Warning Analysis for the Information Age: Rethinking the Intelligence Process

Total Page:16

File Type:pdf, Size:1020Kb

Warning Analysis for the Information Age: Rethinking the Intelligence Process Joint Military Intelligence College December 2003 WARNING ANALYSIS FOR THE INFORMATION AGE: RETHINKING THE INTELLIGENCE PROCESS TEL IN LIG Y E R N A C T E I L C I O M L L T E N G I E O J 1962 John W. Bodnar PCN 52518 ISBN 0-9656195-8-3 52518pref.fm Page 0 Friday, December 19, 2003 11:57 AM Warning Analysis for the Information Age: Rethinking the Intelligence Process by John W. Bodnar c Int gi c el e g ll t ii a g e r e nn tt SS cc ee rr R R o o e e f f s s e e r r a a e e t r t r n c n Joint Military c e h e Intelligence College h C Intelligence College C WASHINGTON, DC December 2003 The views expressed in this paper are those of the author and do not reflect the official policy or position of the Department of Defense or the U.S. Government 0 52518pref.fm Page ii Friday, December 19, 2003 11:57 AM The Joint Military Intelligence College supports and encourages research on intelligence issues that distills lessons and improves support to policy-level and operational consumers Warning Analysis for the Information Age: Rethinking the Intelligence Process, by John W. Bodnar This book bequeaths to the Defense Intelligence Agency, and to the Intelligence Community at large, a substantiated vision, with examples, of how analysts can exploit already-available, massive databases to tackle many of the most vexing problems that we face. Dr. Bodnar builds on the earlier work and insight of Cynthia Grabo, whose book Anticipating Surprise: Analysis for Strategic Warning was recently published by the Joint Military Intelligence College’s Center for Strategic Intelligence Research. The author also usefully integrates into this book the often-cited but rarely-seen original work of the USAF’s strategic and operational philosopher Colonel John Boyd. Together with the accompanying, classified case studies that are available to the Community on Intelink, this book reaches farther than any other toward the objective of bringing together substantive expertise with an accessible, methodologically sound analytical strategy in the service of the U.S. Intelligence Commu- nity. Those who go on to apply this method will not only derive fresh understanding from existing data, but will also be able to guide future intelligence collection in an appropriately frugal fashion. [email protected], Editor Library of Congress Control Number 2003114408 ISBN 0-9656195-8-3 ii 52518pref.fm Page iii Friday, December 19, 2003 11:57 AM ACKNOWLEDGEMENTS The author gratefully acknowledges the following individuals, who reviewed and commented on early drafts of this book. Jim Murphy and Kelcy Allwein of the Defense Intelligence Agency; Kim McVaney of the National Security Agency, Mike Maskelaris of MITRE Corpo- ration, and Frank Hughes, faculty member at the Joint Military Intelligence College. In addition, several individuals provided invaluable assistance or advice on the classified case studies. From the Defense Intelligence Agency: Dr. Eric Hehl, CW3 David Temby, Mary Highsmith, and CDR James van der Velde. From the Joint Military Intelligence College: LTC Jeffrey Johnson, JMIC stu- dent; Dr. William Williamson, faculty member; and Research Fellow colleague Rebecca Katz. iii 52518pref.fm Page iv Friday, December 19, 2003 11:57 AM iv 52518pref.fm Page v Friday, December 19, 2003 11:57 AM CONTENTS Acknowledgements. iii Commentaries on the Book. vii Chapter 1. Strategic Warning in a World of Weapons of Mass Destruction and Terrorism . 1 2. From Current Intelligence to Warning Analysis . 9 3. From Newtonian Thinking to Quantum Thinking . 17 4. Paradigm Shifts — When the Future Ain’t What It Used To Be . 21 5. From Newtonian Analog Models to Quantum Digital Models. 29 6. Toward Novel Intelligence from Massive Data . 45 7. From Current Intelligence to Strategic Warning. 55 8. Modeling the Decision Cycle . 73 9. Modeling the Target . 85 10. Modeling How We Model. 123 11. Modeling Ourselves . 147 12. Getting There from Here. 163 13. Toward an Information-Age IC: How Long Will It Take? . 167 14. Can We Shift A Paradigm in a Single Generation?. 175 Selected Bibliography. 181 Index . 182 About the Author . 183 v 52518pref.fm Page vi Friday, December 19, 2003 11:57 AM 52518pref.fm Page vii Friday, December 19, 2003 11:57 AM COMMENTARIES Warning Analysis For The Information Age: Rethinking The Intelligence Process JEFFREY R. COOPER* Looking toward the challenges posed to the Intelligence Community by the changed strategic circumstances of the Information Age, Dr. Bodnar, an experi- enced intelligence analyst with a deep technical background, weaves together four themes in addressing the emerging demands of warning intelligence. The important core theme is the utility of his Multidimensional Analysis (MDA) methodology in confronting the complexity of Information-Age warning chal- lenges, an analytic approach he developed while working on a variety of prob- lems posed by foreign development of weapons of mass destruction. The second theme builds on Cynthia Grabo’s recently republished classic Handbook of Warn- ing Intelligence