; Bess Car- rick, producer/director; John Clark, professor of philosophy, Loyola University; Diana Dunn, People’s Institute for Survival and Beyond, European Dissent; Courtney Egan, artist; Lou Furman, Turning Point Partners; Ariana Hall, Director, CubaNOLA Collective; Gwendolyn Midlo Hall, historian, writer, and lecturer, New Orleans and Mississippi Pine Belt; Susan Hamovitch, filmmaker/teacher, NYC/New Orleans; Russell Henderson, lecturer, Dillard University and organizer, Rebuilding Louisana Coalition; Ms. Deon Haywood, events coordi- nator, Women With A Vision Inc.; Rachel Herzing, Critical Resistance, Oakland; Rev. Doug Highfield, Universal Life Church, Cherokee, AL; Joyce Marie Jackson, PhD., Cultural Researcher, LSU Dept. of Geography & Anthropology, and co-founder of Cultural

Crossroads, Inc., Baton Rouge Elizabeth K. Jeffers, teacher; Dana Kaplan, Juvenile Justice Project of Louisiana; Vi Landry, freelance jour- nalist, New Orleans/New York; Bridget Lehane, European Dissent and People’s Insti- tute for Survival and Beyond; Karen-kaia Liv- ers, Alliance for Community Theaters, Inc.; Rachel E. Luft, assistant professor of sociology, Department of Sociology, University of New Orleans; Damekia Morgan, Families and Friends of Louisiana ‘s Incarcerated Children; Ukali Mwendo, hazardous materials specialist, NOFD, president, Provisional Government— Republic of New Afrika/New Orleans, LA, former resident of the Lafitte Housing Devel- opment; Thea Patterson, Women’s Health & Justice Initiative; J. Nash Porter, documentary photographer and co-founder of Cultural Crossroads, Inc., Baton Rouge; Gloria Powers, arts project manager; Bill Quigley, Loyola Pro- fessor of Law; Linda Santi, Neighborhood Housing Services of New Orleans; Tony Sfer- lazza, director, Plenty International NOLA; Heidi Lee Sinclair, MD, MPH, Baton Rouge Children’s Health Project; Justin Stein, neigh- borhood relations coordinator and community mediator, Common Ground Health Clinic; Audrey Stewart, Loyola Law Clinic; Tracie L. Washington, Esq., co-director, Louisiana Justice Institute; Scott Weinstein, former co-director of the Common Ground Health Clinic; Melissa Wells, New Orleans resident; Jerald L. White, Bottletree Productions; Morgan Williams, Student Hurricane Network, co-founder; Gina Womack, Families and Friends of Louisiana’s Incarcerated Children

Pledge in Support of a Just Rebuilding of St. Bernard Parish, Louisiana, and the U.S. Gulf Coast

Organizations Endorsing:

Action Coalition for Racial, Social, and Environmental Justice—University of New Orleans; Advancement Project; Advocates for Environmental Human Rights; C3/Hands Off Iberville; Caffin Avenue Church of God; Coastal Women for Change; Common Ground Health Clinic; Community Church Unitarian Universalist—New Orleans; Emerging ChangeMakers Network; Families and Friends of Louisiana’s Incarcerated Children; Homeless Action Team of Tulane University (HATT); Jesuit Social Research Institute, Loyola University; Junebug Produc- tions; Katrina Rita Diaspora Solidarity; Loyola

University Chapter of the National Lawyers Guild; Louisiana Justice Institute; Lower Ninth Ward Center for Sustainable Engage- ment and Development; Lower 9th Ward Homeowners’ Association; Mayday New Orleans; Mennonite Central Committee— New Orleans; Mississippi Center for Justice; Mondo Bizarro; Moving Forward Gulf Coast, Inc.; National Economic and Social Rights Initia- tive (NESRI); New Orleans Palestine Solidar- ity; New Americans Social Club (New Orleans Holocaust Survivors Organization); PATOIS: The New Orleans International Human Rights Film Festival; People’s Institute for Survival and Beyond; Poverty & Race Research Action Council; Pyramid Community Parent Resource Center; Southern Institute for Education and Research; Survivors Village; US Human Rights Network; Zion Travelers Cooperative Center

 

Strategic Management Literature: Applying Knowledge in a Workplace Environment

Strategic Management Literature: Applying Knowledge in a Workplace Environment

Abstract

The opening up to an international market had the effect of a shock on many American corporations. Relations of production in other countries lead to market effects that required decisive action and new concepts with which to address them. Adapting the resource-based view of the firm to these new conditions helped do this and thus the idea of core competencies, dynamic capabilities, and a vision of strategic management that was significantly different from the previous generation came to be popularized. No longer viewing business units as attached just to a specific product or service, these ideas helped enable teams to best exploit their core competencies. This article reviews several of the assigned writings.

Key Words

Core competencies, Strategic Management, Dynamic Capabilities, Resource-Based View, Innovation

Body

Exploring the development of concepts related to the resource-based view of the firm in response to a variety of market situations allows for a deeper appreciation of the issues which companies face in determining their market and operations strategies. Core competencies take on a variety of different forms, from the traditional conceptions defined as what companies due best to newer iterations, a la dynamic capabilities, that describe a meta approach to how firms enable the capacity to widen and deepen their core competencies.

The Core Competence of the Corporation

In the early 1980s, a number of companies stopped conceiving of themselves as a portfolio of businesses and instead started to understand themselves as a portfolio of competencies. Two of the companies that Prahalad and Hamel describe in the manner in GTE and NEC, the latter of which designed a Strategic Architecture within which to exploit their Competencies – largely in response to the pressures of Japanese manufacturers taking an increasing market share. This focus on competency allowed for the facilitation of unanticipated products and an increased capacity to adapt to changing market opportunities. The reason for some other company’s loss of market share was, according to the authors, in part their adherence to a conceptualization of the corporation that unnecessarily limited businesses to be able to fully exploit the technological capabilities they possessed. Not taking an adequate stock of the multiple streams of technologies that could be integrates – as the Japanese were doing – they let opportunities dies on the branch that could have grown had they enable core competencies to flow better within the organization. In short, while customer’s needs changed because new of new capabilities of delivering value, some producers lost out given their ossified top-down views. This is anathema to core competence – which at base communication, involvement, and a deep commitment to working across organizational boundaries.

Prahalad and Hamel’s article from Harvard Business Review sees “critical task for management is to create an organization capable of infusing products with irresistible functionality or, better yet, creating products that customers need but have not yet even imagined.” These authors highlight a number of aspects of core competencies that have not always been effectively recognized by management. One of the terms they use to describe this is the “strategic business unit (SBU) mind-set”. This occurs in large, diversified firms that frequently find themselves dependent on external sources for critical components, such as motors or compressors, for their individual business. The small business unit mindset looks at these as just components, but the authors see them as core products that contribute to their competitiveness of a wide range of end products. Put more simply, a lack of innovation in companies producing parts for purchase by assembly and marketing companies could mean higher costs and the lessening of the market share due to the lower pricing of competitors able to impose greater cost discipline over their competitors.

Building core competencies isn’t about higher budgets for R&D or shared costs between firms in value chains but about the more rigorous and innovative application of managerial skills. The authors name three specific tests that can be applied, while also admitting that there are many more. They state that core competence should provide access to a wide variety of markets, make a significant contribution to the product benefits perceived by the customer, and be difficult to imitate. Because many company managers had just “accepted” their inputs as given – the SBU mindset – this leads to many U.S. companies to lose market share to Japanese and Korean ones. Just as it’s possible to develop core competencies it’s also possible to lose them and this has a major impact on distribution channels and profits in the context of intense competition.

The solution to this is seen as developing a strategic architecture to identify and develop core competencies, apply greater rationality to patterns of communication, chart career paths, and managerial rewards, to establish a corporate wide objective for competence and growth, and to determine internal stakeholders to lead these efforts and core personnel to be counted on to assist them. All these efforts at auditing and competencies and taking actions to develop them contribute to the roots of renewed cultural/economic norms.

When core competencies are intentionally developed they appreciate in value ad capacity over time, unlike physical assets subject to depreciation. An example given to this effect is the Philips company, who was able to develop its competence in optical media into a wide range of products. Given the benefits which accrue to such expertise, there is an ongoing effort to build world-class competencies within these firms. This focus on developing capabilities of a level that frequently are far higher than those taught in universities is why I’ve told multiple people who’ve asked me about my work in marketing not to study it in a university setting but to get a job and work your way up in the firm.

As is repeated throughout the literature assigned for this course, Prahalad and Hamel state that it is a mistake for management to surrender core competencies to outside suppliers. While outsourcing can be a short-cut to a more competitive product – in the long term it’s seen as counter-productive to building the human capital required to be a leader in a certain field of production. Towards this end, the authors are very critical of a number of U.S. industries that became complacent and thus let their Eastern partners take over from them in product leadership.

Core products, end products, and core competencies are all distinct concepts, and because of the legal regulations and market pressures of global competition, there are different stakes for each level. Defending or building or leadership over the long term at each level requires a different type of corporate indicators which are measured and different strategies to get there as well as benefits specific to their positioning. Control over core products, for example, enables a firm to direct the evolution of end markets and applications, and in order to ensure its strategic capacity companies need to know its’ position in each plane of operation. Prahalad and Hamel’s advocacy of such a view is a new one and is at odds with the Strategic Business Unit model developed business schools and consultancies during the age of diversified, primarily national markets. Below is a chart showing how the two differ, which explains in part why failing why companies can face high costs for failure to adapt – the effects of which included bounded innovation, imprisoning resources within specific units, and underinvestment in the development of core competencies and core products.

With the adoption of the core competencies view, it becomes possible to develop a strategic architecture to align with a path towards firm’s flourishing. Rather than SBUs directing talented people in a way such that they seek to keep their most competent people to themselves, core competencies seeks to unlock their capabilities so that they get directed to the opportunity that will lead the greatest payoff. By circulating talent within a variety of business units, the specialists gain from interaction with the generalists and vice-versa.

A Literature Review on Core Competencies

It’s amusing that after 25 years of use of the concept there’s still a definitive definition of core competencies within us, and yet that is Enginoglu and Arikan’s claim and the problem they seek to solve through a literature review. From the three domains described originally by Pralahad and Hamel – market access competencies, integrity-related competencies, and functionality- related competencies – a wide variety of categories and types of core competencies have emerged as well as explication and analysis of how they relate to various market factors such as turbulence and technological change.

It’s hard not fine oneself struck by the contradictions in the approaches to modelling core competencies, something that the author’s also comment on, and to wonder why some models get used more so the others. It’s an unfortunate absence in the article that there’s no inclusion of an investigation into the views of managers – i.e. what model approximates the mode of thinking that they operate under – rather than just what’s published. This would allow for an approximate determination of which models are best for which industries and, better yet, from whence they come. It’d be interesting to note from whence their ideas came, books within the popular business press or specialist texts written by academic researchers on this matter. I imagine the former dominated simply based on my experience with mid-level executives but it’d be interesting to know if at the top end of larger, older firms if there was some effort made to take a more scientific approach to business. Knowing what a company does best and judging it’s efforts can perhaps take as many forms as there are companies – but looking at this concept’s practical use could benefit the industry as a whole rather than just the writers of literature reviews and those that are cited within them.

Core Capabilities and Core Rigidities

Core capabilities are those qualities that strategically differentiate a company from other that could be considered imitators.  Using a knowledge-based view of the firm, Leonard Barton defines a core capability as the knowledge set that distinguishes and provides a competitive advantage and postulates that there are four dimensions to this knowledge set. “Its content is embodied in (1) employee knowledge and skills and embedded in (2) technical systems. The processes of knowledge creation and control are guided by (3) managerial systems. The fourth dimension is (4) the values and norms associated with the various types of embodied and embedded knowledge and with the processes of knowledge creation and control.”

These four dimensions are highly interdependent on one another – as the below image shows, and become institutionalized through the habits of those that embody the knowledge.

One of the comments I found strange is Dorothy’s assessment that Values and Norms are not commonplace within the literature on core capabilities. In every books that I’ve read regarding business leadership and developing innovation in the workplace – this was always a core component. The points made by these other authors included the need to be open to more individuality in highly centralized business operations as well as the need to be open to standardization processes in those defined by a high degree of craft. Corporate culture, at least   in the post 2000s books published by Harvard Business Review I’ve read, is critical.

