ࡱ > J L I q` b/ bjbjqPqP .@ : : ' E 2 v v v 8 , 2 h $ h \ n 1 1 F H H H v H H H : , / / v | \ 0 R t v / / H l 1 1 ^ 2 2 2 D v 2 2 2 v 2 2 2 Information Zone Who do you want to talk to today? Introduction: In order to win the Global War on Terrorism (GWOT), the Maritime Force will be required to interact, understand, and build trust with other militaries, local populations, governments, and Non-Government Organizations (NGOs) on an unprecedented level. In order to facilitate this cooperative environment, the Maritime Force must be present and communicate with all groups involved in the GWOT struggle. Concept purpose: The Information Zone is a concept that seeks to break down the boundaries of communication between the military, civilian organizations, and local populations. The Information Zone is not a thing, but a cultural attribute of the Maritime Forces. Through the free sharing of information and access to that information, the Information Zone will enable timely, effective operations in support of both GWOT and MCO missions. In addition, the Information Zone seeks to defeat the underlying structure that supports terrorism by integrating all regions of the globe into a global communications community. Time horizon, assumptions and risks: Information Zone is a concept that could be initiated today and realized fully within 1015 years. It is assumed that the need to communicate is a basic human need, paving the way for meaningful exchanges which expand a societys view of the world and provide opportunity for growth in many areas. It is assumed that providing opportunities for economic, intellectual, and political growth and discourse will undermine the fundamental conditions that foster terrorists and their ideologies. It is also assumed that greater knowledge of activity in and around the world will enhance US maritime forces ability to achieve strategic, operational and tactical advantage over an enemy be it an asymmetric threat, a rogue state or a true peer competitor. A risk assumed with the Information Zone is that US money will be spent on a system which may not realize measurable returns (although returns will exist). An additional risk could be an increased potential for misinformation or misinterpreted data. The military problem: There are two military problems addressed by the Information Zone. First, finding terrorists and their organizations can be very difficult due to their amorphous nature. The Information Zone can assist in solving this problem by enabling communications between groups of people who might not otherwise be able to communicate with each other. This newfound communication will increase the future Maritime Forces ability to find terrorists. Second, the US military does not have the necessary insight into global, regional, and local trends and data in order to respond to situations which may foster terrorists or support of their ideologies. In monitoring activity through the Information Zone, future forces may be able to gain insight into areas that were previously inaccessible or not culturally acceptable. Synopsis and central idea: The Information Zone becomes a facet of life once introduced. Through the spread of communications and networking opportunities, this network of communities, governments, militaries, non-government organizations, and interested individuals provides opportunities for communications that may otherwise never have existed. In essence, the Information Zone provides instant, unmoderated global access to the worlds repositories of information. Application and integration of military functions: Maritime Forces would have to impart the tenets of the Information Zone upon governments, organizations, and populations whenever contact occurs. Imparting the tenets of the Information Zone includes equipping and training the local population to use the newfound connectivity and information sharing environment in a way that aligns with their particular culture. For example, an aboriginal tribe would likely be less interested in using the Information Zone for E-commerce than for weather reports. Likewise, the technological methods for enabling both of these applications would vary based on the end user and political climate. Once introduced into an area, an Information Zone would provide opportunities for gathering intelligence, monitoring local activity, interacting with the local population and other groups working in the area, and would enable economic and intellectual growth on an individual and societal scale. Some examples of an Information Zone could be: Setting up cell phone towers and distributing cell phones in country for use by the general population Providing wireless Internet connectivity and laptops to the general population Sponsoring town meetings to provide an open forum for discussion and debate Standing up a local newspaper Dispersing pamphlets describing the efforts and goals of Maritime Forces in the area Freely sharing information with groups ranging from NGOs to interested individuals. Necessary capabilities required to achieve concept: Access: In order to provide local populations with the connectivity described in the Information Zone concept, Maritime Forces would require access to those areas. Physical: Maritime Forces may require physical assets to augment introduction of the Information Zone in some areas, such as electronics or printed materials. Summary: The Information Zone enables both pre and post tipping point action on the fronts of government/NGO/civilian communication, intelligence gathering, social forecasting, etc. In addition, the Information Zone impacts the longer term goal of undermining the underlying conditions which enable terrorism. Supplemental Information: Note: in the spirit of the Information Zone, the term Information Zone may be substituted for the word Internet below for illustrative purposes. International Summit on Democracy, Security and Terrorism in Madrid The Infrastructure of Democracy Strengthening the Open Internet for a Safer World March 11, 2005 I. The Internet is a foundation of democratic society in the 21st century, because the core values of the Internet and democracy are so closely aligned. 1. The Internet is fundamentally about openness, participation, and freedom of expression for all - increasing the diversity and reach of information and ideas. 2. The Internet allows people to communicate and collaborate across borders and belief systems. 3. The Internet unites families and cultures in diaspora; it connects people, helping them to form civil societies. 4. The Internet can foster economic development by connecting people to information and markets. 5. The Internet introduces new ideas and views to those who may be isolated and prone to political violence. 6. The Internet is neither above nor below the law. The same legal principles that apply in the physical world also apply to human activities conducted over the Internet. II. Decentralized systems - the power of many - can combat decentralized foes. 1. Terrorist networks are highly decentralized and distributed. A centralized effort by itself cannot effectively fight terrorism. 2. Terrorism is everyone's issue. The internet connects everyone. A connected citizenry is the best defense against terrorist propaganda. 3. As we saw in the aftermath of the March 11 bombing, response was spontaneous and rapid because the citizens were able to use the Internet to organize themselves. 4. As we are seeing in the distributed world of weblogs and other kinds of citizen media, truth emerges best in open conversation among people with divergent views. III. The best response to abuses of openness is more openness. 1. Open, transparent environments are more secure and more stable than closed, opaque ones. 2. While Internet services can be interrupted, the Internet as a global system is ultimately resilient to attacks, even sophisticated and widely distributed ones. 3. The connectedness of the Internet people talking with people counters the divisiveness terrorists are trying to create. 4. The openness of the Internet may be exploited by terrorists, but as with democratic governments, openness minimizes the likelihood of terrorist acts and enables effective responses to terrorism. IV. Well-meaning regulation of the Internet in established democracies could threaten the development of emerging democracies. 1. Terrorism cannot destroy the internet, but over-zealous legislation in response to terrorism could. Governments should consider mandating changes to core Internet functionality only with extraordinary caution. 2. Some government initiatives that look reasonable in fact violate the basic principles that have made the Internet a success. 3. For example, several interests have called for an end to anonymity. This would be highly unlikely to stop determined terrorists, but it would have a chilling effect on political activity and thereby reduce freedom and transparency. Limiting anonymity would have a cascading series of unintended results that would hurt freedom of expression, especially in countries seeking transition to democratic rule. V. In conclusion we urge those gathered here in Madrid to: 1. Embrace the open Internet as a foundation of 21st Century democracy, and a critical tool in the fight against terrorism. 2. Recognizing the Internet's value as a critical communications infrastructure, invest to strengthen it against attacks and recover quickly from damage. 3. Work to spread access more evenly, aggressively addressing the Digital Divide, and to provide Internet access for all. 4. To protect free speech and association, endorse the availability of anonymous communications for all. 5. Resist attempts at international governance of the Internet: It can introduce processes that have unintended effects and violate the bottom-up democratic nature of the Net. SSG XXIV Operations CT Draft Working Document 3/1/2005 2 3 2 3 E V W d > ? @ A I J S M u y ) > Žɽѥ hW hrS hzKQ hkD hi hQ hFY hy h!A 5hy hf 5haH h4r h