and tunes those lessons for Information-Age rather than Indus- trial-Age conditions. Bodnar’s third theme is to highlight the utility of Col. John Boyd’s theory of the OODA-loop decision cycle and integrate it into the warning analysis framework. Finally, from his perspective as a working analyst, Bodnar provides, in a series of suggestions on fixing analytical and resource constraints, a strategy to improve intelligence analysis. To this interesting and useful work, I would offer several thoughts for additional emphases. OVERALL COMMENTS Properly in my view, Bodnar, in concert with many observers,1 sees the Infor- mation Age as signifying a fundamental shift away from a deterministic and lin- ear Newtonian paradigm to a complex adaptive systems perspective grounded in non-linearity and modern, quantum physics. Bodnar integrates this “paradigm shift” theme throughout his paper; however, perhaps in keeping with his scientific background and in focusing narrowly on the analytical issues, he fails to fully *Corporate1 Vice-President for Technology and Chief Scientist, Science Applications International Corporation Strategies Group. 1See, for example, David S. Alberts and Thomas J. Czerwinski, eds., Complexity, Global Politics, and National Security (Washington, DC: National Defense University Press, June 1997). vii 52518pref.fm Page viii Friday, December 19, 2003 11:57 AM appreciate other distinctive elements of that Industrial-Age model, besides the deterministic Newtonian linearity, that are now also changing and contributing to our emerging warning problems. Industrial-Age powers drew their strength from three underlying and interre- lated roots: political, economic, and technological. First, building upon the post- Westphalian emergence of nationalism, these nation-states drew legitimacy and political strength from large cohesive publics, which could also provide sizable military forces. Second, industrialization and mass production fueled rapid eco- nomic growth that together allowed these nation-states to field and support very large military forces. Third, new technologies provided large-scale mobility and immensely lethal firepower for these forces, enabling offensive military opera- tions at a distance. The potency of scale dominated the sources of national power, but the Industrial Age required efficient organizations and processes to harness and exploit this power. Thus, the importance of Weber’s hierarchical bureaucra- cies that brought professionalization, specialization and routinization to manage- ment. Also, Taylor’s application of standardized and systematized processes to manufacturing cannot be overemphasized as key elements of the Industrial-Age paradigm that demanded the ability to predict and control these mass-scale enti- ties. Throughout the Industrial Age, these same factors—mass, standardization, and predictability—also underwrote the sources of military strength and shaped strat- egies and operational approaches to warfare. But those very qualities also enabled us to adopt and exploit a warning paradigm based on assumptions (such as mass and linearity) that danger would come from large-scale activities. These threats, almost by definition, would be visible—and deterministically predictable—if we could access their signatures. The Information Age has changed these comfort- able assumptions about the tractability of providing warning based on observable activities and predictable processes; new threats may come in very small pack- ages that are difficult to detect, or subtle activities with non-linear consequences that are hard to observe. While I might disagree with Bodnar as to the magnitude of the threat posed by many of these new challenges (especially as compared with tens of thousands of nuclear weapons wielded with deadly malice), I certainly agree that this new environment is more challenging, with respect to knowability (in the formal sense), observability, and predictability if we continue to rely on our inherited tools and practices. Exactly for this reason, I would strengthen Bod- nar’s implicit call to re-examine issues of analytic process. This will demand returning to first-order issues of both phenomenology and epistemology. A second area that I would emphasize is the diversity of the new warning chal- lenges. First, I would emend Bodnar’s definitions of warning. All intelligence viii 52518pref.fm Page ix Friday, December 19, 2003 11:57 AM informs decisionmakers; but warning intelligence is distinctive because it must be intended to trigger action by the decisionmaker. Strategic warning intelligence especially must concern itself not just that a nation (or other group) may hold hostile intentions and be acquiring appropriate capabilities to serve them, but also that other changes—such as new technologies, political institutions or dynamics, economic dislocations, or challenges to human security such as disease or envi- ronmental catastrophe, could pose fundamental challenges to U.S. interests or policies. I would also add Operational Warning to his categorization. Tactical Warning (TW) is an alert; it should denote that the activity of concern (such as a surprise attack) is immediately imminent or unfortunately underway.
