go to center home page laboratories & new thinking click for Air University home page
home | AWC Gateway | Air University Library | military portal
other centers - strategy & technology | space | culture | pace | counterproliferation

National Labs & ResearchBack to Top

DARPA and DoD LabsBack to Top New ThinkingBack to Top
  • See also same section on Intelligence page

  • Aspects on Availability: A teleological adventure of information in the lifeworld, dissertation by Lieutenant Colonel G.S. Rauno Kuusisto, posted with the Helsinki University of Technology Library, the National Resource Library of Technology
    • Availability is a feature of information. Availability is frequently connected to information security. So it is now. But in this thesis, the viewpoint is slightly different form the usually understood context of information security. Here, availability is dealt with as a compulsory feature of the information, which is essential to make as optimal decisions as possible for making the future. Security is understood as a state, which will be reached by using information that is available. The approach to security in this thesis is broadly understood as “making security with available information”.
    • The overall frame of this thesis is based on European philosophy represented by Henri Bergson, Martin Heidegger, Karl Popper, Hans-Georg Gadamer and Jurgen Habermas. The philosophical approach is chosen to be able to deal with the rather broad and abstract wholeness of the overall problem.

    • Intellectual Capital and Time in Information Superiority - in a much shorter paper, he says many of the same things (big-picture-wise) including a simple explanation of the relations between memory, perception, insight, and intuition
    • Time in Information Operations - has interesting examination of the theory in direct application to warfare -- with the divisions of science of war, art of war, and operations
    • Situation Officer as a Decisive Enabler: Theoretical Framework to Analyse Information Flows and Action - description of the situation officer lends itself to generic description of info needs at the decision making level
    • Situation Officers in the Centre of Gravity of Information Flows - interesting examination (especially in the exercise) of the theory regarding availability of info to the decision makers in a control center [such as an AOC]

  • Latent Semantic Analysis (LSA) (Local Copy), discussed on page 6 of News & Views, Sandia Labs, Jan 2005
    • We believe there is potential to apply techniques such as LSA to identify, early on, ideas which appear to be “transformational.” These are ideas which, because of their emergent nature, are not yet on the “radar screens” of intelligence analysts, but are rapidly gaining a following.

  • Marketing: An Overlooked Aspect of Information Operations (local copy), by Trent and Doty, in Military Review, Jul-Aug 2005
    • "Defeating enemy formations on the field of battle is merely the first, and often the easiest, phase of a military operation. Ultimate success (accomplishing the political goals of the National Command Authority) hinges on a successful post-high-intensity conflict occupation in which the population comes to accept the new state of affairs. In all phases, understanding and influencing the people is critical to reducing the cost of victory in terms of lives, dollars, and time."

  • Fighting Terrorism and Insurgency: Shaping the Information Environment (local copy), by Emery et al, in Military Review, Jan-Feb 2005

  • Information Operations in Iraq (local copy), by Emery, in Military Review, May-Jun 2004

  • Shaping the Information Environment (local copy), by Tolle, in Military Review, May-June 2002

  • Network-Centric Warfare and Complex Humanitarian Emergencies, Meet Napster!, by W. Scott Gureck, publisher of All Hands, shows "how a Napster-like software application developed, and then freely distributed, by the Department of Defense (DoD), would allow any member of any Humanitarian Relief Organization (HRO) who possesses a personal computer and access to the Internet, to become a node on the Joint Force Commander's (JFC) shared information grid"
    Main Paper (62 Kb .doc file) and Appendix explaining how Napster works (145 Kb .doc file)

  • SETI@home, search for extraterrestrial intelligence, using millions of computers through a screensaver which analyzes astronomical data
  • Nug30 solved using parallel computers

  • The Mind Has No Firewall, by Thomas, in Parameters, Spring 1998
    • Defending friendly and targeting adversary data-processing capabilities of the body appears to be an area of weakness in the US approach to information warfare theory, a theory oriented heavily toward systems data-processing and designed to attain information dominance on the battlefield. Or so it would appear from information in the open, unclassified press. This US shortcoming may be a serious one, since the capabilities to alter the data- processing systems of the body already exist.


privacy and security notice and web maintainer
page updated/reviewed 24 July 2010
Accessibility/Section 508