When a critical capacity of core capabilities have been developed it creates a something like a strategic reserve of people with complementary skills and interests outside the projects which can help shape new products with their criticism and insights. The author provides several examples of product testing to give examples of how those involved within different aspect of production and marketing allowed for swift feedback and deep insight. This pervasive technical literacy can constitute a compelling corporate resource,

Technical systems are “the systems, procedures and tools that are artifacts left behind by talented individuals, embodying many of their skills in a readily accessible form.” The value of these artifacts are implicit, a group of consultants from company’s such as McKinsey and IDEO now sell 300 of their Excel sheets and Powerpoint documents for $4000 online. Managerial systems include items such as incentive structures. When I worked at Fractl, for instance, I made use of their technical systems to better understand how to approach potential clients as their incentive of earning a 4% commission on a client signing up greatly appealed to me. The money I earned after landing a client was good enough in itself, but when the President of the company praised me in a company-wide meeting and then took me out to lunch, that further incentivized other employees to take the same kind of initiative. This willingness to give employees agency is called empowerment and is described by Mintzberg as an emergent rather than a deliberate strategy due to the higher degree of variability of outcome. Such freedom can develop into a form of entitlement that has deleterious effects on projects in the same way that core rigidities – the inverse of core capabilities, habits of thought which prevent innovative thinking in problem-solving – can develop. Leonard-Barton describes a number of the paradox that emerge and how to deal with them that place emphasis on the needs of the organization given the specific environment in which they are operating.

A Capability Theory of the Firm: An Economics and Strategic Management Perspective

In this article David Teece develops capability theory to present a deeper understanding of how differential firm-level resource allocation and performance can emerge. Based in with evolutionary and behavioral economics, a number of concepts are developed to improve the understanding of the nature of the business enterprise and its management. The author endeavors to address the issues connected to competitions he sees as lacking within the wider literature by developing a meta-theory framework of firm capabilities and a theory of how firms innovate and adapt so as to preserve evolutionary fitness. This question as to how individual firms build and manage capabilities to innovate and grow is one of the most important ones that can be answered, according to Teece, as to the extent that competitive advantage is derived from innovation rather than from some type of market restriction, it requires a sharp focus on how firms develop, learn, and benefit their stakeholders and shareholders as while scale, scope, product differentiation,  network effects, and lock-in, are all components of the economists explanatory toolkit for market power, they are insufficient for explaining how individual firms establish and maintain competitive advantage. The dynamic capabilities framework is based on extensive research in the field of knowledge based theories of the firm, strategic management and innovation and “brings Williamsonian transaction costs, Penrosean resources, Knightian uncertainty, and Schumpeterian (knowledge) combinations together in a way that can potentially explain not only why firms exist, but also their scope and potential for growth and sustained profit- ability in highly competitive markets.”

Like Nelson and Winter’s An Evolutionary Theory of Economic Change, the article examines a large number of the deficiencies in economic literature. I personally find this polemical style to be engaging, especially when in the context of advocating for the need to develop a theoretical structure that’s less obtuse and is more inclusive of entrepreneurs and managers choices to invest, learn, and decide in the context of the deep uncertainty that is every- day business life. Irrationality is rational, rules of thumb for how to respond are many times ubiquitous than adherence to profit maxims, and the hubris that defines the human experience is common. Strategy, organizational capacities and business models all have an important role in the business transformation capabilities – but despite not having read the many people whose research is described in this essay I’m in agreement with Teece as even in my limited familiarity with a game theory and agent based modelling it seems way too simplistic for me to consider practical.

Written within the resource theory of the firm school, much of the concepts are those that were first introduced in Chapters 2 and 3. Ordinary capabilities are the routines, personnel, equipment, quality control methods, bench-marking capabilities, administrative capacities, etc. Dynamic capabilities are those that enable the top management team of the enterprise to formulate strategic innovation capabilities based on their capacity to forecast consumer preferences, solve new business problems, invest in the new technologies that while have high ROIs; properly substantiate indicators within the market and fine-tune their decision making processes in relation to them; and appropriately redirect activities and assets. There are three clusters identified within this realm identified by Teece on page 10:

  • Identification and assessment of threats, opportunities, and customer needs (Sensing)
  • Mobilization of resources to address fresh opportunities while capturing value from doing so (Seizing)
  • Ongoing organizational renewal (Transforming).

The above figure charts the relationships between the aforementioned concepts using the VRIN framework – which determines if a resource is a source of sustainable competitive advantage. It visualizes the dynamic capabilities framework and , indicates how capabilities and strategy are codetermined by performance and that poor strategy will reduce the effectiveness of dynamic capabilities. Closing the gaps that can exist in capability development required measuring a number of dimensions and then taking action to move the firm. At this point Teece states that while there are bodies of literature which address the management of each particular dimension, that none exist for doing all three at the same time. This is challenge of capability theory – understanding how each interacts so as to avoid unwanted side effects with innovation management and ensure the creation of excellence.

Make, buy or rent are the three options that are traditionally pursued with normal capabilities – however Teece states that this is an especially difficult options with dynamic ones. While different concepts, dynamic capabilities are closely connected to a strategy that is able to presciently diagnose and identify obstacles, develop policies that allow them to be overcome and direct coherent action plans which coordinated activities based on those policies. By closing the gaps and achieving complementarities amongst firm activities through managerial asset evaluation and orchestration technological and organizational innovation dynamic capabilities are achieved. It’s this analysis of capabilities, Teece claims, that enables one to account for firm-level differentiation in a variety of levels not adequately addressed in a number of structural economics and developmentalist literature.

The Other Side of Innovation: Solving the Execution Challenge

Harvard Business Review Press published this book by Vijay Govindarajan and Christ Trimble and contains a wealth of research based insights on how to successfully execute innovation projects in a company. Because they study such a large variety of innovation endeavors in a variety of contexts, because of support for the Center for Global Leadership and the Tuck School of Business, they are able to generalize from the case studies and proscribe general laws in situations based on the elements of the dynamics at play. The authors’ case studies include an extended explanation of lessons garnered from Thompson Corporation and News Corporation’s (publisher of the Wall Street Journal) addition of computer software-based services to their organization. this technical data plus the wealth of psychological considerations for successful project management and development makes this an ideal book for leaders.

The two sides of innovation are ideation and execution, and in this instance, the other side of innovation in the title means execution. Brainstorming ideas can be real fun, they say, but ideas are only the beginning. Without implementation, action, follow-through, execution, whatever you want to call it – then this means nothing. The true innovation challenge lies in the idea’s transition from imagination to impact in the workplace.

If the book could be said to have a main takeaway, it’s that each innovation initiative requires a team with a custom organizational model and a plan this is revised only through a rigorous learning process. Because of this there must be much conscientious social engineering on the part of the innovation leader – which I will explain more about further in this book review.

Within compa,nies their primary activities can be generally categorized under the concept of “The Performance Engine”. This is the dedicated team of full time workers that is in charge of ongoing operations. While they are able to engage in small scale continuous process improvements and initiatives in product development that are similar to previous activities – there is little scope for innovation to be achieved within the organization. Too much is needed so a new team must be developed to help implements it. This dynamic can be easily put in the following logic:

Project team = dedicated team + shared staff

As the names suggest given the groups thus defined, the shared staff is are those that work primarily on the Performance Engine but also have Innovation Team Duties. The Dedicated Team are those that are full time workers on the initiative.

The partnership, not just either team, executes the project plan. Because the focus of each group is very different – one is in repeating established work rhythms and the other determining the optimum means of establishing an innovation initiative – there are several principles that must be considered when deciding how to assemble a dedicated team. Not only do you need to identify the skills needed and hire the best people that can be found – even if their pay scale is above normal operations – and then you match the organizational model to the dedicated teams job. In the manner that the authors describe it, it almost reminds me of lesson plans for the first day of school – bring all of the individuals that will work on the innovation project together then start to transform them into a team by defining new roles and responsibilities; decorating and starting to fill in the new, separate space wherein the work activity will transpire; and even doing some role playing as a team in order to make charts of who will do what. After this a guided conversation needs to be headed by the innovation leader on how the usual performance based metrics for work are not going to be applicable in this work situation. This is important because the dedicated team and the performance engines need to know that even though they will share some existing processes and personnel, that they have different objectives and should have a different culture.

Defaulting to “insider knowledge” can be a trap the needs to be escaped from, and cautionary advice is provided on hiring within the organization. Not only can organizational memory eclipse the work at hand, but successful past performance aren’t reliable indicators in an innovation initiative setting as the processes are so different.

Because the key difference between typical planning processes for the performance engine and the best practices for innovation are so different, the human skills required for such an undertaking are significant. Hence the book is as much instructions for proper processes and principles as it is a guide to dealing with persons. Conflict between teams, within teams, and between executives/management and innovation leader all can have a degenerative effect on successfully execution. Dissipating a number of the myths associated with innovation – such as it being necessarily disruptive or distracting from the Performance Engine – is one of the key factors for maintaining successful control of the project.

The authors recurrent emphasis on the importance of documenting and sharing this information and be aware of the learning process reminds me of the frequent reminders that I heard as a teacher to ensure that my testing of students was part and parcel of a larger educational journey that I was leading them on. By ensuring that, excuse the pun, no child was left behind I ensured that I wouldn’t find myself in a situation where some students not making the appropriate learning gains. Since learning cannot be left to intuition – it’s important to have a rigorous learning process in place that is based on the scientific method. As such it becomes easier to refine speculative predictions into reliable predictions. With everyone involved being on the same page as to historical, current, and projected status of the initiative – from former operational hypothesis to what custom metrics metrics are being used to cost categories – it makes it easier to discuss assumptions and determine the means for best keeping the program on the correct trajectory.

Each chapter of the book ends with a series of proscriptive lessons garnered from analysis of the business cases presented– such as “Never assume that the metrics and standards used to evaluate the existing business have relevance to the innovation initiative” as the depth, power balance and operating rhythm of the two organizations are so different. This was an appreciated way of consolidating the lessons in and fast matter that I appreciated. This and the general style and concise definitions throughout made me appreciate the authors greatly.

Conclusion

One of the undercurrent running throughout all of the texts in this chapter/section is the specter of globalization. New competitors within broader markets compelled companies to restructure their value and operational imperatives in order to better exploit the capabilities that they’d developed over the years of operation within a national market. While core competencies can be interpreted in a variety of manners, it essentially means what a company does best and understanding what that means for each particular firm has required to examine the cultural, managerial, operational and informational components of their operations.

Recomendations

A focus on the creation of new capabilities is organizationally better for firms in the long run rather than letting financial performance drive operations as the former internally builds a company while the latter merely helps maintain it. Opportunities are lost as efforts become shallow and knowledge is lost. Management that is able to develop a strategic framework within which to harness and expand capabilities allows for the deepening of core competencies and thus competitive advantages. Such policies, rules, and actions that address the high stakes challenged brought up about a new global market greatly enhance firms capacity for innovation and continuation within the marketplace.          

Bibliography

Didem, Dr.. “A Literature Review on Core Competencies.” (2016).

Granstrand, Ove, et al. “Multi-Technology Corporations: Why They Have ‘Distributed’ Rather Than ‘Distinctive Core’ Competencies.” California Management Review, vol. 39, no. 4, 1997, pp. 8–25., doi:10.2307/41165908.

Govindarajan, V., & Trimble, C. (2010). The other side of innovation: solving the execution challenge. Boston, MA: Harvard Business Review Press.

Henderson, Rebecca. “The Evolution of Integrative Capability: Innovation in Cardiovascular Drug Discovery.” Industrial and Corporate Change, vol. 3, no. 3, 1994, pp. 607–630., doi:10.1093/icc/3.3.607.

Iansiti, Marco, and Kim B. Clark. “Integration and Dynamic Capability: Evidence from Product Development in Automobiles and Mainframe Computers.” Industrial and Corporate Change, vol. 3, no. 3, 1994, pp. 557–605., doi:10.1093/icc/3.3.557.

Kay, Neil M, et al. “The Role of Emergence in Dynamic Capabilities: a Restatement of the Framework and Some Possibilities for Future Research.” Industrial and Corporate Change, vol. 27, no. 4, 2018, pp. 623–638., doi:10.1093/icc/dty015.

Leonard-Barton, Dorothy. “Core Capabilities and Core Rigidities: A Paradox in Managing New Product Development.” Strategic Management Journal, vol. 13, no. S1, 1992, pp. 111–125., doi:10.1002/smj.4250131009.

Patel, Pari, and Keith Pavitt. “The Technological Competencies of the World’s Largest Firms: Complex and Path-Dependent, but Not Much Variety.” Research Policy, vol. 26, no. 2, 1997, pp. 141–156., doi:10.1016/s0048-7333(97)00005-x.

Pavitt, K. “Key Characteristics of the Large Innovating Firm*.” British Journal of Management, vol. 2, no. 1, 1991, pp. 41–50., doi:10.1111/j.1467-8551.1991.tb00014.x.

Prahalad, C. “The Core Competence of the Corporation.” Strategic Learning in a Knowledge Economy, 2000, pp. 3–22., doi:10.1016/b978-0-7506-7223-8.50003-4.

Teece, David J. “A Capability Theory of the Firm: an Economics and (Strategic) Management Perspective.” New Zealand Economic Papers, vol. 53, no. 1, 2017, pp. 1–43., doi:10.1080/00779954.2017.1371208.

Teece, David J. “Dynamic Capabilities as (Workable) Management Systems Theory.” Journal of Management & Organization, vol. 24, no. 3, 2018, pp. 359–368., doi:10.1017/jmo.2017.75.

