Preview

The Strategic Value of Information

Satisfactory Essays
Open Document
Open Document
305 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
The Strategic Value of Information
Security Challenges

The Strategic Value of Information in Effects-Based Operations
Gary Waters

Introduction
The attraction of effects-based operations (EBO) is the prospect of improved efficiency in the planning and conduct of operations. Put simply, EBO can be seen as a coordinated set of actions that are directed at shaping the 1 behaviour of friends, foes and neutrals in peace, crisis and war. In shaping nation states, we would focus on politics, which drives the various dimensions of national power. In shaping the behaviour of non-state actors, the focus would be on ideology. But what brought us to this culminating point that presents EBO as an attractive option? Ed Smith has suggested that the combination of three technology revolutions – sensor, information and weapons – combined with the promise of network-centric thinking within an effects-based approach 2 herald enormous promise for improved efficiency as well as effectiveness. Sensor technology, which essentially provides situational awareness, offers the promise of comprehensive, near-real-time surveillance over vast areas and facilitates the move toward smaller, cheaper, more numerous sensors that can be networked to detect, locate, identify, and track targets. It’s not the sensor technology itself that is important to EBO; rather, it’s the information that the sensors provide. Information technology, which essentially provides the network backbone, offers the potential to expand the capability of the sensors both by better integrating the data collected and by allowing the sensors to interactively build on one another’s efforts. Furthermore, the scope and scale of the data provided by the sensor revolution is likely to be of such a quantity that it would be unmanageable if it were not for an information revolution that will bring the geometric increase in computing power necessary to process, collate, and analyse the resulting quantity of sensor data. Again, it’s not the

You May Also Find These Documents Helpful

  • Good Essays

    Further research to bolster its effectiveness would be on, “global, full-time surveillance, and attack…

    • 437 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    How Information Is Used

    • 366 Words
    • 2 Pages

    3. How does information collected by an EIS and a DSS help a hotel manager make strategic decisions for a company?…

    • 366 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Lessons Learned Information Sharing (LLIS) program promotes preparedness by identifying lessons learned and innovative practices, analyzing recurring trends, and sharing knowledge with the whole community. The numerous daring and sacrificial demonstrations of firefighters, flight chaperons, colleagues, passers-by and volunteers demonstrated that Americans are liberal with their valor and that saints are all around us. Complacency in the lodge amid a terrorist endeavor is no more an alternative. Whether it is Osama receptacle Laden, Timothy McVeigh, or a female suicide plane, terrorism has numerous countenances,…

    • 136 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    The phrase “use intelligence, not intelligence” means success in international affairs depends on grasping a situations fundamentals, on telling friends from enemies, choosing the right objectives, deciding on war and peace, and executing reasonable strategies, not on specific intelligence from satellites or imagery. Codevilla claims that even when received, intelligence information is not always accurate. He uses the example of imagery of Russian bases in which intelligence analysts were unable to decipher whether their surface-to-air missile launchers were empty or stored and how exactly they may be fired. Codevilla believes that this type of intelligence is useless and irrelevant in decision making because quality is not always guaranteed and information can be…

    • 1184 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Sharing information Sharing information is the solution to improve the beneficial outcomes for all children. Safeguarding children is essential to facilitate early intervention and preventative work. The professionals working with children must know and understand what to do and the most effective ways of sharing information about child or young adult who are at risk of abuse or neglect.…

    • 569 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Lone Wolf Terrorism

    • 8850 Words
    • 36 Pages

    Casebeer, William, Troy, Thomas (2004): Violent Systems: Defeating Terrorists, Insurgents, and Other Non-State Adversaries. Occasional Paper 52. USAF Institute for National Security Studies USAF Academy, Colorado.…

    • 8850 Words
    • 36 Pages
    Powerful Essays
  • Best Essays

    Nardulli, Bruce. The Global War on Terrorism: An Early Look at Implications for the Army. Pittsburg, P.A.: RAND Army Research Division, 2003. Print.…

    • 1890 Words
    • 8 Pages
    Best Essays
  • Powerful Essays

    Over the last seventy years, the U.S. Military has developed into one of the main tools used by our International Partners to manage complex crisis that pose a serious threat to international peace and security past the United States borders. The number of military personnel that are being deployed to investigate, assist when peacekeeping is greatly needed has grown in size and within the last decade has become progressively complex. Today our military collect and analyze numerous data that is being received through our U.S. Intelligence Office to better protect our concerned interest of our foreign allies. This constant monitoring helps with military operations in restoring the rule of law within foreign nations and attempting to promote human rights for women and children around the world. During the twentieth century the United States has become the "policemen" of the world through international incidents such as U.S. forces strike in Libya, Somalia, capture al Qaeda operative (2013) and NATO coordinates air strikes and missile attacks against Qaddafi government during uprising by rebel Army (2011).…