Recommended publications
  • California State University, Northridge the Effects Of
    CALIFORNIA STATE UNIVERSITY, NORTHRIDGE THE EFFECTS OF WARNING MESSAGE HIGHLIGHTING ON NOVEL ASSEMBLY TASK PERFORMANCE A thesis submitted in partial satisfaction of the requirements for the degree of Master of Arts in Psychology Human Factors/Applied Experimental by Morris A. Zlotnik May, 1982 The Thesis of Morris A. Zlotnik is approved: Tyler Blake Ma~s. Sanders, Chair California State University, Northridge ;; ACKNOWLEDGEMENTS The author would like to acknowledge those persons who have assisted in the conception, development, and implemen­ tation of this study. I would like to thank Dr. Tyler Blake and Dr. Bill Wilsoncroft for agreeing to serve on my committiee. I would also like to thank my chairman Dr. Mark Sanders, for all the assistance he has rendered to me during this task, and especially throughout my (many) years at CSUN. My appreciation is also extended to Xyzyx Infor­ mation Corporation. Many of the documents reviewed for this study were obtained through my association with Xyzyx. In addition, the unrestricted use of their technical facil­ ities has been of invaluable help to me during the prepara­ tion of this manuscript. Finally, I would like to thank my wife Linda, for all the encouragement, patience, and love she has provided to me throughout this endeavor. This thesis is dedicated to my family and friends. i i; TABLE OF CONTENTS Page List of Figures • • v List of Tables • vi Abstract • vii INTRODUCTION • • 1 The Warning Process 2 Behavior and warnings • 3 Standardized Warnings 7 Warnings and Complex Written Procedures 10 Statement of the Problem 18 METHOD • • • 22 Independent Variables • 2.2' Dependent Variables • 25) Covariates 28 Subjects 29 Apparatus 30 Procedure 32 RESULTS 38 Multivariate Statistical Assumptions 38 Multivariate Analysis of Covariance 40 Analysis I 41 Analysis II 50 DISCUSSION • • 59 Warning Messages and Task Performance 63 Implications and Limitations • 65 REFERENCES 68 APPENDIX A • • • 72 APPENDIX B 97 APPENDIX C • 122 iv LIST OF FIGURES Figure 1.
    [Show full text]
  • The Visser Chronicles
    1 Animorphs Chronicles 3 Visser K.A. Applegate *Converted to EBook by asmodeus *edited by Dace k 2 Prologue “Honey?” No answer. My husband was watching a game on television. He was preoccupied. “Honey?” I repeated, adding more urgency to my tone of voice. He looked over. Smiled sheepishly. “What’s up?” “Marco’s fever is down. I think he’s basically over this thing. He’s asleep. Anyway, I was thinking of getting some fresh air.” He muted the television. “Good idea. It’s tough when they’re sick, huh? Kids. He’s okay, though, huh?” “It’s just a virus.” “Yeah, well, take some time, you’ve been carrying the load. And if you’re going to the store- “ “Actually, I think I’ll go down to the marina.” He laughed and shook his head. “Ever since you bought that boat… I think Marco has some competition as the favorite child in this household.” He frowned. “You’re not taking it out, are you? Looks kind of gloomy out.” I made a smile. “Just want to make sure it’s well secured, check the ropes and all.” He was back with the game. He winced at some error made by his preferred team. “Uh-huh. Okay.” I stepped back, turned, and walked down the hall. The door to Marco’s room was ajar. I paused to look inside. I almost couldn’t do otherwise because the other voice in my head, the beaten-down, repressed human voice, was alive and screaming and screaming at me, begging me, pleading <No! No! No!> Marco was still asleep.