Teece, David, and Gary Pisano. “The Dynamic Capabilities of Firms: an Introduction.” Industrial and Corporate Change, vol. 3, no. 3, 1994, pp. 537–556., doi:10.1093/icc/3.3.537-a.

Wu, Se Hwa, et al. “Intellectual Capital, Dynamic Capabilities and Innovative Performance of Organisations.” International Journal of Technology Management, vol. 39, no. 3/4, 2007, p. 279., doi:10.1504/ijtm.2007.013496.

Development Country Innovation Management: Meeting International Standards & Building on Them

Innovation Capacities

Development Country Innovation Management: Meeting International Standards & Building on Them 

Abstract

Companies develop a portfolio of core competencies that allow them to gain competitive advantages through brand recognition, superior pricing, the invention of new markets and exploitation of emerging ones, as well as developing innovations in processes that lead to greater capabilities and innovation in products that fit customer’s needs in new ways. This requires effective organizational learning, which requires a high absorptive capacity. High absorptive capacity has two major elements, prior knowledge base and intensity of effort, and are especially difficult in an international context as developing countries need to catch up to those that are more technologically advanced. By transferring technology and operational norms from advanced firms to those with lower levels, less developed countries are able to “catch up”.

Keywords: Organizational learning, core competence, crisis, knowledge development, innovation management

Body

Developing innovative technological activities from knowledge bases outside the country can be an exceptionally difficult task  As tacit knowledge resides in the people involved in firms, it often requires foreign assistance both in financing and in oversight and management. The collection of reflections in the writing below explores the issues faced by developing countries. In it we learn the importance of absorptive capacity of firms on the receiving end of technological transfer and the qualities of managerial insights and strategy needed in order to successfully raise technological capacities.

Technological Capacities and Industrialization

Sanjaya Lall begins with a popular refrain described throughout the literature, e.g. neoclassical literature fails to address the granular problems actually found in projects designed to develop technological activities within non-core countries. Specifically, literature within this particular school tends to downplay the need for government policies to support, protect and induce activities and they “disregard the peculiar nature and costs of technological learning in specific activities, the externalities it generates and the complementarities it enjoys, which may lead to market failures and may call for a more selective approach to policy than conventional theory admits.” Because of the existence of asymmetries that work to inhibit technological development localized progress in an international setting must be fostered by a group of stakeholders that do more than assist only at the point that there is a market failure.

Research on increasing the firm-level technological capabilities in developing countries has been highly influenced by the writings of Nelson and Winter and other authors who similarly describe the growth of capabilities as a process within a feedback loop that includes many individuals developing their own tacit knowledge as well as company stakeholders that are coordinating with individuals outside the company that vary (i.e. foreign company manager working in-house during execution pre-investment or a purchased for a foreign company interested in a new supplier) which depends upon the phase they are in. Each phase in the above matrix related to specific capabilities required by the work at hand and all are affected first by the options made in the investment phase. The path laid out there will create a large number of dependencies which will impact all future aspects of the business operations and in what ways capabilities are able to be developed. Because workers are only able to gain mastery over the tools that they have at hand, determining the correct ones – as we shall see in the examples that follow – becomes incredibly important.

While there is inherently a need for the development of new capabilities, skills, and information to reign in the power of technology, it does not happen in a vacuum. Strongly influencing the process capability building and technological selection are issues related to the nature of the technology (is it small or large scale? Is it simple or complex? Does it require many or just a few workers) as well as external factors – such as degree of market protection. Having supply and demand-side protections helps ensure the firm’s continuation – but doesn’t necessarily mean that it is able to produce desired goods at competitive costs. Developing countries’ efforts at developing national technological capabilities, indeed even technologically advanced countries like the United States, are replete with examples of well-intentioned efforts that fail. It’s not enough to know that products produced via a public-private partnership will be purchased (incentives) isn’t a sufficient spur to the development of capabilities, neither is having strong institutions developed to help make it happen. As will be described in Lall’s case studies and the following reports – finding the optimal path requires strategic choices by many actors.

Crisis Construction and Organizational Learning: Capability Building in Catching-up at Hyundai Motor

Korean technology firms, from consumer electronics to automobiles, have demonstrated rapid internalization and application of capitalist methods of production and management. According to Statista, as of 2018 they now compose 26.8% of the global market in semiconductors. Their success in this field is testament to their capacity to build up their performance capabilities achieve through research and development efforts and a business environment – more on this later – that was highly conducive to rapid industrialization. This article demonstrates this by showing Hyundai’s rise as a car assembly-company engaging in duplicative imitation to creative innovation to full innovation. Using their story to chart the company’s dynamics of absorptive capacity, an impressive company story provides the basis to delineate growing knowledge dimensions and impressive organizational learning.

Learning systems require entrepreneurial actors to outline the vision and engineers to actually get it done. Hyundai imported talent in order to make up for tacit knowledge it lacked to start developing, producing and marketing cars. As their goal was to be not just an assembly firm but one capable of competing in every way with automobile manufacturing companies such as Ford and Mitsubishi, during the operations they constructed internal crises to present management with performance gaps and thus intensify the effort in organizational learning that they were engaged in.

As crisis is by nature evocative and galvanizing, Hyundai’s construction of these events had the effect of increasing the organizational factors connected to learning:  “intention, autonomy, fluctuation and creative chaos, redundancy, requisite variety, and leadership”. Using company records, interviews, and observations – the author share how different teams within the organization were tasked with becoming masters of topics through training with foreign firms – both by going abroad and having them come work in oversight positions, intra-firm knowledge development programs, etc. Their goal was learning by doing and learning by using. Given Hyundai’s international success and quality products, it’s clear that they were successful.

Change by Design: How Design Thinking Transforms Organizations and Inspires Innovation

I chose to include Tim Brown’s book in this section as his position of CEO at IDEO has given him extensive experience working on innovation projects with many different companies to develop their capacities for innovation. As I too aspire to work as a consultant for firms, as IDEO is one of the world’s most renowned innovation consultancy firms and thus is widely read by other business executives I thought this to be an appropriate supplement for the assigned readings for this chapter.

While Brown does describe the necessity of having a quantitative approach to developing innovation capacities in businesses, he shares that his employees are also masterful storytellers who use design thinking to get obtain the commitment of those that work with his company. This is important as, according to his assessment – while surveys and data analysis allows for the determination of what’s needed – but using a design thinking framework to apply them the process of getting there is more effective.

Design thinking is a method that uses the information and data pulled from various tools found throughout the chapters in this reading to create a visual and narrative arc that facilitates organizational learning. Per Kim’s article Crisis Construction and Organizational Learning sociocultural factors play a large role in absorptive capacities for organizations, but crafting a compelling, consistent, and believable narrative from all of that it becomes easier to “script success” by those involved in their innovation capacity development. Brown relates this to the rise of the virtual world and increasing participation in what he calls the “experience economy” – a world view that has been disseminated in the West through self-empowerment literature, online chat groups, MMORPGs, and other spaces designed for character development.

After reviewing a number of case studies on innovation consultations that IDEO has been contracted for, Tim Brown then shares what he calls The 6 Rules for the Best Design Approach. Repeating many of the findings within this chapter about organizational learning processes, they are as follows:

  1. The best ideas emerge when the whole organizational ecosystem – not just its designers and engineers and certainly not just management – has room to experiment.
  2. Those most exposed to changing externalities (new technology, shifting customer base, strategic threats or opportunities) are the ones best placed to respond and most motivated to do so.
  3. Ideas should not be favored based on who creates them.
  4. Ideas that create a buzz should be favored. Indeed, ideas should gain a vocal following, however small, before being given organizational support.
  5. The “gardening” skills of senior leadership should be used to tend, prune, and harvest ideas. MBA’s call this “risk tolerance”.
  6. An overarching purpose should be articulated so that the organization has a sense of direction and innovators don’t feel the need for constant supervision.

In addition to such learning processes, Brown states that one of the ways that innovative markets or products are developed is by identifying the divergent users, i.e. those who are slightly modifying the products or using them for different ends than that for which they were intended.

Rather than focusing on this, however, I want to provide a demonstration on the value of Brown’s design-thinking approach to innovation development by contrasting this model with that described by Rush, Bessant and Hobdayin Assessing the Technological Capabilities of Firms.

Assessing the Technological Capabilities of Firms

The scientific tools used to capture and interpret data covered to help determine what policies should be adopted in order to increase absorptive capacity and implement technological innovations processes by firms and government is truly amazing. External policy agents can be forces that radically improve the production of goods and provision of services in the private and public sectors by helping manage and deepen innovative practices. Weaknesses and strengths, after measurement as to where they sit on the “punctuated equilibrium” of daily operations, can be corrected leading to  And yet reading this article reminded me of the documents that technology consulting companies would produce when I worked as a teacher to justify the transition to a new software platform by which to register grades and attendance. I’ll first cover this article by Rush, Hobday, and Bessant and then this issue.

Policymakers need assistance in tailoring support as to how to implement organizational learning programs in their firm or government agency. Various tools exist by which to position firms and also help educate the person from taking them as to what concepts are important to a firm’s successful operation. The authors of this article show an example of the Technological Capabilities Audit in operation alongside that gathering of historical case material such as key milestones, basic information on the company’s history, number of employees, turnover, product markets, and technologies used. Examining qualities such as risk management frameworks and project management guidelines through surveys allow them to interpret the maturity level of operations and spaces for growth.

Recognizing that there are different factors involved in a public-sector enterprise than a school, it’s nevertheless worth pointing out that some innovation capacity development projects could have unforeseen negative consequences. Twice I had to deal with software platform transitions while working and twice I – and several other more technologically savvy employees – became the “resident experts” and go to people to assist those educators that couldn’t rapidly apprehend the software and refused to refer to the user guide as “it was just faster to ask someone.”

The reason that this new software platform was eventually changed to another was that the gains to productivity that were projected were never met. Looking back now I’d say that this was largely a failure to recognize accurately assess the average degree of computer competency by those using it – younger teachers with a higher degree of technological competence, statistically the smallest group – were the only people on the core test team. The strategy for implementing and learning it was not well executed – two four hour training sessions and a non-searchable PDF file on how to use it. Awareness of its importance and it’s linkage to other stakeholders was high – but it could never overcome the basic core competence issue. And because of this, another software platform was purchased, and the same problem repeated itself the following year.

Locked in Place: State-building and Late Industrialization in India

While Locked in Placeis not one of the texts listed as assigned readings for this course, it seemed appropriate to cite it given that South Korea is presented as the primary comparative study to the analysis of India. The book is analyzes the economic and social evolution stemming from a development strategy that required significant influence over firms: export-led industrialization (ELI). South Korea, as a military dictatorship, was able to use its consolidated power to enact significant influence over the firm’s executives as well as the leadership of the employees unions. This capacity to have nearly complete control over the economy allowed them to have high level exchanges with the leaders of the Japanese industry such that they felt comfortable transferring their low-value added industries to Korea at a time when they were seeking to develop their more profitable technology production and assembly industries.

ELI combined with Import Substitution Industrialization (ISI) allowed Korea to rapidly grow their innovative capacity and diversify their economy. ISI was a common strategy in the 1950s that is quickly summarized as a “doctrine of infant industry protection”. Adherents to this school argued that it was necessary to protect new industries in developing country so that firms could eventually build up sufficient capacity to build products to international standards and accumulate capital by requiring certain companies connected within value-add chains to prioritize buying and selling to the internal market. This combination of ELI and ISI imposed a strict discipline regimen wherein in exchange for subsidies that were designed and monitored by state and nonstate actors international standards became the internal standards. As has been repeatedly discussed in all of the readings – it’s this transmogrification of exogenous standards and capabilities to the endogenous that creates innovation capacities that are able to be exploited in markets. 

Conclusions

Developing innovation capacities requires a mix of hard (technical) and soft (interpersonal) capabilities. Snapshots developed of the internal operations along with market assessments when combined with design-thinking principles to ensure a culture combining elements of standardization and innovation lead to evolutionary practices. IDEO excels at this, incorporating what they call “narrative technicians” to help translate data into embodied action by management and staff. A crisis too, manufactured or natural, can be another means of accelerating such changes as when faced with the possibility that those involved may lose their likelihood as they are unable to compete in their usual fashion it forces the rapid adoption of a new worldview and behaviors.

In developing countries, it is especially important for international standards to be adopted and practices that are innovative to domestic industries to be internalized. Steady support by government and policy agents, as in the case of Korea, allows for investments to be guaranteed in such that they are attractive to other industries, like Japan, to want to include them in their supply chain. With such commercial environments that meet the risk standards for investors and cultures devoted to achieving technical excellence – countries are able to expand their division of labor, encourage innovation, and improve their economic conditions. 

Recommendations

Innovation management required the inverse mentality often associated with the genius inventor – pure newness – and instead the incremental adoption of what’s already been established. Knowing who to partner with and what benefits are associated in the long term with the adoption of certain technologies and standards enables firms to grow. By operating as if in a state of crisis skills can be improved and a cadre of knowledge workers strengthened in their problem-solving capabilities and thus improved in their normal efforts. 

