Information Warfare: If We Own Your Data We Own Your Ass

Archives

July 30, 2013: For the military the Internet (and networks in general) and computers (especially the smart phone) have changed everything, especially how troops operate in combat. The military is still scrambling to make the most of these new and, for most, unexpected technologies. Less unexpected was the growing number of databases and software able to quickly find patterns that are otherwise undetectable and indecipherable. That sort of thing had been developing for over a century (since the invention of the punch card and mechanical tabulating devices, a technology that lasted into the 1980s). But suddenly you not only had unimaginable amounts of data but you had it anytime, anywhere. In theory this should have been a tremendous advantage for those who had it. But it did not work out that way immediately. It took a few years for the troops to get everything working together. Now it’s taken for granted that data, captured anywhere, can be quickly processed (scanned, translated, and analyzed for useful patterns) and return (sometimes in hours or less) useful leads.

It was largely luck that much of this database and networking magic showed up about the same time as September 11, 2001. As expected in a new war there quickly developed unexpected new way of fighting using the unexpected new technologies. Under the pressure of combat (which tends to dispense with all the usual peacetime delays and “we can’t do that” attitudes) solutions were quickly found that made the most of the new tools.

The best solutions were often the result of borrowing from commercial or government operations that were already using the new tech successfully. Thus the military was soon in touch with those that had already developed solutions to using the database/network/analytic software opportunities successfully. This connection was frequently made because of reservists (who were already users of these new tools) called up to serve in Iraq and Afghanistan. One of the most useful of these experienced users were the detectives, policemen, and other law enforcement specialists who found themselves under fire in Iraq or Afghanistan and wishing they had some of their new database tools from their civilian job. It wasn’t long before the army and marines had the new law enforcement tech and it changed warfare, and especially irregular warfare, forever.

The big innovation was the tremendous increase in the use of biometric (fingerprints, iris, facial recognition) identification. Before long the U.S. had developed tools that enabled combat troops to use biometrics on the battlefield. The main tool was called SEEK (Secure Electronic Enrolment Kit). This is a portable electronic toolkit that collects biometrics from people anywhere and at any time. This included fingerprint scans, eye (iris) scans, and digital photos of suspects. All this eventually ends up in a master database, which soon contained data on millions of terrorists, suspected terrorists, their supporters, and other "persons of interest." Troops in the field can carry part of that database with them in their SEEK kits, so that wanted people can quickly be identified and captured. This is what the American commandos did on the 2011, Osama bin Laden raid. While DNA tests (which take hours to perform, on not-so-portable equipment) are the best form of ID, if you have fingerprints, iris scans, and a photo you are nearly as certain. Even just fingerprints and the face scan/photo is pretty convincing.

In Afghanistan the government used SEEK kits to collect data on nearly two million Afghans, so these people could be issued very secure (hard to fake) ID cards. For the government, this makes it more difficult for criminals, Taliban, and Islamic radicals in general to infiltrate the government or just operate freely. The U.S. has long been collecting biometrics from those they arrest, or otherwise encounter and want to positively identify. This data makes it easier to figure out who is naughty and who is not.

All this began during the war in Iraq. At the same time the Department of Defense adopted many practices that major police departments had long employed to track down criminals. Troops in Iraq, especially reservists who were police, noted that the war in Iraq was mostly police work (seeking individual terrorists among a large population of innocent civilians). One of the more useful techniques for this is biometrics. That is, every time the troops encounter a "person of interest," they don't just take their name and address, they also use SEEK to collect the biometric data. The fingerprints are particularly useful because when they are stored electronically you can search and find out immediately if the print you have just lifted from somewhere else, like off the fragment of a car bomb, is in there or not. The digital photos, from several angles, are also useful because these pictures are run through software that creates a numeric "ID" that can be used by security cameras to look for someone specific, or for finding someone from a witness description. Other nations are digitizing their mug shots, and this enables these people to be quickly checked against those in the American database.

For decades the U.S. military has regularly collected huge amounts of information from accidents and combat encounters. So now it's no surprise that forensics teams examine each bombing (car or roadside) and combat scene, to see if they can get fingerprints. Often bomb makers are found this way because raids frequently encounter suspicious characters but no evidence that justifies an arrest.

It only takes about two minutes per subject to use SEEK to take the biometric data, so any suspicious characters are quickly added to the master database. Now, after several years of this, raiding parties know to grab any guy who seems to panic at the sight of the biometrics equipment coming out. The terrorists know that biometrics is bad news for them and they fear it.

Combat troops now get training on how to use the biometrics gear and everyone now accepts that this stuff is a powerful weapon in the war against terrorists. Adapting this expertise to creating very difficult-to-fake IDs is not a large leap but it's not one that will result in many press releases.

There’s always a downside and for espionage organizations the use of biometric information for identification documents, like passports and those used to access heavily guarded facilities, has become a major problem. The use of biometrics does its job very well keeping out spies, terrorists, and saboteurs. The downside is that it also limits the activities of your own spies. This has led to efforts by espionage agencies to get around this "problem." The espionage organizations will not comment on what, if any, solutions they have come up with. That is to be expected.

While biometrics is one success story for the sudden appearance of the data advantage, there were many areas where getting most out of data is still a work in progress. For example, military intelligence hoped that the networks and better data tools would make it easier to get new information from troops (just back or still in the middle of raids and patrols) to those who collect and analyze it and get the results of that analysis right back to the troops. Delays in doing this has always been a major problem because the analysis usually got back to the troops too late. Now, in theory, that should no longer be the case. But, all too often, it still is a problem. The chief obstacle is the troops and a lack of time, plus the distraction of being in a firefight or otherwise preoccupied with life-threatening situations. By trial and error solutions are being worked out. Meanwhile, the intel analysts at all levels (battalion up to the very top) have learned a lot of the BI (Business Intelligence) field, which has developed a lot of powerful research and marketing tools that have direct military application. This is all very geeky but the simple description is software that can quickly find patterns to huge quantities of data or activity. Thus the urgency with which troops grab enemy laptops or even large piles of paper records (even al Qaeda keeps lots of records). The troops know that quickly putting this stuff through a scanner, translation software, and analytics software will usually produce some new suspects to go after and often a current address as well.

The military (especially the army, which has collected, since Vietnam, massive amounts of information on how each soldier died) also has lots of valuable historical data to mine. For example, there are detailed records of soldier and marine casualties. The army, in particular, collects and analyzes this data, and then passes on to the troops’ new tactics and techniques derived from this analysis. The army restricts access to the data, as it can provide the enemy with useful information on how effective they are. Some basic data is made public, but the details will be locked up for a decade or more. Studying this data is a full time job for many people in the military, and there is a constant stream of suggestions resulting from this analysis, and those suggestions often turn into yet another small decline in combat deaths.

 

 


Article Archive

Information Warfare: Current 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 2000 1999 


X

ad
0
20

Help Keep Us Soaring

We need your help! Our subscription base has slowly been dwindling. We need your help in reversing that trend. We would like to add 20 new subscribers this month.

Each month we count on your subscriptions or contributions. You can support us in the following ways:

  1. Make sure you spread the word about us. Two ways to do that are to like us on Facebook and follow us on Twitter.
  2. Subscribe to our daily newsletter. We’ll send the news to your email box, and you don’t have to come to the site unless you want to read columns or see photos.
  3. You can contribute to the health of StrategyPage. A contribution is not a donation that you can deduct at tax time, but a form of crowdfunding. We store none of your information when you contribute..
Subscribe   Contribute   Close