    [Show full text]
  • 124214015 Full.Pdf
    PLAGIAT MERUPAKAN TINDAKAN TIDAK TERPUJI DEFENSE MECHANISM ADOPTED BY THE PROTAGONISTS AGAINST THE TERROR OF DEATH IN K.A APPLEGATE’S ANIMORPHS AN UNDERGRADUATE THESIS Presented as Partial Fulfillment of the Requirements for the Degree of Sarjana Sastra in English Letters By MIKAEL ARI WIBISONO Student Number: 124214015 ENGLISH LETTERS STUDY PROGRAM DEPARTMENT OF ENGLISH LETTERS FACULTY OF LETTERS SANATA DHARMA UNIVERSITY YOGYAKARTA 2016 PLAGIAT MERUPAKAN TINDAKAN TIDAK TERPUJI DEFENSE MECHANISM ADOPTED BY THE PROTAGONISTS AGAINST THE TERROR OF DEATH IN K.A APPLEGATE’S ANIMORPHS AN UNDERGRADUATE THESIS Presented as Partial Fulfillment of the Requirements for the Degree of Sarjana Sastra in English Letters By MIKAEL ARI WIBISONO Student Number: 124214015 ENGLISH LETTERS STUDY PROGRAM DEPARTMENT OF ENGLISH LETTERS FACULTY OF LETTERS SANATA DHARMA UNIVERSITY YOGYAKARTA 2016 ii PLAGIAT MERUPAKAN TINDAKAN TIDAK TERPUJI PLAGIAT MERUPAKAN TINDAKAN TIDAK TERPUJI A SarjanaSastra Undergraduate Thesis DEFENSE MECIIAMSM ADOPTED BY TITE AGAINST PROTAGOMSTS THE TERROR OT OTATTT IN K.A APPLEGATE'S AAUMORPHS By Mikael Ari Wibisono Student Number: lz4ll4}ls Defended before the Board of Examiners On August 25,2A16 and Declared Acceptable BOARD OF EXAMINERS Name Chairperson Dr. F.X. Siswadi, M.A. Secretary Dra. Sri Mulyani, M.A., ph.D / Member I Dr. F.X. Siswadi, M.A. Member2 Drs. HirmawanW[ianarkq M.Hum. Member 3 Elisa DwiWardani, S.S., M.Hum Yogyakarta, August 31 z}rc Faculty of Letters fr'.arrr s41 Dharma University s" -_# 1,ffi QG*l(tls srst*\. \ tQrtnR<{l
    [Show full text]
  • Read Ebook {PDF EPUB} Visser by K.A. Applegate Visser — K.A
    Read Ebook {PDF EPUB} Visser by K.A. Applegate Visser — K.A. Applegate. In an hour or so, once I was out of sight of land, I would lower my sails and wait for a Bug fighter to come lift me off the deck. The engine backwash of the Bug fighter would capsize the boat. Or / might put the Taxxon pilot to the test and see if he could ram the low-slung boat. That would puzzle the humans. Either way, my body would never be found. My time of lying low was over. I would spearhead the invasion of Earth. I would take charge of our greatest conquest. I would stand alone atop the Yeerk military hierarchy. I was to become Visser One. Her human name is Eva. There was a time when she had a loving husband and a son, Marco. When she had a wonderful career. But that was before she was infested by Edriss 562. Before the invasion of Earth. Now, Edriss 562 lives in Eva's head and controls her every movement. And through Eva, Edriss has become the highest-ranking general in the Yeerk empire, surpassing even her arch rival, Visser Three. She is Visser One. But, it has become known that Visser One's tactics for attaining her current position were less than acceptable -- even to the Yeerks. Now she is on trial for treason. If she's found innocent she'll continue to rule. But if she's found guilty, she'll lose her life -- and possibly the life of her host, Eva.
