Toward Operational Art in Special Warfare: Appendixes Ter’S Strategy, Doctrine, and Resources Program

Total Page:16

File Type:pdf, Size:1020Kb

Toward Operational Art in Special Warfare: Appendixes Ter’S Strategy, Doctrine, and Resources Program ARROYO CENTER Toward Operational Art in Special Warfare Appendixes Dan Madden, Dick Hoffmann, Michael Johnson, Fred T. Krawchuk, Bruce R. Nardulli, John E. Peters, Linda Robinson, Abby Doll Prepared for the United States Army Approved for public release; distribution unlimited For more information on this publication, visit www.rand.org/t/rr779 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2016 RAND Corporation R® is a registered trademark. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions.html. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface This report demonstrates the need for a strategic and operational approach to securing U.S. interests called special warfare. The United States requires new approaches for exerting influ- ence, filling the missing middle between the limitations of distant-strike options presented by armed unmanned aerial systems and Tomahawk missiles and the costly, indefinite commit- ment of conventional forces. Special warfare is an Army Special Operations Forces doctrinal term meaning the “execu- tion of activities that involve a combination of lethal and nonlethal actions taken by a specially trained and educated force that has a deep understanding of cultures and foreign language, proficiency in small-unit tactics, and the ability to build and fight alongside indigenous combat formations in a permissive, uncertain, or hostile environment.” It includes “special operations forces conducting combinations of unconventional warfare, foreign internal defense, and/or counterinsurgency through and with indigenous forces or personnel.”1 The report has four aims: (1) to adapt conventional operational art to the unique charac- teristics of special warfare, (2) to identify the strategic advantages and risks associated with spe- cial warfare, (3) to explore how special warfare campaigns could be used to address challenges identified in strategic guidance, and (4) to provide guidance to military and civilian leaders and planners in designing and executing these campaigns. This report, the second in a two-volume series, includes seven appendixes offering addi- tional context to supplement the discussions presented in Toward Operational Art in Special Warfare (available at www.rand.org/t/RR779). Appendix A provides a brief overview of the evolution of operational art. Appendix B summarizes the literature on developing consen- sus among groups or individuals with disparate goals and approaches and explains how this could be used in special warfare planning. Appendix C reviews the resources and authorities for special warfare. Appendix D provides additional details on our data set of special warfare campaigns conducted by the United States since World War II. Appendix E presents notional special warfare campaigns that could be used to train special warfare campaign planners and assist the U.S. Department of Defense in identifying capability requirements for special war- fare campaigns. Appendix F explores in greater depth the special operations activity “prepara- tion of the environment.” Finally, Appendix G offers a detailed discussion of the recommenda- tions presented in Chapter Six of the companion report. This research was sponsored by LTG Charles T. Cleveland, then commanding general of U.S. Army Special Operations Command, and conducted within the RAND Arroyo Cen- 1 Headquarters, U.S. Department of the Army, Special Operations, Army Doctrine Publication 3-05, Washington, D.C., August 2012, p. 9. iii iv Toward Operational Art in Special Warfare: Appendixes ter’s Strategy, Doctrine, and Resources Program. RAND Arroyo Center, part of the RAND Corporation, is a federally funded research and development center sponsored by the United States Army. The Project Unique Identification Code (PUIC) for the project that produced this docu- ment is RAN136470. Contents Preface ........................................................................................................... iii Figures and Tables .............................................................................................vii Acknowledgments ............................................................................................. ix Abbreviations ................................................................................................... xi APPENDIX A The Evolution of Operational Art and Insights for Special Warfare .................................. 1 APPENDIX B Collaborative Planning for Unified Action ...............................................................11 Purpose ...........................................................................................................12 People .............................................................................................................13 Place ..............................................................................................................16 Process ............................................................................................................17 APPENDIX C Resources and Authorities for Special Warfare ..........................................................19 Requests for Forces and Force Management ................................................................ 