Insight

Information Superiority

An essential aspect of Full Spectrum Dominance, our present military doctrine, is “information superiority.” This involves collecting and processing as much data as possible in order to achieve the best tactical advantage. Military strategy is adapting to the doctrine of preemption and the evolution of intelligence technologies intended to identify potential foreign and domestic security risks before they act. Data mining software is essential to this task.

Artificial Intelligence software has been designed that can penetrate and read nearly every database online, gather information about individuals, correlate all data gathered for key word association, and independently initiate searches on any related people. The software spits out red flags. And those red flags signify reasonable suspicion to investigate you further. The software can also initiate wire tapping, with speech recognition, once again for key word analysis. It can follow all your conversations, and determine whether of not your conversations represent a “potential threat”.

While the Justice Department has defensively reasserted on many occasions that this software is not being used, its revolutionary capacity in the hands of those we presently have no reason to trust offers sufficient cause for concern. Recent revelations about illegal wiretapping and surveillance by the FBI, give the public little reason to have faith that their rights are being adequately protected. The doctrine of “information superiority” may represent the greatest challenge to public privacy that this country has faced. The survival of our Constitution is at stake.


Evidence

  • “We must have information superiority: the capability to collect, process, and disseminate an uninterrupted flow of information while exploiting or denying an adversary’s ability to do the same. Information superiority will require both offensive and defensive information warfare.” 1

  • The so-called Revolution in Military Affairs (RMA) - centers on developing the improved information and command and control capabilities needed to significantly enhance joint operations. With the support of an advanced command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) common backbone, the United States will be able to respond rapidly to any conflict; warfighters will be able to dominate any situation; and day-to-day operations will be optimized with accurate, timely, and secure information.” 2

  • “Information technologies, in particular, are becoming more prevalent and significant components of modern military systems. These information technologies are having the same kind of transforming effects on military affairs as they are having in the larger world.” 3

  • “The battle space information system will be “born joint” and comprised of a set of interconnected communications and sensor grids, software applications and organizational structures that will provide: A redundant, seamless network of cross-Service and interagency links. Secure, and responsive information available to the right user when needed. Accurate and timely intelligence about enemy locations and activities. A comprehensive catalogue of, and access to, networked databases relating to the operations area and adversary capabilities. Accurate, real-time friendly locations and combat status. The capability for sustained split-based operations from force projection locations throughout the battlespace. Near real time processing of information to allow for a common “picture” of the battlespace. Built-in self-protection capabilities multilevel security access to allow interagency sharing of information, as well as selectively sharing with allies, NGOs and PVOs.” 4

  • “The Department will vigorously pursue the development and exploitation of technologies that can significantly increase U.S. advantage in intelligence collection, analysis, and security. Some of the most promising include: Low-observable technologies that may be applied to collection platforms. Nanotechnology that may result in miniature, mobile, autonomous sensors that could penetrate the secure and remote facilities of an adversary. Advanced parallel processing and quantum computing to provide real-time processes, decryption, translation, and transcription of communications. Biometrics for tracking adversaries and providing secure authentication of individuals seeking network or facility access; and Commercial imagery for remote sensing of the earth.” 5