    [Show full text]
  • The Speeding of Voluntary Reaction by a Warning Signal
    Psychophysiology, 46 (2009), 225–233. Wiley Periodicals, Inc. Printed in the USA. Copyright r 2009 Society for Psychophysiological Research DOI: 10.1111/j.1469-8986.2008.00716.x PRESIDENTIAL ADDRESS, 2006 The speeding of voluntary reaction by a warning signal STEVEN A. HACKLEY Department of Psychological Sciences, University of Missouri-Columbia, Columbia, Missouri, USA Abstract Warning signals can shorten reaction time (RT) via either a top-down mechanism, temporal attention, or a bottom-up one, phasic arousal. The goal of this review article is to identify the locus at which these processes influence RT. Electrophysiological and behavioral evidence indicate that the chronometric locus for both modulatory effects lies mainly within a narrow window at the center of the stimulus–response interval. This interval presumably encompasses late perceptual, response selection, and early motor processes. Phasic arousal is theorized to reduce the threshold for response selection within a circuit involving the supramarginal gyrus. A blind-sight study indicates that conscious, cortical level processing is necessary for temporal attention, at least when the warning signal is visual. Descriptors: Temporal attention, Phasic arousal, ERP/fMRI/EMG, Parkinson’s disease, Blind sight In the field of attention and performance, warning effects used to temporal orienting is associated with a pattern of brain activation be somewhat dismissively characterized as ‘‘nonselective.’’ that differs substantially from that observed during visuospatial Whereas perceptual resources are selectively focused on ear of orienting. entry in Hillyard’s classical paradigm (Hillyard, Hink, Schwent, The study of temporal orienting began with an experiment & Picton, 1973) or on a particular visuospatial location in performed by the founder of scientific psychology, Wilhelm Posner’s paradigm (Posner, 1980), only diffuse, nonspecific Wundt (1880, pp.
    [Show full text]
  • Designing Warning Messages for Detecting Biased Online Product Recommendations: an Empirical Investigation
    Designing Warning Messages for Detecting Biased Online Product Recommendations: An Empirical Investigation Bo Xiao Information Technology Management Department, Shidler College of Business, University of Hawaii at Manoa, Honolulu, HI, United States, [email protected] Izak Benbasat Sauder School of Business, University of British Columbia, 2053 Main Mall, Vancouver, BC V6T 1Z2, Canada, [email protected] ABSTRACT The increasing adoption of product recommendation agents (PRAs) by e-commerce merchants makes it an important area of study for Information Systems researchers. PRAs are a type of web personalization technology that provides individual consumers with product recommendations based on their product- related needs and preferences expressed explicitly or implicitly. While extant research mainly assumes that such recommendation technologies are designed to benefit consumers and focuses on the positive impact of PRAs on consumers’ decision quality and decision effort, this study represents an early effort to examine PRAs that are designed to produce their recommendations on the basis of benefiting e- commerce merchants (rather than benefitting consumers) and to investigate how the availability and the design of warning messages (a potential detection support mechanism) can enhance consumers’ performance in detecting such biased PRAs. Drawing on Signal Detection Theory, the literature on warning messages, and the literature on message framing, we identified two content design characteristics of warning messages -- the inclusion of risk-handling advice and the framing of risk- handling advice -- and investigated how they influence consumers’ detection performance. The results of an online experiment reveal that a simple warning message without accompanying advice on how to detect bias is a two-edged sword, as it increases correct detection of biased PRAs (hits) at the cost of increased incorrect detection (false alarms).
    [Show full text]
  • Scholastic Relaunch Discussion Guide
    Discussion GuiDe ANIMORPHS™ by K. A. APPLEGATE DiscussinG ThE sEriEs Everyone should be scared—really scared—and that means you! Five kids— the Animorphs—are Earth’s only hope against a secret invasion by a race of terrifying parasitic aliens called Yeerks. Can the Animorphs defeat the Yeerks—and still have time to be normal kids? Stories of alien invasion have been common in science fiction novels and movies for over a century. The War of the Worlds by H. G. Wells set the standard, and has been revived over the years through a famous radio play and two movie versions. The theme has been explored by many other famous authors such as Isaac Asimov, Ray Bradbury, John Christopher, Arthur C. Clarke, and Robert Heinlein, and in movies such as Invaders from Mars, The Thing from Another World, and Invasion of the Body Snatchers, and in TV shows like Battlestar Galactica, Dr. Who, Star Trek, V, and The X-Files. In the video game, Destroy All Humans!, gamers play war-like extraterrestrials seeking to add Earth to its Galactic Empire. Now, in the Animorphs series, five young people—Jake, Marco, Cassie, Rachel, and Tobias—and one alien, Aximili-Esarrouth-Isthill (nicknamed Ax)—obtain the ability to morph into any animal they touch. They name themselves “Animorphs” and use their ability to battle a secret infiltration of Earth by the Yeerks. The Animorphs take turns narrat- ing the books, telling their story of the secret war through each of their perspectives. As you read these books you can discuss many themes that run through them—such as dehumanization, growing up, innocence, leadership, morality, responsibility, and war.