Bibliography

Brown, Tim.  Change by Design: How Design Thinking Transforms Organizations and Inspires Innovation (2012)

Chen, C. F., & Sewell, G. (1996). Strategies for technological development in South Korea and Taiwan: The case of semiconductors. Research Policy, 25, 759-783.

Chibber, Vivek. 2003. Locked in Place: State-building and Late Industrialization in India. Princeton, N.J.: Princeton University Press.

Cohen, W. M., & Levinthal, D. A. (1990). Absorptive Capacity: A new perspective on learning and innovation. Administrative Science Quarterly, 35(1), 128-152.

Kim, L. (1997). Imitation to Innovation: The Dynamics of Korea’s Technological Learning. Harvard Business School Press.

Kim, L. (1998). Crisis Construction and Organizational Learning: Capability Building in Catching-up at Hyundai Motor. Organization Science, 9, 506-521.

Kim, L. (2001). The Dynamics of Technological Learning in Industrialisation. Revue Internationale des Sciences Sociales, 2(168), 327-339.

Lall, S. (1998). Technology and human capital in maturing Asian countries. Science and Technology & Society, 3(1), 11-48.

Ndiege, J. R., Herselman, M. E., & Flowerday, S. V. (2014). Absorptive Capacity and ICT adoption strategies for SMEs: A case study in Kenya. The African Journal of Information Systems, 6(4), 140-155.

Roberts, N., Galluch, P. S., & Dinger, M. (2012). Absorptive Capacity and information systems research: Review, synthesis, and directions for future research. Management Information Systems Research Center, 36(2), 625-648.

 

Innovation and Value Chains

Innovation Capacities

Innovation and Value Chains

Abstract

Innovation is frequently obtained through exogenous means by companies inserting themselves within a value chain. Placement within a value chains indicates that businesses are receiving materials to one firm and then handing their products they’ve serviced to another firm. Two examples of this include chip manufacture and metallurgy – the former assemblies parts to be handed to technology firms which insert them into finished hardware components that are then put to market while the later processes raw metals in order to develop products such as steel that is machine lathed into household goods or for use in construction. Firms competitive positionsarepositivelytransformed and capabilities for innovation emerge in these situations as a result of changes in exogenous and endogenous factors. Cooperation and the acquisition of technologyrepresent the former whereas budgetary expenditure on research and developmentis an examples of the latter. Oftentimes government or business sector interests assist in the development of such activities as it provides net benefits to the country and the local capabilities of the industry. This is accomplished through maintaining a balance between these external and internal factors and properly exploiting them.

Keywords: innovation capacities, technological innovation capabilities, organizational congruence, triple helix

Body

Managing Technological Development: Lessons from the Newly Industrializing Countries

When firms decide to invest in a particular technology it represents both a set of engineering norms associated with it, expected costs, benefits and methods as well as capabilities that can be acquired by those gaining experience with that technology. This consideration is important to examine when considering which technologies to upgrade to or abandon. The identification of local needs are important when establishing such a framework, however, to think with an eye to future innovations also requires to think in a less constrained manner. This requires the collection of information on a large number of indicators and openness to looking far outside the domestic borders to determine what is valued by companies within various supply chains.

In this article by Dahlman, Ross-Larson and Westphal, the authors open with a description of how the Brazilian steel company Usiminas first came into being. Prior to its innovation activities, the Brazilian steel industry was not engaged in any of the high-value-added services that firms in more advanced countries did. It was only after agreeing to a period of apprenticeship under those who had already learned the mechanically technical and physically dangerous processes involved in using blast furnaces, basic oxygen converters and rolling mills through experience in Japan and could demonstrate the capability to do it unaided they the keys, to use an American idiomatic expression, were given to them. Due to an unplanned-for economic recession, the company had to readjust its planned operations. Demonstrating how technological development functions in such settings, they managed to improve their operations by stretching their capacities and applying new methods of developing desired goods by setting up an internal research department. This allowed them not only to profit sufficiently as to be able to expand but to spin off its engineering department so as to provide technical assistance to other companies. Usiminas thus showed a capacity to not only exploit its core mission, producing steel according to international industry standards, but to develop a core competence that allowed it to expand and thrive.

Because of the high technical nature of complex industries, it is typical for new industries to be founded in underdeveloped countries with the assistance of foreign companies and domestic governments. To attract foreign companies to already engaged in such activities to, industry associations will pressure governments to adopt technological policies that create incentives for technology transfer and alterations of regulatory environments and penalties for firms that are considered chronic laggards. With this activity, specialized technological agents come into being to either facilitate such activities or to form their own firm related to their specialization. Through their help, more efficient and productive use of the resources occurs and the government can pull back from the role of guaranteeing returns on investments and instead of assisting research institutes. One of the common features of successful technological development policy is a market-positive environment wherein government intervention is limited only to providing assistance during periods of market failure. In such circumstances, the “right” capabilities will emerge on their own as a result of sector-specific needs.

While the Resources to Capabilities to Competencies video is far more simplistic than the examples described in Managing Technological Development: Lessons from the Newly Industrializing Countries, I’ve included the below screenshot from the video as it does show a version of the steps involved in their innovation development activities described therein. Conscientious measurement and strategic planning based on that allows for resources to grow into capabilities and competencies that can create competitive advantages for firms.

Innovative Capability Audits of University Research Centers

Whilst the above provides a number of case studies and theoretical reflections, the findings of this article in the literature on technology audits and other assessment tools which are sourced from a technology management development program for a university research center. It then describes an innovative method developed specifically for that center, communicates that that design’s motivating factors, and analyzes the results acquired from the research process. It is, in short, a granular exemplum of a methodology for how to develop innovation.

Citing David Klein’s 1995 book The Strategic Management of Intellectual Capital, Nystrom shares the general framework within which the subsequent research and development program was structured:

  • understanding the relevant strategic and operational roles in the organization, what is needed today and tomorrow
  • creating an infrastructure for cultivating and sharing it
  • creating the culture that encourages it
  • monitoring, valuing and reporting it

And then go on to Burgelman and Maidique’s 1988 the Innovative Capabilities Audit Framework which describes five categories of variables that influence innovation strategies for a business unit:

  1. Resources available for innovative activities.
  2. Capacity to understand competitor innovative strategies.
  3. Capacity to understand technological developments.
  4. Structural and cultural context of the organization affecting entrepreneurial behavior.
  5. Management capacity to deal with entrepreneurial activities.

In order to develop their assessment tools which comprised of nine criteria which addressed the center’s resource, strategy, and method of implementation through a series of surveys throughout the 5 phases of the innovation process. Since I’ve already quoted extensively from the article in the above description of the framework and categories of influence I’ll skip over what they developed specifically and turn instead to how they used it.

The questions from the audit framework they developed were directed to the stakeholders involved in order to measure the groups capacity to engage in teamwork, their level of technical knowledge and where they believed growth was most appropriate, enthusiasm for the process and final project, barriers to effective actions, perceived resources, most effective communicational protocols, and organizational structure, etc. This provided learning and team-building opportunities for those involved with the development and administration of the Research Center by forcing stakeholders to assess and reflect on what worked well or what did not. Having the capability to compare personal views with other members and then consider those differences during structured discussion sessions meant that external experts were not needed to provide the assessment.

While the context of this is very different from the Professional Learning Communities that I participated in as a History professor at Broward College – we were not trying to build a new center but to merely unify the direction of lesson planning so that there were clear overlaps in instructional material between Parts I – IV of the required History and Political Science curriculum – there are some overlaps as well. Results from our structured surveys and meetings allowed for rapid availability and easy explanations as to how we could all “get on the same page” to improve the learning capabilities and gains of our students.

Methodology for Evaluating Innovation Capabilities at University Institutions Using a Fuzzy System

I love data science and so found the methods described in this article, to use non-engineering terminology, to be really cool. As knowledge is what allows for the transformation of new technologies for industries the authors look to identify Technological Innovation Capacities through quantification and examination of the Triple Helix. This Triple Helix model generates an quantified infrastructure for the articulation of knowledge within the participating institutional entities (firms, educational institutions, and government) and provides the basis for the formulation of strategies for innovation development via surveys which substitute for quantitative market indicators.

The authors use the Model of Organizational Congruence developed by Nadler and Tushman in 1980 to structured to identify inputs, outputs, and the transformation process in line with four congruent components: “the tasks (the work that has to be done;) the individuals (the members of the organization;) the formal organization (the formal agreements at the interior of the organization, the structure and the processes adopted so the individuals execute the tasks;) and the informal organization (that which has not been directly formalized and is related to the culture that surges spontaneously and naturally between people that hold positions in the formal organization.)”

Because of the difficulty in being able to measure technological innovation capabilities – which are after all not operational unto themselves nor directly identifiable, judgments from all of those who’ve been surveyed are placed into a fuzzy logic framework in order to provide a more appropriate form to all of these subjective impressions.

A fuzzy logic system: “allows easy use of the knowledge of subject experts, as a starting point for automatic optimization when formalizing the occasionally ambiguous knowledge of an expert (or of common sense) in an attainable form. Additionally, thanks to the simplicity of the necessary calculations (sums and comparisons), they can usually be performed in comfortable, fast systems” (Martin and Sanz 2002, p. 248). The scorecards allow for the presentation of ranges on a variety of issues that provides the capacity to determine the weight for each set of questions on a high, medium to low scale.

While not directly related to the methodology described above, it’s perhaps worth mentioning here the Theoretical Framework video provides a more simplified example for mapping the relationships amongst a variety of concepts like the one described above.

According to it by writing the general problem, writing a research question, identifying the key concepts, defining these concepts with literature support, identifying the existing or potential relationships between these concepts, and identifying what indicators will be studied one can construct academically and practical studies. Based on this and the above fuzzy logic model, it becomes possible to determine areas in which Serrano and Robeldo’s work could potentially be combined with other data to find meaningful relationships.

Innovative capability and Export Performance of Chinese firms

A broader example of measuring and forecasting innovation than the above two examples is found in Guan and Ma’s article Innovative Capability and Export Performance of Chinese firms. Based on the data provided them from a sample of 213 Chinese industrial firms the authors examine seven innovation capability dimensions (learning, research and development (R&D), manufacturing, marketing, organizational, resource allocating and strategy planning) and three firm characteristics (domestic market share, size, and productivity growth rate) in evaluating their export performances.

After providing a brief literature review of innovation capabilities the authors, per the Theoretical Framework model, then describe what they developed based on that study which would be used in their own research. They produced a very complex modeling formula which divided innovation capabilities into seven dimensions based on a number of specific indexes of measurement:

(1) learning capability (including nine indexes)

(2) R&D capability (including 13 indexes)

(3) manufacturing capability (including eight indexes)

(4) marketing capability (including nine indexes)

(5) organizational capability (including 12 indexes)

(6) resources exploiting capability (including eight indexes)

(7) strategic capability (including 12 indexes).

One of the limits of the analysis which follows based on this model is the lack of cooperation from the companies under study. Guan and Ma state that they were able only to obtain labor productivity growth rates and not the real labor productivity data. This isn’t to say that their research project becomes valueless, just that some of the findings are intuitive to existent literature – such as how firm’s size and its export ratio shows that the competitive advantage of larger firms in exporting and that smaller firms prefer to focus on filling the needs in the domestic market because of the high cost of operation associated with high entry barriers. Other areas of investigation, where more meaningful research emerges, is in the relationship between specific sectors and how if greater process capabilities were matched they’d be able to achieve market requirements in a more timely fashion. This finding is one repeated from the Dahlman, Ross-Larson and Westphal article. In other words when market indicators can more clearly be described and shared with those involved – capacities for innovation amongst firms increase as they have some degree of assurance that their investments will lead to profits. By testing their data they are able both to verify certain relationships, and to determine which are most significant, which is important for determining how to proceed with policy changes necessary to ensure investment in innovation capacity will leads to beneficial results.

Conclusions

Improving innovative capacity requires measurement of numerous variables and the strategic development of them in relation to indicators that are found in the marketplace. By being able to produce goods and services that are valuable, rare, difficult to imitate, and difficult to substitute they develop competitive advantages. Quantitative, qualitative, and multi-dimensional research tools combined with market research provide the methods by which these niches are found, and internal and external knowledge acquisition lead to their development.

Recommendation

Innovation and invention are not possible without a strong base in the knowledge of the work being done. As the above shows, it’s only through extensive training in fields of knowledge does innovation becomes possible. Exogenous and endogenous cooperation and the acquisition of new technology is the precursor for being able to apply capabilities to develop marketable goods and services. Being able to manipulate symbols or materials, organize in a more effective manner, more rapidly and at a better cost market the fruits of labor, etc. are all part of the preconditions which lead to innovation and invention.

Bibliography

Guan, J. M. (2003). Innovative capability and export performance of Chinese firms. Technovation, 23, 737-747.