20 General DoD Funding ........................................................................................ 22 Debates over Resources and Authorities ..................................................................... 23 FID-Related Authorities ........................................................................................25 Unconventional Warfare–Related Authorities .............................................................. 28 Covert- and Clandestine-Related Authorities ............................................................... 28 Conclusion .......................................................................................................32 APPENDIX D Universe of U.S. Special Warfare Operations ............................................................33 APPENDIX E Notional Special Warfare Campaigns for Strategic Challenges ......................................37 Project Power Despite Anti-Access/Area-Denial Challenges ...............................................39 Combat Weapons of Mass Destruction ......................................................................41 Provide a Stabilizing Presence .................................................................................45 Conduct Humanitarian, Disaster Relief, and Other Operations ..........................................49 v vi Toward Operational Art in Special Warfare: Appendixes APPENDIX F Preparation of the Environment ............................................................................51 Improving PE Employment ................................................................................... 54 Improving PE Capabilities .................................................................................... 56 APPENDIX G Discussion of Study Recommendations ...................................................................59 Strengthen Special Warfare Planning Capabilities ..........................................................59 Create a Special Warfare Planning Culture ..................................................................61 Institutionalize Unified Action ................................................................................63 Develop Capabilities to Prevail in the Human Domain ...................................................65 Adjust for the Future Operating Environment ..............................................................67 References .......................................................................................................69 Figures and Tables Figures A.1. Anaconda Operational Design in Iraq ........................................................... 4 D.1. Special Warfare Outcomes Since World War II............................................... 34 D.2. U.S. Special Warfare Operations Since World War II ........................................35 E.1. Notional Special Warfare Campaign Types and Defense Strategic Guidance ............ 38 G.1. Framework for Raising Special Warfare to the Operational Level ...........................59 Tables B.1. Stakeholder Characteristics and Collaboration Efforts ........................................12 D.1. Average Duration of Special Warfare Campaigns ............................................ 34 vii Acknowledgments We thank LTG Charles T. Cleveland, then commanding general of U.S. Army Special
Recommended publications
  • Foreign Interference with Democratic Institutions
    The Center for Ethics and the Rule of Law (CERL) at the University of Pennsylvania presents: FOREIGN INTERFERENCE WITH DEMOCRATIC INSTITUTIONS Featuring the 2017 Distinguished Haaga Lecture APRIL 18, 2017 Golkin 100, Fitts Auditorium | Penn Law CO-SPONSORED BY: CONFERENCE SCHEDULE TUESDAY, APRIL 18 | FITTS AUDITORIUM Ms. Carrie Cordero, Private practitioner and cybersecurity 1:00 – 2:30 PM expert; former Director of National Security Studies, PANEL 1: RUSSIAN CYBERHACKING Georgetown University Law Center AS AN ACT OF WAR? Mr. Luke Harding, Foreign Correspondent and former Moscow Bureau Chief, The Guardian Moderator: Prof. William Burke-White, Richard Perry Professor of Law and Director, Perry World House, University Dr. Timothy P. Murphy, President, Thomson Reuters Special of Pennsylvania Services; former FBI Deputy Director Col. Gary Corn, Staff Judge Advocate, US Cyber Command This program has been approved for 3.0 ethics CLE credits for Daniel (DJ) Rosenthal, Associate Managing Director, Kroll; Pennsylvania lawyers. CLE credit may be available in other former NSC Director for Counterterrorism and Senior Counsel jurisdictions as well. Attendees seeking CLE credit should at the ODNI and DOJ bring separate payment in the amount of $100.00 ($50.00 public interest/non-profit attorneys) cash or check made payable to Dr. Fred Kagan, Resident Scholar and Director, Critical Threats The Trustees of the University of Pennsylvania. Project, American Enterprise Institute Sean Kanuck, Center for International Security and Cooperation, Stanford University; former U.S. National 4:30 – 6:00 PM Intelligence Officer for Cyber Issues from 2011-2016 The 2017 Distinguished Haaga Lecture: Mr. David Sanger, Chief Washington Correspondent, The New York Times RUSSIAN MEDDLING IN THE 2016 PRESIDENTIAL ELECTION: IMPLICATIONS FOR THE RULE OF LAW 2:30 – 2:45 PM Speaker: General Michael Hayden BREAK Moderator: Prof.