    • 2321 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Military technology and strategies have constantly evolved throughout history. However, within the last few centuries, the world has seen warfare evolve at such a rapid rate, that it seems no two wars are fought the same. With ever-changing technologies, soldiers’ duties and skills have had to adapt along with them. Yet, soldiers are not the only ones who have been affected by changes in warfare. With the emergence of the Napoleonic and World Wars, the people of a given country became involved in an effort known as a “total war.” As World War II came to an end though, the major powers in the world would never again get into a “total war.” All in all, many technological advances and tactics, in recent history, have dramatically changed the way wars are fought. The events that have seen a dramatic change in technology and/or warfare are as follows: the Industrial Revolution, the Napoleonic wars, World War I, World War II, and the Cold War (Buzard, 2006).…

    • 1672 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Information Use

    • 777 Words
    • 4 Pages

    In today’s business environment information is the most important asset a business has, this information helps to support, maintain, develop and track its daily activities. The next logical step is implementing a system that is conducive and geared towards this goal. With the help of its information system, and its information technology department, managers, sales people, the operations department and others with access to this information have a handy tool to help them do their work on a daily basis. The structure of the information system is paramount on how accessible this information is to the people that depend upon it to complete their normal workday. The managers and IT department work closely together to agree upon and decide on an information system that will be feasible to the business itself, thus setting up a system that will be beneficial to the business itself.…

    • 777 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Texas History Voting

    • 2541 Words
    • 11 Pages

    National Security Archive . (2008, January 2). Retrieved July 19, 2013, from National Security Achive George Washington University: http://www.gwu.edu/~nsarchiv/news/20071218/…

    • 2541 Words
    • 11 Pages
    Powerful Essays
  • Best Essays

    Counter Terrorism

    • 2173 Words
    • 9 Pages

    As noted by Carera (2005), the theme of intelligence reform is still fresh in the United States, and with the creation of the Director of National Intelligence (DNI), we can appreciate how deep the concerns over intelligence failure in recent years have been. At the heart of this development lie issues of funding, structure and methodology, of which we are concerned with the last of the three. In order to address the issues surrounding the methodology of collecting intelligence for counter terrorism, we first look at definitions of the intelligence terminology referred to, along with an explanation of the current focus of the debate. We then identify how the modern terrorist threat differs from the traditional Cold War enemy, before suggesting reasons why over reliance on one form of intelligence gathering is wrong. We concentrate on a western perspective of intelligence, in particular, the experiences of the United States. This approach allows us to keep a focus on the issue without wandering into inappropriate areas of debate.…

    • 2173 Words
    • 9 Pages
    Best Essays
  • Good Essays

    The question posed is challenging, because it is difficult to choose which intelligence collection techniques had the greatest effect in accomplishing U.S. objectives in the wars in Iraq and Afghanistan, because ALL of these intelligence collection methods—collectively—had an impact, and each technique differed in terms of the data provided, timeliness, accuracy, and responsiveness. Further, as we consider intelligence failures of the past, I am reminded that no one form of intelligence collection can stand on its own and human intelligence (HUMINT) should never be overlooked or ignored. However, since the question presented to students does ask us to address which techniques, this implies a decision, or choice, so I choose the combined use…

    • 861 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The key components of the intelligence community through the above functions are to operate within the intelligence cycle to aid and afford policy makers refined intelligence for decision making. The stability and common welfare of the citizens and its critical infrastructures are priority to organizing the strategic, operational and tactical aspects of defending and offensively protecting the United States. With the construction of special task force from sworn law enforcement officers, military forces and leaders with in global communities counterintelligence takes a offensive approach to deterring prospective terrorist and apprehending those who seek harm. In relation counterintelligence devises the ability to equip first responders and military operatives with the knowledge and capabilities to defend against threats that are domestic or…

    • 498 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    As citizens of the United States one of the greatest expectations of the government is that it will provide safety from those wishing to inflict harm. This expectation of the government is becoming increasingly more difficult as the enemy become less obvious. With the latest acts of terrorism against the United States by unremarkable jihadists the goal of complete safety is nearly impossible. What makes this task even slightly attainable is the ability to collect information against the enemy and convert it into actionable intelligence. An important aspect of utilizing intelligence is keeping the nature of the information and the manner in which it was obtained classified form anyone who does not need to know. In 2009 President Obama signed Executive Order…

    • 1744 Words
    • 7 Pages
    Powerful Essays