Nystrom, H. “Innovative Capability Audits of University Research Centers,” Proceedings – 9th International Conference on Management of Technology, Miami, FL, Feb. 2 2000, CD-ROM.

Serrano G., J., y Robledo V., J. (2013). Methodology for Evaluating Innovation Capabilities at University Institutions Using a Fuzzy System. Journal of Technology Management and Innovation. Vol 8.

Sher, P. J., y Yang, P. Y. (2005). The effects of innovative capabilities and R&D clustering on firm performance: The evidence of Taiwan’s semiconductor industry. Technovation, 25, 33-43.

Wang, C., Lu, I. Y., y Chen, C. B. (2008). Evaluating firm technological innovation capability under uncertainty. Technovation, 1-15.

Yam, R. C., Pun, J. C., Guan, J. C., y Tang, E. P. (2004). An audit of technological innovation capabilities in Chinese firms: Some empirical findings in Beijing, China. Research Policy, 33, 1123-1140.

Innovation: Internal and External Drivers and Markers

Abstract

The ability to exploit internal and external knowledge is a critical component of business capability to innovate. It is not sufficient merely to have identified the areas of knowledge to be exploited and transformed them into routines, it’s also important to determine that which isn’t fully known in order to determine whether or not research and development within that region of activity should be pursued. Because there is an ambiguity of scope in the skills and strategies required to innovative, quantitative processes are required in order to ensure that the proper routines and skills are implemented and developed within the firm.

Key Words: Evolutionary Economics, Absorptive Capacity, Tacit Knowlege, Economic Change, Behavioral Theory

 Introduction

Epistemology of human activity and business is a core component of innovation development and optimal functioning of a firm. By better understanding the drivers of interpersonal, cooperative behavior in business settings and how it is that knowledge is developed and operated as embodied knowledge, and how expenditures affect the long-term survivability of firms in competitive conditions it’s possible to develop a behavioral theory to guide evolutionary economic change.

Body

Karl Polyani’s Personal Knowledge: Towards a Post-Critical Philosophy is a beautiful exploration of knowledge and its application. Using Gestalt psychology methods, a form of psychoanalysis that examines the various pieces of a whole in its simplest forms and then constructs a broader picture based on the pattern, Polyani examines the history and practices of scientific knowledge and practical application in a manner that it as times quite poetic. He claims that his work is in the tradition of destructive analysis – in that he seeks to engage in a form of deconstruction of his subjects so that some of the operating presumptions that inform practices related to knowledge can be more clearly seen.

First examined is tradition, whose first formalization with the social sphere occurs via the relationships between master and apprentice. The older practitioner of the art of science, be it of agricultural or mechanical engineering, has internalized the rules of the field to such a degree as a result of their trial and errors such that they are able to embody and transmit a coherent system of conceptions. Polyani says that this diffusion of knowledge is intimately related to human interactions – despite the capacity to capture it in books, journals, and other media – and validates this claim by pointing to the fact that “the regions in Europe in which the scientific method first originated 400 years ago are scientifically still more fruitful today, in spite of their impoverishment than several overseas areas where much more money is available for scientific research.” He relates this fact to the British common law, which is founded on precedents, as it accustomed the people in those regions not to invert ever new cases in but to have a traditional worldview.

Relating this practice to approaching knowledge to connoisseurship, which is a skill that can only be obtained and then transmitted by example rather than rote memorization of precept, Polyani then claims that it becomes possible to understand the level of knowledge and skills related to that a particular person has by placing them on a form of a gradient. To use the example provided by Polyani, wine to provide an illustration of what he means would look as follows – it’s possible that a connoisseur would able to place the region of any French wine and know which goes with what food prepare with one of the five mother sauces, but not able to do the same for Spanish, Californian or Chilean wine and their foods. A different example, more suited to Colombia’s cafeteria, stems from the training I receive on becoming a Shift Supervisor at Starbucks. We spent several hours learning how the soil of coffee beans from each region impacted it’s flavor and were trained to have the proper language in which to explain the differences in taste.

This capacity to articulate is ultimately reflecting the tacit intellectual powers of humans and allows them to strive to explore new fields of knowledge. Our awareness of the lack of understanding in certain areas wherein problems are seen as needing to be solved becomes a form of psychological drive that separates us from the animal world. To see a problem which has not been but can be solved is a discovery, according to Polyani, in its own right. The value that one gets from this is both personal and often if the observation can be applied, market-based. Building on individual psychology model as well as the history of science and technological development since the beginning of the 20thcentury – the strict utilitarian model of Science policy adopted by the Socialist governments is described as inferior.

Where Polyani closes the reading selection on the relationship between scientific thinking, operational principles of technology, standards and invention Cohen and Levinthal describe this in more depth in an applied context, i.e. the operation of a firm.

The capacity to exploit external knowledge is a critical component of firm innovations and a firm’s capacity to recognize and organize in response to new information and competitive pressures is described as being a synergy that is qualitatively different from the net capacity of each individual. The authors view this learning capacity as so adjacent to problem-solving that there is little reason to differentiate their moves of development. Both represent the new-knowledge creating capacity as well as capability of applying it.

Effective absorptive capacity in this socialized setting thus requires a common language. Failures to convey the importance of a market change or how new technology can be profitably adopted for use within production means that opportunities are lost or evolution is delayed. This does not mean that diversity of knowledge is a barrier to absorptive capacity – in fact just the opposite. The capacity for novel associations and linkages to be made is one of the preconditions for innovative development. Instead what is required is a common set of concepts and patterns of behavior that allows for transmission between divergent thinkers as to how innovations can be developed or technologies transferred to improve the metrics of business operations. Absorptive capacity is not just “the acquisition or assimilation of information by an organization but also to the organization’s ability to exploit it.”

Cyert and March’s Behavioral Theory of the Firm is a major referent within professional and academic literature given its deep and practical insight into business operations. By focusing on a small number of important economic decisions made by the firm, Cyert and March develop a process-oriented model based on empirical observations that has a generality that is scalable beyond specific firms.

Describing how it is that firms and organizations manage the limited set of resources in Chapter 3, Cyert and March builds on observations that she’s made in previous chapters. Because organizations are viewed not viewed primarily as being profit-driven, there is lots of personal and emotional investment made by the various entrepreneurial leaders within it, Cyert and March states that it’s best to perceive of organizations as a coalition with moving boundaries. She states that this is not an innovative model – and that this conception of the organization can be found in the theory of teams, game theory, and the inducements-contributions schema – which all presumes that there is some manner for collectively arriving at the enunciation and action upon the goals the organization develops. While the continuation of the organization’s existence is clearly a primary factor, there are numerous other conspicuous choices that lead to a “continuous bargaining-learning process” that does not necessarily product unswerving goals but something like a business ethic approached by habit. These ambitions often make their way into foundational operations documents and one such example that has received much coverage within the business and technology press is Google’s rule to “Do no evil.” While much outside criticism has been made of this in relation to their choice to engage in contract work for China and the United States Department of Defense, the most important debates occur internally wherein the various coalitions form objectives and bargain.

One of the central processes connected to coalition formation and goal specification is the bargaining practice which delegates side payments. Side payments come in many forms such as “money, personal treatment, authority, organization policy, and so forth”. While in the political rather than the business realm the delegation of such benefits in return for policy commitments is called patronage, the same pejorative standard view is not here appropriate as this has the effect of reducing friction between workers and managers whose resentments and interpersonal conflicts can lead to various ill effects on the company. Taking on a client that is known to be overbearing rather than passing, for example,

The formulation of these are imperfectly rationalized and frequently stated in the form of commitments that are constrained by context and are aspirational and thus not-operational. Worded in a less technical manner, the objectives connected to the commitment to various side payments tend to address the emotional concerns between coalition members rather than the day to day and medium to long term operations. This is not to say that the former doesn’t have an impact on the latter, but that the commitments connected to this are of a qualitatively different nature. While these processes are punctuated by specific meetings – quarterly, yearly, or called as needed given a new business or environmental conditions – it is actually a continuing process. Another major mutual control system for the elaboration of commitments and elaboration of functions are budgets.

Budget, job descriptions, organizational charts, and elaboration of specific objectives impose much tighter constraints and the fact that “organizations have memories in the form of precedents” these are considered to be a great bind on the behavioral patterns of individuals and coalitions with the firm. Renegotiation of these are terms are done in a more formal fashion and, depending on the size and intensity of the internal conflicts within a firm, can require that external people are brought in to assist with the smoothing of the decision-making process. While both this and side payments are considered part of a larger arbitrary process to ensure organizational functioning – this aspect is much more determined by prior history.

One of the ways that organizations are able to continue despite there being conflicting goals is the inherently limited attention focus of those engaged in bargaining and organizational slack.

Attention focus refers to the fact at any normal moment there are simply too many considerations in play to let any one of them be the overarching issue-defining inter-organizational coalitions demands while slack refers to the willingness not to allow minor variations in the expectations created by agreements to define and thus destroy peaceable relationships. Another way of summarizing these two aspects is to say that people are adaptable and barring gross violations of expectations are able to adjust as needed in order to ensure the steadiness of operations. According to Cyert and March, “Slack operates to stabilize the system in two ways: (1) by absorbing excess resources, it retards upward adjustment of aspirations during relatively good times; (2) by providing a pool of emergency resources, it permits aspirations to be maintained (and achieved) during relatively bad times.”

With these considerations in mind, it becomes possible to develop predictive theory and strategy for operations that inform the construction of business goals as well as pricing and output decisions. Cyert and March claim that there are normally five different meta-goals that inform the more granular inventory, market share, profit, and production goals. While it is rational from a position in which strategy is determined to separate each of these into differentiated buckets, the truth is that all of them form a living feedback loop wherein each impacts the other. Demands by management are limited by those of the staff, and vice versa. The demands of the markets are limits by the capacities of managers to organize production in a competitive environment, and vice versa.

Nelson and Winter expand upon the research of the above authors by focus on the skills and routines of the business. Constantly facing competition from other firms that seek to extract market share via imitation or outright replication of the services they provide – the authors adopt a quasi-Marxian mode of capitalist analysis that rejects the profit-maximalization of orthodox theory. Their heterodox approach is a manner of appreciative theorizing, meaning that they are less interested in developing a series of formal theories that describe how things operate based on presuppositions as much as they are interested in examining “how things actually work”.

Because of this, they place a high value on the role of routinization within organizations. This they view as more important than skills as it is often the case that certain tasks can be completed via a variety of actions and as routines form the basis of most day to day activity. Skills are, furthermore, programmatic – that is, based on tacit knowledge – and thus of less concern than the routines – that is, based on explicit knowledge – which determines the application of skills. The capability to turn technological knowledge that problem-solves an issue into a novel routine that is one definition of an innovation that has the outcome of benefitting the company.

When an effort is made to incorporate an existing routine as a component of innovative routines, Nelson and Winter state that it is advantageous if two conditions are satisfied.

  1. The routine has been established as reliable – that is, fully under control and without uncertainty as to the results.
  2. The new application of the existing routine be as free as possible from operational and semantic am­biguities of scope, i.e. too dependent on the idiosyncratic application of individual skills.

In Chapter 12 Nelson and Winter continue their deployment of Schumpeter as a model to analyze the benefit obtained from leadership in technological innovations. The relationship between market structure and innovation is a complex one and there are no general rules which determine whether or not . Instead firms must look to their price-cost ratios, measure the short and long term effect of R&D expenditures, and analysis of a variety of other techniques that can lead to greater competitive capacity. After all, these reduce funds available for investment in other areas which can be beneficial, such as that designated for opening up markets elsewhere. As the authors themselves state: “The function of competition is to get-or help to get-the signals and in­centives right. In evolutionary theory, choice sets are not given and the consequences of any choice are unknown. Although some choices may be clearly worse than others, there is no choice that is clearly best ex-ante.”

Conclusions

Economic competition is not always about short term profit maximization but a complex process of navigating a number of different factors. An evolutionary model of economics must recognize the limits inherent in human’s capacities to adapt new languages with which to describe the problems that they face in the market and adopt new technologies and methods. As covered in more depth in the Chapter 5 response, the habits of scientific thinking and practical action connected to it via investigations and firm activities aren’t so transferred and requires extensive application of the scientific method. Technical progress can lead to first-mover benefits, but the returns can also be so marginal and meaningless as not be worth it. In this context, quantitative methods are required to provide a comprehensive assessment as to whether or not the environment is appropriate for such evolutionary activity.  

Recommendations

Properly understanding signals internally and externally requires a series of reflective and consultative processes in order to ensure necessary evolutionary steps are taken by firms. Developing a language for this requires conscientiousness development amongst those managers, administrators and the executive staff in order to ensure competitiveness is maintained via the proper incentives and direction of research and development.

Bibliography 

Cyert, Richard Michael, and James G. March. A Behavioral Theory of the Firm. Martino Publishing, 2013.