    [Show full text]
  • Legislative Assembly
    15640 LEGISLATIVE ASSEMBLY Wednesday 3 June 2009 __________ The Speaker (The Hon. George Richard Torbay) took the chair at 10.00 a.m. The Speaker read the Prayer and acknowledgement of country. BUSINESS OF THE HOUSE Notices of Motions General Business Notices of Motions (General Notices) given. NSW LOTTERIES (AUTHORISED TRANSACTION) BILL 2009 Bill introduced on motion by Mr Kevin Greene, on behalf of Mr Joseph Tripodi. Agreement in Principle Mr KEVIN GREENE (Oatley—Minister for Gaming and Racing, and Minister for Sport and Recreation) [10.05 a.m.]: I move: That this bill be now agreed to in principle. In summary, the NSW Lotteries (Authorised Transaction) Bill has two main functions. The first is to authorise the transfer of NSW Lotteries to a new private operator, while at the same time retaining Government ownership of intellectual property presently owned by the business, including games and brands. The second function of the bill is to enable amendments to the regulatory regime to ensure that public lotteries continue to be operated in a manner that protects community interests and provides harm minimisation measures. The bill will allow taxpayer resources currently locked up in NSW Lotteries to be redirected to community priorities such as health, education and roads. The bill will ensure that net proceeds from this transaction will be transferred directly to the Consolidated Fund, to support the Government's ongoing commitment to important social infrastructure. It is important to note that the Government will continue to receive duties on the sale of lottery products. In the last financial year these levies were more than $300 million, which were allocated to core social infrastructure and front-line services.
    [Show full text]
  • UNITED STATES DISTRICT COURT NORTHERN DISTRICT of INDIANA SOUTH BEND DIVISION in Re FEDEX GROUND PACKAGE SYSTEM, INC., EMPLOYMEN
    USDC IN/ND case 3:05-md-00527-RLM-MGG document 3279 filed 03/22/19 page 1 of 354 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF INDIANA SOUTH BEND DIVISION ) Case No. 3:05-MD-527 RLM In re FEDEX GROUND PACKAGE ) (MDL 1700) SYSTEM, INC., EMPLOYMENT ) PRACTICES LITIGATION ) ) ) THIS DOCUMENT RELATES TO: ) ) Carlene Craig, et. al. v. FedEx Case No. 3:05-cv-530 RLM ) Ground Package Systems, Inc., ) ) PROPOSED FINAL APPROVAL ORDER This matter came before the Court for hearing on March 11, 2019, to consider final approval of the proposed ERISA Class Action Settlement reached by and between Plaintiffs Leo Rittenhouse, Jeff Bramlage, Lawrence Liable, Kent Whistler, Mike Moore, Keith Berry, Matthew Cook, Heidi Law, Sylvia O’Brien, Neal Bergkamp, and Dominic Lupo1 (collectively, “the Named Plaintiffs”), on behalf of themselves and the Certified Class, and Defendant FedEx Ground Package System, Inc. (“FXG”) (collectively, “the Parties”), the terms of which Settlement are set forth in the Class Action Settlement Agreement (the “Settlement Agreement”) attached as Exhibit A to the Joint Declaration of Co-Lead Counsel in support of Preliminary Approval of the Kansas Class Action 1 Carlene Craig withdrew as a Named Plaintiff on November 29, 2006. See MDL Doc. No. 409. Named Plaintiffs Ronald Perry and Alan Pacheco are not movants for final approval and filed an objection [MDL Doc. Nos. 3251/3261]. USDC IN/ND case 3:05-md-00527-RLM-MGG document 3279 filed 03/22/19 page 2 of 354 Settlement [MDL Doc. No. 3154-1]. Also before the Court is ERISA Plaintiffs’ Unopposed Motion for Attorney’s Fees and for Payment of Service Awards to the Named Plaintiffs, filed with the Court on October 19, 2018 [MDL Doc.
    [Show full text]
  • Whole Day Download the Hansard Record of the Entire Day in PDF Format. PDF File, 1
    Wednesday Volume 662 19 June 2019 No. 316 HOUSE OF COMMONS OFFICIAL REPORT PARLIAMENTARY DEBATES (HANSARD) Wednesday 19 June 2019 © Parliamentary Copyright House of Commons 2019 This publication may be reproduced under the terms of the Open Parliament licence, which is published at www.parliament.uk/site-information/copyright/. 219 19 JUNE 2019 220 Drew Hendry: According to every piece of the Secretary House of Commons of State’s own Government’s analysis, there is no version of Brexit that fails to harm Scotland. New YouGov Wednesday 19 June 2019 polling shows that Tory members would prefer Scotland to be an independent country, rather than stopping Brexit. Which choice should the Scottish Secretary make: The House met at half-past Eleven o’clock a devastating no-deal Brexit Britain, or giving the people of Scotland the choice to be an independent European nation? PRAYERS David Mundell: Mr Speaker, it will not surprise you to hear me say that Scotland has already made its [MR SPEAKER in the Chair] choice on whether to be independent or part of the United Kingdom. The poll to which the hon. Gentleman referred was based on a false premise. This Government are about delivering Brexit and keeping Scotland at the Oral Answers to Questions heart of the United Kingdom. John Lamont (Berwickshire, Roxburgh and Selkirk) (Con): Will the Secretary of State tell us how much SCOTLAND money the Scottish Government have given to local authorities in Scotland to prepare for our exit from the The Secretary of State was asked— European Union? Leaving the EU David Mundell: As far as I understand it, the UK Government have made more than £100 million available to the Scottish Government to help to prepare for 1.