    [Show full text]
  • The Warning-Response Problem and Missed Opportunities in Preventive Diplomacy Foreword
    The Warning-Response Problem and Missed Opportunities in Preventive Diplomacy Alexander L. George and Jane E. Holl May 1997 A Report to the Carnegie Commission on PREVENTING DEADLY CONFLICT Carnegie Corporation of New York Foreword The argument that nothing can be done to prevent genocide or other forms of mass violence is increasingly unconvincing. Genocide on the scale of Bosnia or Rwanda can be anticipated and prevented. Early warning is a prerequisite both for any prudent decision to act and for effective action itself. In this concise essay, Alexander George and Jane Holl argue that leaders need the kind of warning that will induce them to act preventively, not simply warning that a bad situation is getting worse. Leaders tend to put off hard decisions as long as they can, and this has often resulted in delay or paralysis in dealing with developing crises. To prevent violent conflicts, leaders must overcome this initial policy paralysis. The events that could trigger widespread violence are usually different from the events that trigger a preventive response from outside parties. It would not, for example, have been possible to give an unambiguous, precise warning that a plane crash in Central Africa would precipitate the slaughter of nearly one million people. But many earlier indications of the possibility of genocide in Rwanda in 1994 were ignored, and no preventive plan of action was in place. As George and Holl point out, outside parties must become more receptive to warning. Early warning will not ensure successful preventive action unless there is a fundamental change of attitude by governments and international organizations.
    [Show full text]
  • Everything You Want to Know About Warnings in Less Than 2 Hours Eric
    Everything You Want To Know About Warnings In Less Than 2 Hours Eric W. Junginger Hanson Bridgett LLP 425 Market Street, 26th Floor San Francisco, CA 94105 415-995-5027 [email protected] Cal R. Burnton Steptoe & Johnson LLP 115 South LaSalle Street Suite 3100 Chicago, IL 60603 312-577-1246 [email protected] Geoffrey Peckham CEO, Clarion Safety Systems LLC 190 Old Milford Rd. Milford, PA 18337 877-748-0244 [email protected] 1 Eric Junginger is a Partner at Hanson Bridgett in San Francisco, and focuses on product liability, complex civil litigation, toxic tort cases, data breach and privacy law. He has represented a wide variety of product manufacturers and suppliers in litigation involving durable medical equipment, satellites, parachutes, asbestos, benzene, silica, air mattresses, running shoes, solar equipment, electrical motors, laboratory apparatuses, pharmaceuticals, construction equipment, consumer goods and sports equipment. He has responded to Consumer Product Safety Commission inquiries, has developed product warning language, and has worked in the legal department of the Oakland Raiders. Cal R. Burnton’s practice is in the field of complex toxic tort and product liability, earning a national reputation for his ability to manage and defend mass toxic tort and complex product liability cases with a special emphasis on high-risk matters involving novel legal, scientific, and environmental theories. He represents corporate clients in both federal and state courts in almost every state across the country. Mr. Burnton has presented seminars worldwide on product liability issues. Geoffrey Peckham, CEO of Clarion Safety Systems, chairs the ANSI Z535 Committee on Safety Signs and Colors (the committee responsible for the primary U.S.