Cohen, Wesley M., and Daniel A. Levinthal. “Absorptive Capacity: A New Perspective on Learning and Innovation.” Administrative Science Quarterly, vol. 35, no. 1, 1990, p. 128., doi:10.2307/2393553.

Polanyi, Michael. Personal Knowledge: Towards a Post-Critical Philosophy. University of Chicago Press, 1992.

Nelson, Richard R., and Sidney G. Winter. An Evolutionary Theory of Economic Change. The Belknap Press of Harvard Univ. Press, 2004.

Knowledge Resources and ICT: Internal and External Assessments and Action

Theory of Resources and Firm Behavior

Knowledge Resources and ICT: Internal and External Assessments and Action 

Abstract

Description and analysis of the internal and market operations of a firm takes many forms and yet the resource-based view of a firm has been one that has gained widest adoption within business literature due to its explanatory advantages. One of the primary methods that enables companies to continue operating despite the pressures of competition is the application of strategic management principles based on such a theory to enable firms to develop sustained competitive advantages. By navigating the market and ensuring smooth operation via intra-firm negotiations – adequate resources are able to be maintained and developed such that the firm can continue operations under pressure of competition.

Key Words: Strategic Management, Market Advantage, Firm resources

  1. Introduction

In the United States, there are nearly 28 million small and medium-sized firms and roughly 19,000 firms with over 500 employees competing to provide customers goods and services within local, national, and international markets. A small group of these firms in the ICT field operates alongside the majority in a Business to Business (B2B) fashion assisting these firms with their information. Competitive pressures exist to ensure the replication of profitable activity and to successfully develop and manage innovation internally, as will be discussed below. I also include reflections on ICY firms below given that adoption of particular services providers is a significant choice that leads to path dependency.

Body

Edith Rose’s book has had a major impact in the business world and the field of innovation. The theoretical framework she developed overturned many of the traditional assumptions of neoclassical economics and proposed alternatives explanatory frameworks for how firms operate. By challenging the motivations and cognitive assumptions of firm theory by empirically investigating firms, she produced research that was more accurate in understanding the organizational drives and limits of firms. She viewed firms to be shaped by conscious actions by economic actors, who operate dynamically between induction and deduction while framed within a historic context that has path-dependency elements informing evolutionary change (Penrose 2009).

How firms are now responding to the economic crisis caused by the coronavirus pandemic is a good example by which to demonstrate the indicators that must be dealt with in order to ensure survival.

Most firms that rely upon central, physical locations in order to provide their services are pressured to let large percentages of their employees go as operations cannot continue as usual, and yet great damage can be caused to their reputation should they do that. There are pressures to invest in new technologies that can allow for some degree of the continuation of operations, and yet a short length of time of the quarantines can make such expenditures spurious and thus a waste. Edith Rose would likely argue that such considerations – which are deeply informed by culture, ideology, shared moral values and a vision of corporate leadership – are all part and parcel of how a firm is able to survive and grow in the market. These organizational, psychological elements – how work is to be done when forced to do it a new way, how to treat workers in crisis conditions – are part in parcel with understanding how to operate a firm understood to be a pool of resources creating knowledge.

Such claims as this ought not to be interpreted to mean that a behavioralist theory of the firm is advocated within Theory of the Growth of the Firm. Rose states that she is sympathetic to aspects of it, but agnostic in others. While the central operating structure of the firm is its administrative organization, this is does not make it analogous to the heart. Rather it is a place where routine and non-routine managerial decisions are made that affect all of those involved in the profitmaking activities. Developed via the use of resources, these profits provide a means of objectively judging the service performance of those involved. In the interactions between human and material resources knowledge increases about the resources and the consumers of this. It’s in these changes of knowledge that new services become available (Penrose 2009).

To give a trifling example of this, I’ll share a work experience. My first job at 15 was at Taco Bell. I worked as a cashier there and quickly noticed that on the weekends the number of college students was higher than during the week and that they often came in high and ordered cinnamon twists with their order. It was easy for me to discern that the liked the fried sweetness, so it was no surprise to me when shortly after I’d started they launched the Chalupa. This took something that they already sold, flatbread, and threw it in the fryer to make their normal meals taste more savory. I’m certain that they did extensive market and process testing before introducing it – but as my co-workers and I were already doing the same thing before the official launch we liked to joke that we were the true inventors of this treat. This little change from prior operations is an example of diversification that stays within Taco Bell’s core Area of Specialization – Tex-Mex fast food.

Looking at these issues in the context of ICT, it’s apparent that such firms need to have significantly broader research capabilities in order to develop their products. Rather than just market testing within small regions a certain product to see if it will sell or not, they need to plan their diversifications around the features made available by their competitors. This is all the more important as such adoption of such ICT software leads to soft determinism due to the adoption of a specific means of understanding how to engage in technological activities. As will be discussed more later – such choices lead to path dependency that can incur high transfer costs. This incentivizes ICT companies to be on the cutting edge of vigilance, research, and development.

In Wernerfeld’s article A Resource-Based View of the Firm we learn it’s important to view the firm not from the products that it makes, but from the resource side. Doing so allows for a broader analysis of the diversification capabilities inherent with a firm to adapt to external market pressures and to internally innovate. By analyzing the firm from the position that they are a bundle of resources it becomes possible to locate the areas of high-value add, poorly performing activities, and where the barriers and opportunities for expansion are. Some of the

At the end of his article, Wernerfeld shares a series of dynamic resource management practices that have been used by businesses to obtain first-mover advantages – an attractive activity that typically yields high profits in the markets where the resources being deployed operated. The resource-product matrix, diversification via sequential entry, the exploit and develop strategy, and stepping stones process are all means of diversifying offerings and helping to ensure that such actions are successful. All of these are predicated on market research and the consideration of mergers and acquisitions – an imperfect but effective means of obtaining supplementary and complementary resources for the firm (Wernerfelt 1984).

Robert M. Grant sees the key to a resource-based approach to strategy formulation as having a deep understanding as to the relationships between resources, capabilities, competitive advantage, and profitability. For him it is most important to has an understanding of the mechanisms through which competitive advantage can be sustained over time. By designing strategies that exploit to maximum effect each firm’s unique characteristics, the basis for corporate profitability is expanded and more effectively achieved.

Grant makes an insightful statement in the section Resources as the Basis for Corporate Profitability when he states that strategy should be viewed less as a quest for monopoly rents and instead as a quest for Ricardian rents. In the case of ICT, the subscription model over the purchasing model could be seen as a means of encouraging Ricardian rents within companies. While certainly influenced by pirating of software in their choice of having monthly revenues rather than purchases – this also creates an internal incentive to ensure that product improvement is continuous. Because the competitive advantages of companies even like Adobe, Slack, and Firefox are ever fleeting – as evidenced by the recent rise of adoption rates of Microsoft Edge over Firefox- this helps to ensure that the firm’s profit-making processes are not replicated by mimicry, do not become obsolescent or end up depreciating that the value-adding work processed should be identified, appraised and examined for alteration in the framework of strategic capabilities (Grant 1991).

Identification and appraisal of capabilities can be difficult given the personal investment of section-chiefs as well as thinking based in the past successes or future hopes, thus leading to activities beyond or beneath the true scope of its capacities. And yet this analysis combined with the determination of the most effective organizational routines allows for durable marketplace percentages even when faces with an increasing pace of technological change or evolving product demands made by customers (Grant 1991). If firms are able to do this and keep barriers to entry sufficiently high that they discourage competitors from seeking to imitate their business model – then they are reasonably secure in their competitive advantage.

Human capital is one always one of their weaknesses, and employee mobility means that it is risky for firms to be too unduly dependent upon the contributions of the specific skills of a few employees who can bargain to obtain a greater share of the value they contribute and whose transfer to another firm would mean more intense competition and the potential loss of clients. The dynamics implied in this are not fully explored here, but suffice it to say that this fact is evident in the salaries and benefits given to full-stack developers in the ICT field. Because high quality, integrated software developing coding skills are so rare – those with such skills are able to demand greater authority on projects along with recompense. Suffice to say here it is important to fill resource gaps and, once processes are harmonized into an effective strategy it’s important for firms to maintain this “dynamic resource fit”.

Jay Barney’s article develops a framework wherein managers, as human capital, are crucial for reaching higher levels of firm performance. Recognizing that they are limited in their abilities to command and control all of the attributes that compose the characteristics of the firm as well as its place within the market – their analysis is largely what drives its economic performance engine. The three forms of resources that they have control over are organizational capital human capital and physical capital(Barney 1991).

From the standpoint of strategic relevance not all are equally important and sometimes these resources can actually inhibit the implementation of a value-creating strategy. Regarding the first point, it depends upon the type of business the firm is in, i.e. how it is creating value, that this comes into play. For instance, a firm that only requires low skill-levels to operate machines and process materials, i.e. the fast-food service industry, doesn’t need to invest much into the human capital of its front-line employees. Investment in the organizational and strategic workforce is important, however, as it allows them to adequately adjust form operations according to changes in the marketplace or to find new opportunities. For example, a managerial workforce that was agnostic or antagonistic to the new lines of business made possible from the internet revolution could have missed out on a new income stream developed via home delivery or pick up orders.

Firms obtain sustained competitive advantages by implementing strategies that exploit their internal strengths by responding to environmental opportunities. To have the potential for sustained competitive advantage a firm must have four attributes:

  • It might be able to exploit opportunities and/or neutralize threats in a firm’s environment
  • It must be rare among a firm’s current and potential competition
  • It must be imperfectly imitable
  • There cannot be strategically equivalent substitutes for this resource that are neither rare or imperfectly imitable.

If they manage to do all this while also avoiding internal weaknesses – such as employee turnover, which is also a loss of resources – and neutralizing external threats sustained competitive advantages is obtained (Barney 1991).

A path to sustained competitive advantage by harnessing these value-chain attributes. Barney is explicit, however, in his description that sustained competitive advantage isn’t something that once obtained cannot be lost. New knowledge must be constantly sought for in order to continue one’s place at the top and steps taken to maintain customer relations and positive brand recognition. Missteps occur, and there are always other firms looking to expand their percentage of goods or service provision within the market.

 Conclusions

As skills are learned and refined through repetition, skills are automatically developed through the search for the particular strategy, which operates as a push for the company to go a little beyond its limits and constantly renew itself regarding its capabilities and resources, pursuing a dynamic adjustment.

Having the above, the company will be able to build an identity through strategy, which will not strictly depend on market signals, which are not only volatile but also subjective; Due to the permanent changes in customer preferences, but the company can clearly define its identity by identifying its resources and capabilities, to establish what challenges it can face and where to aim in the medium and long term.

The advantages that tourism companies face physical and historical place for some are absolute advantages that when exploited in the proper way can potentially be sources of profitability. 

Recommendations

All in all the picture presented by these authors, to make a somewhat stretched analogy in the sphere of gaming, is that similar to a Go board. Each move changes the larger balance of forces in such a way that while there appears to be clear winners – those with sustain competitive advantages – there is also the need to be forever vigilant in order to keep them. The moves must be complex, and hard to discern by one’s competitor and thus imperfectly imitable from a strategic viewpoint. This means that it is important to know one’s competitors and have deep insight into one’s own operations and where it is that one’s core competencies lie. With the application of resources and strategy, market share is won.

Resource-based theories of the firm supply the concepts required for businesses to flourish as it provides insight on how best to exploit the knowledge that they create it in the marketplace as well as how to develop internally and externally. Strategy formulation along these lines requires a scientific mindset, while implementation strategies require a humanistic one that recognizes the variables involved in firm interactions and personal and group motivations (Penrose).

In the field of Information and Communication Technology, knowledge plays an oversized role as it is imperative in understanding how to frame strategy in such a way that prospective clients are assured that the services and products provided are able to fill business needs in a manner that is superior to that offered by competitors.

  1. Bibliography

Barney, Jay B. Firm Resources and Sustained Competitive Advantage. S.n., 1991.

Penrose, Edith. The Theory of the Growth of the Firm. Oxford University Press, 2013.

Grant, R. “The Resource-Based Theory of Competitive Advantage: Implications for Strategy Formulation.” Knowledge and Strategy, 1999, pp. 3–23., doi:10.1016/b978-0-7506-7088-3.50004-8.

Wernerfelt, Birger. A Resource-Based View of the Firm.

Updating HUAC legal framework to a Bolivarian Context

In Notes from Guide to Subversive Organizations and Publications, the Congressional Committee provides two descriptions in the form of checklists which provide the legal basis for a Front Organization and a Subversive Organization.

They’re able to be viewed in plain text by clicking the above, however, I’ve also adapted them into an Excel file so that it’s easier to chart/view such organizations.

Front Organizations

Subversive Organization Guide

Given that one aspect of my SSRC project is “updating” this into a Bolivarian context, below I’ve attached Excel files which change the subject from Soviet Russia to Bolivarian Venezuela.