    [Show full text]
  • Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities
    University of Central Florida STARS HIM 1990-2015 2013 Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities Mark Berrios-Ayala University of Central Florida Part of the Legal Studies Commons Find similar works at: https://stars.library.ucf.edu/honorstheses1990-2015 University of Central Florida Libraries http://library.ucf.edu This Open Access is brought to you for free and open access by STARS. It has been accepted for inclusion in HIM 1990-2015 by an authorized administrator of STARS. For more information, please contact [email protected]. Recommended Citation Berrios-Ayala, Mark, "Brave New World Reloaded: Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities" (2013). HIM 1990-2015. 1519. https://stars.library.ucf.edu/honorstheses1990-2015/1519 BRAVE NEW WORLD RELOADED: ADVOCATING FOR BASIC CONSTITUTIONAL SEARCH PROTECTIONS TO APPLY TO CELL PHONES FROM EAVESDROPPING AND TRACKING BY THE GOVERNMENT AND CORPORATE ENTITIES by MARK KENNETH BERRIOS-AYALA A thesis submitted in partial fulfillment of the requirements for the Honors in the Major Program in Legal Studies in the College of Health and Public Affairs and in The Burnett Honors College at the University of Central Florida Orlando, Florida Fall Term 2013 Thesis Chair: Dr. Abby Milon ABSTRACT Imagine a world where someone’s personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter.
    [Show full text]
  • GTMO by the Numbers Fact Sheet
    FACT SHEET: July 1, 2020 National Security Figures Oppose Commemorating Confederacy on Military Facilities Support Among Former National Security Officials and Retired Military Leaders for Renaming Army Bases Named After Confederate Soldiers Former Defense Secretary, Robert Gates: “It [is] time to rid the American military of symbols that represent ‘the dark side of our history’” General (Ret.) and Former CIA Director, David Petraeus: “The irony of training at bases named for those who took up arms against the United States, and for the right to enslave others, is inescapable to anyone paying attention. Now, belatedly, is the moment for us to pay such attention.” Air Force General (Ret.) and Former CIA and NSA Director, Michael Hayden: “[It’s] a great idea [to rename bases with Confederate names]” Former Special Presidential Envoy for the Global Coalition to Defeat ISIS, Special Assistant to the President, and Deputy Assistant Secretary of State, Brett McGurk: “Thoughtful reflections coming from currently serving and retired Generals and Admirals [on the need to replace the names of Army bases and remove Confederate symbols]” Former Secretary of the Army, Director of the White House Military Office, and Retired Army Officer Louis Caldera, and Former Ambassador and Retired Decorated Army Officer Charles Ray: “Intentionally or unintentionally, the current name continues to celebrate a cause and set of beliefs that dishonor the sacrifices of all soldiers, regardless of ethnicity who train at this installation.” Former Ambassador and Retired Sergeant Major of the Marine Corps, John Estrada: “[The Confederate flag] represents bondage. It represents people who embrace that” Former Secretary of State Counselor, Eliot Cohen: “[…] Their cause was that of chattel slavery.