    [Show full text]
  • Covenant and the Warnings of Hebrews: the Blessing and the Curse
    JETS 57/3 (2014) 537–53 COVENANT AND THE WARNINGS OF HEBREWS: THE BLESSING AND THE CURSE MATTHEW MCAFFEE* Anyone familiar with the literature on the warning passages from the book of Hebrews is well aware of the familiar arguments regularly put forth for and againSt the possibility that genuine believers actually apostatize. These exegetical paths are well trodden, and one would be rather presumptuous to Suggest that something new could be added to the fray this late in the game. As the title of this eSSay sug- gests, I am interested in the broader issue of covenant, particularly aS it relateS to two areas of concern: (1) the bleSSingS of covenant that memberS can be expected to receive; and (2) the curses of covenant that Stand as a warning to memberS against covenant unfaithfulness. In focusing on theSe two areaS, I am attempting to synthesize two exegetical threads I have explored elsewhere by zeroing in on their significance for the book of Hebrews, one being the covenant significance of the good word in the OT,1 the other being the high-handed Sin of NumberS 15.2 It iS my view that these two Strands of thought contribute significant insight for inter- preting the warning texts of Hebrews. I. THE COVENANT BLESSING: RECIPIENTS OF THE GOOD WORD IN HEBREWS 6:5 Hebrews 6:4–6 records one of the more familiar warning paSSageS from thiS exhortation (cf. 2:1–4; 3:6; 3:7–4:13; 10:26–39; 12:25–29) and emphasizes the fact that it is impossible for the said apostate to renew repentance.
    [Show full text]
  • The Valley of Fear
    The Valley Of Fear Arthur Conan Doyle This text is provided to you “as-is” without any warranty. No warranties of any kind, expressed or implied, are made to you as to the text or any medium it may be on, including but not limited to warranties of merchantablity or fitness for a particular purpose. This text was formatted from various free ASCII and HTML variants. See http://sherlock-holm.esfor an electronic form of this text and additional information about it. This text comes from the collection’s version 3.1. Table of contents Part I The Warning . 5 Sherlock Holmes Discourses . 8 The Tragedy of Birlstone. 12 Darkness . 16 The People Of the Drama . 21 A Dawning Light . 26 The Solution . 31 Part II TheMan.............................................................. 41 The Bodymaster . 44 Lodge 341, Vermissa . 51 The Valley of Fear . 58 The Darkest Hour . 63 Danger............................................................... 68 The Trapping of Birdy Edwards . 72 Epilogue. 76 1 PART I. The Tragedy of Birlstone CHAPTER I. The Warning am inclined to think—” said I. to guard myself. But in calling Moriarty a criminal “I should do so,” Sherlock Holmes you are uttering libel in the eyes of the law—and there lie the glory and the wonder of it! The greatest I remarked impatiently. schemer of all time, the organizer of every deviltry, I believe that I am one of the most the controlling brain of the underworld, a brain long-suffering of mortals; but I’ll admit that I was which might have made or marred the destiny of annoyed at the sardonic interruption.
    [Show full text]
  • Crying Wolf: an Empirical Study of SSL Warning Effectiveness
    Crying Wolf: An Empirical Study of SSL Warning Effectiveness Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor Carnegie Mellon University fsunshine, egelman, [email protected], [email protected], [email protected] Abstract signed by an unrecognized authority. These warn- ing messages sometimes indicate a man-in-the-middle Web users are shown an invalid certificate warning or DNS spoofing attack. However, much more fre- when their browser cannot validate the identity of quently users are actually connecting to a legitimate the websites they are visiting. While these warn- website with an erroneous or self-signed certificate. ings often appear in benign situations, they can also The warnings science literature suggests that warn- signal a man-in-the-middle attack. We conducted a ings should be used only as a last resort when it survey of over 400 Internet users to examine their is not possible to eliminate or guard against a haz- reactions to and understanding of current SSL warn- ard. When warnings are used, it is important that ings. We then designed two new warnings using warn- they communicate clearly about the risk and provide ings science principles and lessons learned from the straightforward instructions for avoiding the haz- survey. We evaluated warnings used in three pop- ard [19, 22]. In this paper we examine user reac- ular web browsers and our two warnings in a 100- tions to five different SSL warnings embodying three participant, between-subjects laboratory study. Our strategies: make it difficult for users to override the warnings performed significantly better than exist- warning, clearly explain the potential danger facing ing warnings, but far too many participants exhibited users, and ask a question users can answer.
    [Show full text]