Bolivarian Front Organizations

Bolivarian Subversive Organization Guide

 

Notes from Insurgencies are Organizations Too: Organizational Structure and the Effectiveness of Insurgent Strategy

Notes from Insurgencies are Organizations Too: Organizational Structure and the Effectiveness of Insurgent Strategy

From Peace and Conflict Review · Volume 6 Issue 1 · Year 2011 · Page 22

Written by Ethan Frisch holds an Msc in Violence, Conflict and Development, University of London.

***

In April of 1965, Ernesto ‘Che’ Guevara, hero of the Cuban revolution, traveled with a group of Cuban fighters to eastern Congo to support the rebellion against the American- and Belgian-backed government. He intended to share his experiences from the success of the Cuban revolution with Congolese fighters by deploying experienced Cuban fighters alongside inexperienced Congolese recruits. He hoped the Congolese would learn by example, through a process he called ‘Cubanization’, and take on the Cuban fighters’ technical skills and revolutionary mentality. The Preface to his account of his time there, however, begins, ‘This is the history of a failure.’ Guevara very quickly realized that the context of the Congolese revolution was dramatically different from the one he had known in Cuba. The lessons he had learned in the mountains of the Sierra Madre were not always relevant to the Congolese context, and instead of the ‘Cubanization’ of the Congolese soldiers he had hoped for, he observed a ‘Congolization’ of the Cubans, as they adapted to the new environment and began to emulate their Congolese colleagues (Guevara, 2001).

First, I argue that insurgent organizational structure and subsequent strategic decision-making evolve organically, as a natural result of the organization’s short- and long-term goals, economic and social resources, observations and responses to the enemy’s behaviour, and other contextual factors. Second, I argue that the relationship between structure and organizational effectiveness is a product of context, and that in a post-9/11 global context of weak borders, wide-reaching media, centralized counter-terror networks and easy transportation and communication, a decentralized, international network is the most effective structure for an insurgent organization.

five key dilemmas of insurgent organizing: (1) action versus secrecy; (2) growth versus control; (3) recruitment versus retention; (4) success versus longevity; and (5) resources versus constituencies. Dilemmas are a widely used tool in organizational economics and psychology to understand the complexities of decisions that organizations face. They emphasize that choices are not binary and highlight the organization’s agency in negotiating the various challenges they face.

Insurgent organizations exist along a spectrum, from hierarchical to network structures. I introduce a second spectrum along which networked insurgencies can be classified, from local to international structures.

Definitions

For the most part, the use of the term insurgency implies an organized, armed resistance movement, and so for the purposes of this paper will be defined as:

A non-governmental organization working to affect social and/or political change through violent means against existing power structures and in a way that deliberately challenges the state’s monopoly on the legitimate use of violence.

It is also important to differentiate insurgencies from organized criminal groups, whose orientation is primarily towards profit-making.

Dilemma One: Action versus Secrecy

Simply put, any insurgency has two complementary operational goals: to carry out attacks, and to avoid getting caught. The inherent paradox of implementing those goals, however, is that the more attacks an organization carries out, the less secret the organization will be and thus the higher the likelihood they will be defeated.

Heightened secrecy can also have a detrimental impact on an organization’s ability to carry out attacks, as higher levels of secrecy can weaken internal communication and make it harder to coordinate operations.

as organizations emphasize easier internal communication, they become less secure and open themselves up to infiltration and leaks

Dilemma Two: Growth versus Control

As an organization grows in membership, geographical area and diversity and number of activities, the leadership must decide when and how to relinquish the high degree of control they exercised when the organization was smaller. Insurgent organizations, like business corporations, need more people if they want to engage in more activities.

As organizations grow, their structures also become formalized and fixed.

when centralized or decentralized organizations are attacked, each organizational form tends to become more extreme. In a centralized organization, further centralization can make it more vulnerable as the decision-making capacity become concentrated in fewer individuals. In decentralized organizations, a greater degree of decentralization allows the organization to spread to avoid irreparable organizational damage, continue to operate as smaller sub-groups, and to regroup after the attack has ended (Brafman & Beckstrom, 2006).

Johnston argues that the key determinants of insurgent organizational structure are technology and geography. He describes a causal chain in which their interaction influences the type of organization that develops, which has an impact on the organization’s effectiveness.

The role of charismatic leadership is also important in understanding how insurgent organizations grow and change. Jordan, writing about leadership by analysing the assassination of insurgent leaders, finds that although charismatic leadership is key to the creation of a strong insurgent group, it does not determine the group’s ultimate survival and can actually be a hindrance as the group develops over time

two points relevant to the debate on insurgent organizational structure. First, they find that groups with charismatic leaders may resist bureaucratization and growth, and may even resist, at least implicitly, achieving organizational goals. If the leader feels that victory will force the organization to grow beyond his/her control or will remove the organization’s raison d’être, s/he may actually work to ensure that victory is not achieved. Second, they draw a distinction between groups that resemble armies and those that with semi-autonomous squads. They say that in the army-style groups, a loss of leadership always results in the group either being strengthened or collapsing, the group never stays the same or weakens

Groups are founded when charismatic leaders have a set of goals, and when the benefits of membership outweigh the costs for potential recruits. He also agrees that a major function of a terrorist organization is maintaining its own existence, and illustrates that an organization’s leadership needs to sustain the organization overall in order to sustain its privileged position.

Dilemma Three: Recruitment versus Retention

The recruitment-retention dilemma is a particularly pressing one for insurgent organizations

Recruitment is described as an extremely difficult endeavour, and retention is treated mostly as a form of what organizational economics calls ‘contract enforcement,’ focused on convincing members to fulfil their commitments. Actually, the challenge of recruitment is often more related to a lack of quality rather than quantity of recruits

Recruitment

There are three main, overlapping reasons that an individual chooses to join an insurgency: (a) because family members, friends, or other members of the recruit’s social network are involved; (b) because of personal trauma, including violence against the individual and/or his or her family members; and (c) because of deep religious and/or political conviction that inspires a willingness to fight and for a cause

Kuznar, in a wide-ranging psychological and sociological analysis of the reasons people engage in terrorist activities, highlights the significance of a sense of material inequality and lack of fairness as important motivators. He links those sentiments to deeper psychological feelings of resentment and humiliation, which both fuel the motivation to act violently, and create important social bonds with others who share those feelings.

Kuznar also emphasizes the importance of social networks as an important factor in an individual’s decision to participate in terrorism. He highlights the social isolation from mainstream society often felt by migrants… participation in terrorist activities may stem from a psychological impetus to be a part of a supportive group after migrating to an unfamiliar and alienating environment. His conclusions about the role of social networks in recruitment to commit violence is widely supported across the literature, and provide some insight into the non-economic reasons that people choose to participate in terrorist activities

Retention

The factors that contribute to recruitment, like strong social networks, grievance, and incentives also contribute to retention, and do not diminish with membership.

More importantly, access to recruits is a resource in itself, and one that is finite.

Another particularly difficult aspect of retaining group members is that the highest value recruits are also hardest to retain, both because of opportunities outside the insurgency…

The onus is also on the organization to build loyalty.

Dilemma Four: Success versus Longevity

insurgent organizations are primarily rational actors, and that the use of violence, including against civilians, is an effective political tool.

Abrahms disagrees with this conventional wisdom and criticizes the assumptions that underpin it, particularly that terrorist organizations engage in violence with the primarily political goals. He points out seven ways that terrorist organizations contradict the widely held assumption of strategic rationality. He argues that organizational survival and social connections, rather than the achievement of political goals, are the most important factors in the decision-making of terrorist organizations.

Resources versus Constituencies

Olson, writing about bandits in ancient China, presented one of the key choices facing all armed actors with an interest in resource extraction. He presents the ‘roving bandit’ as an armed group that attacks a village, steals as much as they can, and then leaves to do the same to the next village, and the ‘stationary bandit’, a group that establishes itself in a specific area and extracts a smaller, regular tithe from its residents. The stationary bandit will make less money in the short term, but ensures a steady flow of income over the long-term

Modern insurgent organizations often face a very similar dilemma. Weinstein outlines the link between resources, recruitment and organizational structure and behaviour. He argues that insurgencies are dependent on both social and economic endowments, the nature of which influence the organization’s recruitment, structure, goals, and leadership. The crux of his argument rests on the idea that an organization’s methods of resource extraction influence the individuals who choose to join and the way the organization behaves. An organization that depends on the local population for support will employ a ‘stationary bandit’ approach, and attract high-commitment recruits who believe in the organization’s ideology and will employ violence selectively. An organization with access to natural resources or external funding will attract low-commitment recruits who are primarily interested in profit and who have little regard for the lives or livelihoods of civilians, or in establishing a stable system of long-term tax collection. He also argues that the relationship between endowments and an organization’s leadership is mutually reinforcing: endowments shape the leadership’s behaviour, but the leadership can shape endowments as well (Weinstein, 2006).

Context and the Resolution of Dilemmas

It is clear from the dilemmas discussed above that insurgencies need to be dynamic and malleable organizations. They are influenced by a host of contextual factors, which determine the way they negotiate the five dilemmas discussed here.

The distinction between organic and explicit organizational structure and decision-making is important for two reasons. From a policy and particularly counter-insurgency perspective, the conclusion that context is key to the evolution of insurgencies would imply that lessons learned in one context should only be very carefully applied to another. The challenges represented by the dilemmas can be used to frame how an insurgency deals with its context. It also implies, therefore, that if the context in which an insurgency is forming can be changed, so too can the formation of the insurgency. It may be possible to track, or even predict, how those changes will take place if we know how the organization has resolved these dilemmas over time. As such, they can be a useful framework to guide counter-insurgency strategy towards an understanding of the importance of context and the ways it can influence organizational behaviour.

Section 2: A New Spectrum of Insurgent Network Organization

In a modern, post-September 11th context, the strict hierarchical structure has become a liability rather than an asset to an insurgent organization. A number of factors have contributed to this shift, stemming both from the policies and practices related to the Global War on Terror (GWOT) and broader trends of the globalization of travel and trade.

Finally, the wide reach of the media, both in sourcing stories and in reporting them, has created clear incentives for a strategy based on perpetrating a small number of high-profile incidents. Older, hierarchical models of insurgent organization tend to emphasize a long-term strategy based on guerrilla tactics and attrition, whereas modern, networked insurgencies can capitalize on the international media echo to project power and presence through fewer, very public attacks.

Consequently, to be able to accurately analyze the organizational structure of modern insurgencies, it is important to introduce another measure in addition to the hierarchy-network spectrum. As discussed above, hierarchies are becoming less viable as insurgent organizational structures, so the new measure will focus on those organizations closer to the network pole of the spectrum.

Methodology

As we compare the effectiveness of local and international networks by looking at two fairly ideal cases, it’s important to establish a definition of effectiveness as it pertains to the strategies and tactics of insurgent organizations

Based on the Global Terrorism Database’s parameters, effectiveness will be defined by: (1) the frequency of attacks, (2) the sophistication of weapons used, (3) the number of casualties, including injuries and fatalities, caused by individual attacks, (4) the percentage of successful attacks, which are those where law enforcement officials were unable to prevent the attack as it occurred or immediately prior, (5) the defensive capabilities of the target, as the choice and ability to attack military and police targets implies a higher level of organizational effectiveness than attacking civilian or commercial targets, (6) the average number of attackers per incident, because the ability to coordinate more people implies greater organizational effectiveness (7) achievement of their stated goals, and (8) ultimate survival of the organization today.

Conclusion

None of the dilemmas is binary, and each represents a range of choices an organization can make. However, in a modern context of weak borders and easy international transportation, wide-reaching and hyperactive international media outlets, centralized counter-insurgency operations, and inexpensive, reliable means of communication, it would appear that the most effective insurgencies will resolve the dilemmas by evolving an internationally-networked and decentralized organization built of semi-autonomous units with shared goals, ideologies and tactics.

My recommendations to counter-insurgency strategists in government in the United States and Europe are these: harness the energy of insurgency into non-violent political activism, and support and protect the people who choose that route. Development projects aimed at addressing grievances, and at creating economic and social opportunities for potential recruits, could fundamentally change the nature of an insurgent organization before it grows large enough to pose a threat.

In the framework of the five dilemmas, that would entail: encouraging non-violent action over violent secrecy; supporting the growth of movements working to bring about productive social change; recruiting new members and retaining veterans by strengthening social networks and encouraging the use of new means of communication; prioritizing constituencies over resources. In a non-violent and inclusive organization, success and longevity are not mutually exclusive – one success can be the foundation for the next, to construct an organization that is strong enough to resist defeat and flexible enough to recognize and exploit weaknesses in its enemy.

References

Abrahms, M (2008). What terrorists really want: terrorist motives and counterterrorism strategy. International Security, 32(4), 78-105.

Adams, A (2005) ‘The War on Terror in Historical Perspective’ Survival, 47(2), 101-130.
Akerlof, G. & Kranton, R. (2005). Identity and the economics of organizations. Journal of Economic

Perspectives, 19(1), 9-32.
Al Qaeda, (date unknown). Declaration of Jihad against the country’s tyrants: Military series.