    [Show full text]
  • With His Public Intervention Overexposed, Artist Paolo Cirio Disseminates Unauthorized Pictures of High-Ranking U.S
    With his public intervention Overexposed, artist Paolo Cirio disseminates unauthorized pictures of high-ranking U.S. intelligence officials throughout major cities. Cirio obtained snapshots of NSA, CIA, and FBI officers through social media hacks. Then, using his HD Stencils graffiti technique, he spray-paints high-resolution reproductions of the misappropriated photos onto public walls. New modes of circulation, appropriation, contextualization, and technical reproduction of images are integrated into this artwork. The project considers the aftermath of Edward Snowden’s revelations and targets some of the officials responsible for programs of mass surveillance or for misleading the public about them. The dissemination of their candid portraits as graffiti on public walls is a modern commentary on public accountability at a time of greater demand for transparency with regard to the over- classified apparatuses of surveillance that are threatening civil rights worldwide. The officials targeted in the Overexposed series are Keith Alexander (NSA), John Brennan (CIA), Michael Hayden (NSA), Michael Rogers (NSA), James Comey (FBI), James Clapper (NSA), David Petraeus (CIA), Caitlin Hayden (NSC), and Avril Haines (NSA). In this exhibition, NOME presents the nine subjects of the Overexposed series painted on canvas and photographic paper. As a form of creative espionage, and utilizing common search engines, social engineering, as well as hacks on social media, Cirio tracked down photographs and selfies of government officials taken in informal situations. All of the photos were taken by individuals external to the intelligence agencies, by civilians or lower ranking officers. Dolziger st. 31 10247 Berlin | Tuesday - Saturday 2 PM - 6 PM Indeed, the omnipresence of cameras and the constant upload of data onto social media greatly facilitate the covert gathering of intelligence that can potentially be used in a work of art.
    [Show full text]
  • Psychological Disorders Among Babylon Refugees at ISIS Era
    Annals of R.S.C.B., ISSN:1583-6258, Vol. 25, Issue 3, 2021, Pages. 6884 - 6893 Received 16 February 2021; Accepted 08 March 2021. Psychological Disorders among Babylon Refugees at ISIS Era *Lecturer/Burhan Hadi , **Pro. Kafi Mohammad Nasir Al Asadi , ***Asst. Lect. Hussein kadhim Hussein,**** Lecturer Dr. Ali Faris Abdul Hussein * Master in Mental health Nursing in Nursing Department / Altoosi University College Email: [email protected] ** Ph.D. Community Health Nursing in Nursing Department, Altoosi University College E-mail: [email protected] *** Master in Adult Nursing in College of Nursing/University of Warith Al-Anbiyaa E-mail: [email protected] **** Ph.D. Community Health Nursing in Nursing Department, Altoosi University College E-mail: [email protected] Abstract A displaced and emigration by the refugees is a big problem in the world, especially in Iraq because the continuous wars. The most Iraqi people become refugees or displaced to other governors. The study aims to Psychological Disorders among Babylon Refugees at ISIS Era and determine the relationship between symptoms of them with the demographic characteristic’s refugees. A descriptive-analytic study was conducted with refugees who residence in Babylon from different Iraqi governorates. A purposive (Non-probability) sample of (100) refugees. The study results revealed highly anxiety and depression symptoms among refugees about (53% & 72% respected) and there is a significant relationship between psychological symptoms to depression and anxiety with age and gender of refugees. The study concluded most of the immigrants are having severe symptoms of psychological problems and increased may due to the shortage in the needs of life and income and changes in social life so, the study recommended for early detection about psychological problems and support them.
    [Show full text]
  • Kurdistan's Attempted Secession from Iraq: Major Powers' Responses And
    Kurdistan’s Attempted Secession from Iraq Kurdistan’s Attempted Secession from Iraq: Major Powers’ Responses and Regional Implications Khurram Abbas* Abstract Through legal and political means, the Kurdish referendum has created a de facto state in the north of Iraq. This development will have short and long-term impacts on security of the Middle East in general, and Iraq in particular. The paper explores various dimensions of the secession attempt by the Kurdistan Regional Government. It concludes that the independence of Kurds from Iraq is likely to destabilise the Middle East; and encourage other ethnic communities to attempt secession. On the other hand, various extra-regional actors may also try to capitalise on the vacuum to advance their interests in the region. Keywords: Secessionism, Middle East, Ethnic Divisions, Iraq, Kurds. Introduction he political, security and geostrategic circumstances of the Middle East are changing rapidly. In the past few years, the world has T witnessed several developments in the region, including brewing Saudi-Iran rivalry, the Syrian civil war, dawn and demise of democracy in Egypt, Saudi-led intervention in Yemen, rise and fall of the Islamic State (IS), Saudi-led military alliance, Saudi-Qatar diplomatic crisis, and the 2017 Kurdish vote for independence by the Kurdistan Regional * Mr Khurram Abbas is Research Officer at the Islamabad Policy Research Institute, Pakistan. __________________________________ @ 2019 by the Islamabad Policy Research Institute. JoCA Vol. 3 (2): 59-81. Journal of Current Affairs 59 Khurram Abbas Government (KRG). Kurdistan’s secessionist attempt will have a profound multidimensional impact on the national security of Iraq, the Middle East and beyond.
