LEADER 03239nam 2200721Ia 450 001 9910219987103321 005 20200520144314.0 010 $a1-281-18127-7 010 $a9786611181277 010 $a0-8330-4288-2 035 $a(CKB)1000000000481426 035 $a(EBL)322567 035 $a(OCoLC)476120111 035 $a(SSID)ssj0000116545 035 $a(PQKBManifestationID)11128822 035 $a(PQKBTitleCode)TC0000116545 035 $a(PQKBWorkID)10035522 035 $a(PQKB)10153365 035 $a(Au-PeEL)EBL3031552 035 $a(CaPaEBR)ebr10225483 035 $a(OCoLC)923689297 035 $a(Au-PeEL)EBL4970007 035 $a(CaONFJC)MIL118127 035 $a(OCoLC)1027205403 035 $a(MiAaPQ)EBC3031552 035 $a(MiAaPQ)EBC4970007 035 $a(EXLCZ)991000000000481426 100 $a20070910d2007 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aByting back $eregaining information superiority against 21st-century insurgents /$fMartin C. Libicki ... [et al.] ; prepared for the Office of the Secretary of Defense 205 $a1st ed. 210 $aSanta Monica, CA $cRand Corporation$d2007 215 $a1 online resource (194 p.) 225 1 $aRand counterinsurgency study. Paper ;$vv. 1 300 $a"RAND National Defense Research Institute." 311 $a0-8330-4189-4 320 $aIncludes bibliographical references (p. 157-159). 327 $aCover; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Chapter Two - The Influence of User Requirements; Chapter Three - The Registry-Census; Chapter Four - A Well-Wired Country; Chapter Five - Embedded Video; Chapter Six - A National Wiki; Chapter Seven - The Principles of ICON; Chapter Eight - Implications and Implementation; Appendix - Disaggregated Information Requirements; Bibliography 330 $aU.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government and an armed opposition movement, the key to exploiting information power is to connect with and learn from the population itself, increasing the effectiveness of both the local government and the U.S. military and civilian services engaged in supporting it. Utilizing mostly available networking tech 410 0$aRand counterinsurgency study.$pPaper ;$v1. 606 $aInsurgency 606 $aIraq War, 2003-2011 606 $aAfghan War, 2001- 606 $aMilitary art and science$zUnited States 615 0$aInsurgency. 615 0$aIraq War, 2003-2011. 615 0$aAfghan War, 2001- 615 0$aMilitary art and science 676 $a322.4 676 $a355.02/18 701 $aLibicki$b Martin C$0877014 712 02$aNational Defense Research Institute (U.S.) 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910219987103321 996 $aByting back$92492204 997 $aUNINA