Arreguín-Toft, I. (2001). “How the Weak Win Wars: A Theory of Asymmetric Conflict.” International Security 26(1): 93-128.

Aslan, R. The fire this time: On the long-term effects of 9/11. (2011, September 09). Los Angeles Review of Books, retrieved from http://lareviewofbooks.org/post/9988565795/the-fire-this-time

Bassnet, S (2005) ‘Translating Terror’ Third World Quarterly Vol. 26, No. 3, pp 393-403.
BBC. Palestinian Authority funds go to militants. (2003, November 07). Retrieved from http://news.bbc.co.uk/

http://news.bbc.co.uk/1/hi/world/middle_east/3243071.stm

Beall, J., T. Goodfellow and J. Putzel (2006). ‘Introductory article: on the discourse of terrorism, security and development.’ Journal of International Development 18: 51-67.

Beber, B & Blattman, C(2010). The industrial organization of rebellion: the logic of forced labor and child soldiering. Unpublished working paper.

Benmelech, E, Berrebi, C & Klor, E(2010). Economic conditions and the quality of suicide terrorism. NBER Working Paper, 16320,

Berko, A. & Erez, E. (2008), “Martyrs or murderers? Victims or victimizers? The voices of would-be Palestinian female suicide bombers”. In Ness, C. Female terrorism and militancy: Agency, utility and organization, Routledge, London, pp.146-166

Bhat, C (2007) ‘Frontlines and Interstices in the Global War on Terror’ Development and Change Vol. 38, No. 6, pp. 1073-1093.

Bloom, M (2004). Palestinian suicide bombing: public support, market share and outbidding. Political Science Quarterly, 119(1), 61-88.

Brafman, O., & Beckstrom, R. (2006). The starfish and the spider: The unstoppable power of leaderless organizations. New York: Portfolio.

Broekhuizen, Maj. M. (2010). Controlling the human high ground. Military Review, 19-24.
Browning, C., Feinberg, S. & Dietz, R. (2004). The paradox of social organization: networks, collective efficacy, and violent crime in urban neighborhoods.Social Forces, 83(2), 503- 534. Byman, D. (2011). The five habits of highly effective terrorist organizations. Foreign Policy.

Peace and Conflict Review · Volume 6 Issue 1 · Year 2011 · Page 19

Chai, S. (1993). An organizational economics theory of antigovernment violence. Comparative Politics, 26(1), 99-110.

CNN. Bin laden: goal is to bankrupt us. (2001, November 01). CNN World, Retrieved from http://articles.cnn.com/2004-11-01/world/binladen.tape_1_al-jazeera-qaeda-bin?_s=PM:WORLD

Colvin, J. (2008). Insurgency organization case study: Al-Qaeda in the Maghreb, 2006-present. University of Military Intelligence.

Crenshaw, M. (1987). Theories of terrorism: instrumental and organizational approaches. Journal of Strategic Studies, 10(4), 13-31.

Crenshaw, M. (2010). Mapping terrorist organizations. Unpublished working paper.
Downes, A. (2007). Modern insurgency and counterinsurgency in comparative perspective. Civil Wars, 9(4), 313-323.

Duffield, M. (2005) ‘Getting savages to fight barbarians: development, security and the colonial present’

Conflict, Security and Development Vol. 5, No. 1 pp: 141-159.
Enloe, C. (1988), Does khaki become you? 2nd ed., Pandora, London.

Fearon, J, & Laitin, D. (2003). Ethnicity, insurgency, and civil war. The American Political Science Review. Vol. 97, No. 1, pp. 75-90.

Fearon, J. (2004). Why do some civil wars last so much longer than others. Journal of Peace Research, 41(3), 275-301.

Findley, M. & Young, J. (2007). Fighting fire with fire? How (not) to neutralize an insurgency. Civil Wars, 9(4), 378-401.

Fletcher, H. (2008, April 02). Backgrounder: Al Aqsa Martyrs’ Brigade. Council on Foreign Relations, retrieved from http://www.cfr.org/israel/al-aqsa-martyrs-brigade/p9127

Freeman, M. (2011). The sources of terrorist financing: theory and typology. Studies in Conflict and Terrorism, 34(6), 461-475.

Frisch, E (2008). Against democracy: The tools, targets and tactics of insurgent strategy. Unpublished working paper, The City College of New York, The City University of New York.

Frisch, E. (2010). Women combatants and the challenges of DDR. Unpublished working paper, School of Oriental and African Studies, University of London.

Frisch, E. (2011). Terrorism and development. Unpublished working paper, School of Oriental and African Studies, University of London.

Ganor, B. (2008). Terrrist organization typologies and the probability of a boomerang effect. Studies in Conflict & Terrorism, 31(4), 269-283.

Gates, S. (2002). Recruitment and allegiance: The microfoundations of rebellion. Journal of Conflict Resolution, 46(1), 111-130.

Ghosh, B, Hauslohner, A, Thompson, M & Vivienne, W. (2011, April 04). The rebels. Time, 177(13).

Giap, V. (2001). People’s war, people’s army: The Viet Cong insurrection manual for underdeveloped countries. Honolulu: University Press of the Pacific. National Consortium for the Study of Terrorism and Responses to Terrorism (START) at the University of Maryland, (2011). Global Terrorism Database [Data file]. Accessed from July – September 2011 at http://ww http://www.start.umd.edu/gtd

Gonzalez-Perez, M. (2008), Women and terrorism: Female activity in domestic and international terror groups, Routledge, London.

Goodwin, J. (2006). What do we really know about (suicide) terrorism?. Sociological Forum, vol. 21, no. 2, pp. 315-330.

Goodwin, J, et al. (2008). Explaining the rise and fall of terrorism: The case of the Irish Republican Army. Unpublished working paper, presented at the Columbia University Workshop on Contentious Politics, 21 April 2008.

Greenhill, K & Staniland, P(2008). Ten ways to lose at counterinsurgency. Civil Wars, 9(4), 402-419 Guevara, E (1985). Guerrilla warfare. Boston: University of Nebraska Press.

Guevara, E (2001). The African dream, the diaries of the revolutionary war in the Congo. London: Harvill Press.

Gunaratna, R & Oreg, A(2010). Al Qaeda’s organizational structure and its evolution. Studies in Conflict Resolution, 33(12), 1043-1078.

Harmon, C. (2001). Five strategies of terrorism. Small Wars & Insurgencies, 12(3), 39-66.

Hassan, N (2001). An arsenal of believers: talking to the ‘human bombs’. The New Yorker.

Hoffman, B. (2007). “Terrorism in history.” Journal of Conflict Studies 27(2): 8-28.

Humphreys, M & Weinstein, J. (2008). Who fight? the determinants of participation in civil war. American Journal of Political Science, 52(2), 436-455.

Jackson, B(2006). Groups, networks, or movements: a command-and-control-driven approach to classifying terrorist organizations and its application to Al Qaeda. Studies in Conflict & Terrorism, 29, 241-262.

Jenkins, B (1980).The Study of Terrorism: Definitional Problems. The Rand Corporation.
Johnston, P (2008). The geography of insurgent organization and its consequences for civil wars: evidence

from Liberia and Sierra Leone. Security Studies, 17, 107-137.
Jordan, J (2009). When heads roll: assessing the effectiveness of leadership decapitation. Security Studies, 18, 719-755.

Kreuger, A.B. & Maleckova, J. (2002), Education, poverty and terrorism: Is there a causal connection? Annual World Bank Conference on Development Economics

Kuznar, L. A. (2007) ‘Rationality Wars and the War on Terror: Explaining Terrorism and Social Unrest’ American Anthropologist vol. 109, no 2, pp 318-329.

Kydd, A. & Walter, B. (2006). The strategies of terrorism. International Security, 31(1), 49-80.
Langdon, L, Sarapu, A & Wells, M (2004). Targeting the leadership of terrorist and insurgent movements: historical lessons for contemporary policy makers. Journal of Public and International Affairs, 15, 59-78.

Leedom, D, Noble, D & Eggleston, R(2007). Work-centered approach to insurgency campaign analysis. Air Force Research Laboratory.

Li, Q. & Schaub, D. (2004), “Economic Globalization and Transnational Terrorism”, The Journal of Conflict Resolution, vol. 48, no. 2, pp. 230-258.

Lutz, J & Lutz, B (2009). How successful is terrorism? Forum on Public Policy.

Mann, M (2003) Incoherent Empire London: Verso.

Mao, T (2008). On guerrilla warfare. Miami: BN Publishing.

McCormick, G. (2003). Terrorist decision making. Annual Review of Political Science, 6, 473-507.

McCormick, G., Horton, S. & Harrison, L. (2007). Things fall apart: the endgame dynamics of internal wars. Third World Quarterly, 28(2), 321-367.

McCubbins, M.D., Noll, R.G. & Weingast, B.R. (1987). Administrative procedures as instruments of political control. Journal of Law, Economics & Organization, 3(2), 243-277.

Merari, A (1993). Terrorism as a strategy of insurgency. Terrorism and Political Violence, 5(4), 213-251. Olson, M. (2000), Dictatorship, democracy, and development. Ch.4 in Olson, M. and S. Kähkönen (eds.), A

Not-So-Dismal Science: A Broader View of Economies and Societies, Oxford: Oxford University Press. Oots, K.L. (2008). Organizational perspectives on the formation and disintegration of terrorist groups.

Terrorism, 12(3), 139-152.

Oots, K.L. (2008). Bargaining with terrorists: organizational considerations. Terrorism, 13(2), 145-158.

Pape, R. (2003). The strategic logic of suicide terrorism. American Political Science Review, 97(3), 343-361.

Pape, R. (2005), Dying to Win: The Strategic Logic of Suicide Terrorism, Random House, New York. Pedahzur, A & Perliger, A(2006). The changing nature of suicide attacks: a social network perspective. Social Forces, 84(4), 1987-2008.

Petraeus, Lt. Gen. D. (2006). Learning counterinsurgency: observations from soldiering in Iraq. Military Review, 2-12.

Piazza, J.A. (2009). Is Islamist terrorism more dangerous?: an empirical study of group ideology, organization and goal structure. Terrorism and Political Violence, 21(1), 62-88.
Poole, H. (2004). Tactics of the crescent moon: Militant Muslim combat methods. North Carolina: Posterity

Press.
Post, J.M. (1990), “Terrorist psycho-logic: Terrorist behavior as a product of psychological forces”. In

Reich, W. Origins of Terrorism: Psychologies,
Reed, B (2007). A social network approach to understanding an insurgency. Parameters, 37(2), 19-29.

Rees, M, Ghosh, B, Hamad, J & Klein, A. (2002, May 13). Untangling jenin’s tale. Time, Retrieved from http://www.time.com/time/magazine/article/0,9171, 1002406 -1,00.html

Richardson, L (2006). What terrorists want: Understanding the terrorist threat. London: John Murray Publishers.

Sage, S (2002). Recruitment and allegiance: the microfoundations of rebellion. Journal of Conflict Resolution, 46(1), 111-130.

Sageman, M. (2004), Understanding Terror Networks, University of Pennsylvania Press, Philadelphia. Sanin, F (2008). Telling the difference: guerrillas and paramilitaries in the Colombian war. Politics & Society,36(1), 3-34.

Sanin, F & Giustozzi, A(2010). Networks and armies: Structuring rebellion in Colombia and Afghanistan.

Schmidt, F (2010). From Islamic warriors to drug lords: The evolution of Taliban insurgency. Mediterranean Quarterly, 21(2), 61-77.

Shadid, A. (2011, August 31). Syria’s sons of no one. The New York Times.

Simon, H (1991). Organizations and markets. Journal of Economic Perspectives,5(2), 25-44.

Stinchcombe, A(1997). On the virtues of the old institutionalism. Annual Review of Sociology,23, 1-18.

Taber, R (2002). War of the flea: The classic study of guerrilla warfare. Washington, D.C: Potomac Books.

Tilly, C (1985). War Making and State Making as Organized Crime. Bringing the State Back. Cambridge University Press, New York.

Tilly, C. (2004), Terror, Terrorism, Terrorists. Sociological Theory, vol. 22, no. 1, pp. 5-13.
Waugh, W. (1983). The values in violence: organizational and political objectives of terror groups. Conflict Quarterly, 5-19.

Weinberg, L. (1991), “Turning to Terror: The Conditions Under Which Political Parties Turn to Terrorist

Activities”, Comparative Politics, 23 (4), 423-438.
Weinstein, J(2005). Resources and the information problem in rebel recruitment.The Journal of Conflict

Resolution, 49(4), 598-624.
Weinstein, J. (2006), Inside rebellion: The politics of insurgent violence, Cambridge University Press, New York.

Wolf, J. (1978). Organization and management practices of urban terrorist groups. Terrorism, 1(2), 169-186.

Zubaydi, Z. (2011, August 10). Former commander, Al Aqsa Martyr’s Brigade, Jenin. Interview by E Frisch.