    [Show full text]
  • Mara Salvatrucha: the Most Dangerous Gang in America
    Mara Salvatrucha: The Deadliest Street Gang in America Albert DeAmicis July 31, 2017 Independent Study LaRoche College Mara Salvatrucha: The Deadliest Street Gang in America Abstract The following paper will address the most violent gang in America: Mara Salvatrucha or MS-13. The paper will trace the gang’s inception and its development exponentially into this country. MS-13’s violence has increased ten-fold due to certain policies and laws during the Obama administration, as in areas such as Long Island, New York. Also Suffolk County which encompasses Brentwood and Central Islip and other areas in New York. Violence in these communities have really raised the awareness by the Trump administration who has declared war on MS-13. The Department of Justice under the Trump administration has lent their full support to Immigration Custom Enforcement (ICE) to deport these MS-13 gang members back to their home countries such as El Salvador who has been making contingency plans to accept this large influx of deportations of MS-13 from the United States. It has been determined by Garcia of Insight.com that MS-13 has entered into an alliance with the security threat group, the Mexican Mafia or La Eme, a notorious prison gang inside the California Department of Corrections and Rehabilitation. The Mexican Drug Trafficking Organization [Knights Templar] peddles their drugs throughout a large MS-13 national network across the country. This MS-13 street gang is also attempting to move away from a loosely run clique or clikas into a more structured organization. They are currently attempting to organize the hierarchy by combining both west and east coast MS-13 gangs.
    [Show full text]
  • General Michael Hayden on the War on Terror (12/6/17)
    General Michael Hayden on the War on Terror (12/6/17) 00:00:20 Alice M. Greenwald: Good evening. My name is Alice Greenwald. I'm president and C.E.O. of the 9/11 Memorial & Museum, and it is my privilege to welcome you here this evening. As always, we are so pleased to see our museum members in the audience and to extend this welcome to those tuning in to our live web broadcast at 911memorial.org/live. I also want to welcome our trustee board member Andy Senchak, who is also co-chair of our education committee, the oversight committee for the kinds of public programs you are going to experience this evening. 00:01:02 To say we live in precarious times is an understatement. This memorial and museum stand in witness and in testament to one of the most profound ruptures in national and global security in the history of our country. The threats to our safety and societal foundations seem to proliferate daily. As we confront the unthinkable specter of nuclear aggression, an erosion of confidence in verifiable facts, vulnerability to external interference in our elections, and the reality that despite the truly heroic efforts of our law enforcement and intelligence agencies, we are still not immune from terror striking the homeland. 00:01:49 Just five weeks ago, only blocks from where are you now sitting, our neighborhood and our city were once again rocked by unimaginable violence. On that beautiful fall afternoon, we were reminded again of the fragility of life and how, in the blink of an eye, innocent lives can be taken in an unconscionable act of indiscriminate murder.
    [Show full text]
  • GPN14 · 2014/06/21 · Christian Staudt What We Asked for the Machine-Readable State
    Towards the Machine-Readable Society GPN14 · 2014/06/21 · Christian Staudt What we asked for The Machine-Readable State At their computer congress, the CCC also demanded the ‚machine-readable government‘ […] „An example would be free access to all environmental and radiation data over Bildschirmtext (BTX), so that any citizen is able to check the kind of dirt that fills the air around him“. — Die Tageszeitung,1987 • data collected by the government should be published under a free license and in an open, computer-readable format! • make state action transparent and controllable for citizens with computer access What we got … But don’t worry It’s just so-called metadata „[…] nobody is listening to your telephone calls. […] what the intelligence community is doing is looking at phone numbers and durations of calls. They are not looking at people’s names, and they’re not looking at content. But by sifting through this so-called metadata, they may identify potential leads with respect to folks who might engage in terrorism.“ ! — Barack Obama But don’t worry It’s just so-called metadata „[…] nobody is listening to your telephone calls. […] what the intelligence community is doing is looking at phone numbers and durations of calls. They are not looking at people’s names, and they’re not looking at content. But by sifting through this so-called metadata, they may identify potential leads with respect to folks who might engage in terrorism.“ ! — Barack Obama ➦ 30C3 EFF Talk: youtu.be/0Fuxb9WXloI Just Metadata Swiss Data Retention Visualized ➦ OpenDataCity
    [Show full text]