Announcement

Collapse
No announcement yet.

Privacy? What privacy?

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Privacy? What privacy?

    Key points:

    1) There are many ways by which privacy can be breached, and hacking into Facebook/twitter is merely one of them
    2) There are already all sorts of license plate databases out there, both public and private
    3) The Army spokesmodel below either is deliberately being dumb or is dumb - cell phones are nowhere even remotely accurate enough to link a cell phone location with a license plate. Unless you're driving all alone in Wyoming...
    4) Linking of these individual 'public record' databases into private data yields a far more complete picture of you than you might think. For example, I was asked the other day to confirm my identity by selecting from various past data - places I used to live and what not. This is a clear use of data collation services as I've mentioned elsewhere.
    5) The technotopians will say this means we should just embrace our new non-privacy overlords. I say this means we need specific laws to prevent exactly this abuse.

    http://spectrum.ieee.org/podcast/gee...ampaign=122012

    Steven Cherry: Hi, this is Steven Cherry for IEEE Spectrum’s “Techwise Conversations.”

    Last year we did several shows about GPS tracking of automobiles, that is, whether the police can attach a tracking device to a suspect’s car, and do they need a warrant for that. As it turns out, that question is almost irrelevant, quaint, even. Today the police have a wide variety of ways to track us, none of which involve actually touching your car.
    The latest and most disturbing development is the way law enforcement officials can use license plate information culled from video cameras—a practice that turns out to be vastly more common than you might think, because there are way more video cameras photographing license plates than you probably thought. Besides fixed cameras, such as at traffic lights, cops themselves are wielding recording equipment optimized for reading license plates. According to an article in The Wall Street Journal, a study by the Center for Evidence-Based Crime Policy found that “37 percent of large police departments were using [license] plate readers.”
    At just one of them, the Riverside County Sheriff's Department in California, 49 camera-equipped vehicles took 6 million scans, recording a total of 2 million unique license plates over a two-year period that ended this August.
    And it’s not just the government. The Wall Street Journal article described vast databases of hundreds of millions of license plate scans by private companies. It cited a single auto repossession agency in Baltimore, whose agents—repo men, as they’re popularly called—scan over 10 million plates each year now.
    There’s a wide variety of other technologies now being employed by law enforcement: radioactivity detectors, automotive black boxes, navigation systems, automated toll collection, the GPS in your cellphone, the traffic cameras I mentioned, civilian drones, facial recognition software, and more. And it can all be correlated with driver’s license databases, credit card information, national identity registries, cellular billing records, supermarket discount cards, and, again, more.
    My guest today is Colonel Lisa Shay. She’s a professor of electrical engineering at West Point, the U.S. Military Academy, that is, in New York State. She has a Ph.D. in electrical engineering from Rensselaer Polytechnic Institute, also in New York.
    Lisa, welcome to the podcast.
    Lisa Shay: Thank you very much, Steven.
    Steven Cherry: So first tell us a little bit about the license plate readers. The technology has gotten a bit more common lately. Is that just Moore’s Law at work?
    Lisa Shay: Well, absolutely, that’s a component of it. We have an increased capability to make sensors smaller and smaller, and because they’re smaller, they can physically be used in more places. As demand becomes higher, they become mass-produced, and the cost goes down, and so it’s sort of a version of Moore’s Law. It’s kind of a combination of Moore’s Law and mass production.
    Steven Cherry: And they’ve gotten a lot more accurate lately?
    Lisa Shay: Well, that is an interesting question. The cameras themselves are simply sensors, and so it’s not really accurate to say how accurate that is. When you talk about accuracy, you’re interpreting an image, doing some sort of optical character recognition on it, so there’s two parts to that: The sensors themselves are becoming better in that they have higher resolution, but the accuracy of the algorithm that does the optical character recognition is . . . it depends, and there’s not a lot of data on that that’s been published.
    Steven Cherry: So how does this work? The video camera snaps the actual back of a car, let’s say, and the software focuses in on the license plate and tries to read it as numbers and letters?
    Lisa Shay: Yes, that’s exactly what happens.
    Steven Cherry: All right, so a cop can see someone speeding or driving recklessly, and they’re able to snap a picture instantly, and with improving, at least, accuracy. What’s wrong with that?
    Lisa Shay: Well, potentially there’s not a whole lot wrong with that. If a policeman is using this system because they’ve identified that there is a crime being committed, and they’re using this as a way of enforcing a law that they’ve already determined has been broken, I think that’s fine. The question is really the broader topic that was brought out in your introduction, that there are many cameras that are set up all over the country that are photographing traffic. And the question then is, Where is that data being sent? Who is analyzing it? And what is being done with it? Is it being used for what purpose? Because traffic cameras that are just continuously on are recording data from people who are perfectly law abiding, who are simply driving to work on a public highway.
    Steven Cherry: I said that the license plate data can be correlated with a lot of other databases. Are they, in fact, being correlated? And who’s doing that?
    Lisa Shay: Well, there was just actually published in a conference in Boston in October a paper discussing exactly that by a group of investigators in the United Kingdom. They assert, in fact, that, yes, these license plate readers in the UK are being combined with the police, with other data from either cellphones or other location-based information, to identify criminals or to track criminal suspects. The technology certainly exists for police to, or other organizations to, do this because every cellphone nowadays just about has a GPS in it, and the cellphone companies know where each cellphone is, so that data is available to them. And license plate data is available to whatever entities operate these roadside traffic cameras, which are a variety of different entities that operate those systems. And, of course, there’s private companies that operate the cameras that do the repo men, as you mentioned.
    So these datasets exist. They exist in digital form, and any dataset that exists in digital form can be easily transmitted somewhere else; it can be easily processed. And that can be done intentionally, because the companies that own these datasets desire to aggregate them, or it could be done unintentionally, because someone hacks into this database of this information and then correlates it. So there’s the privacy concern that’s twofold: One, that this information might be accessed illegally by hackers, or that the companies that collect this data could then sell it to each other for either market research or for some other purpose.
    Steven Cherry: In the movies, we often see the government with a sort of perfect ability to track someone as they move around a city or across a country. They do this in the TV show Homeland all the time, for example. It’s completely unrealistic now, but I gather you fear it’s becoming quite realistic, and that this license plate technology could end up becoming a key part of that equation.
    Lisa Shay: Well, that’s a concern. There’s two parts to that: One is, can someone be tracked perfectly? What are the limits to this system? Because every technological system, every tracking system, has false alarm rates. There’s false positives and there’s false negatives, and those are inherent to any system, and there’s not a lot of rigorous analysis being done on these systems to determine what are those false alarm rates. And so it is possible that you have this illusion of perfect tracking, but in fact you’re not tracking the right person.
    And then on the flipside, even if you are tracking people, then at what point do we have a right to privacy? There’s certainly expectations of privacy in one’s own home that can be violated because your GPS signal is, in many cases, detectable outside of your home. So there’s strict privacy that’s clearly violated by some of these systems. But then there’s even a less-precise notion of privacy, that at any given moment in time that I’m walking down the street, I’m in public, and anyone, of course, can see me, but that’s a very transient phenomenon. The people who see me, 99 percent of them don’t know who I am. They don’t remember me more than three or four seconds after they’ve seen me, and unless I’m looking for somebody, I’m looking to meet a friend, say, at a restaurant, it’s almost an anonymous system. Yes, I’m in public, but my data isn’t persistent in any way.
    That all changes when this data is stored electronically, because now a log, a record, is being kept of my whereabouts that could be viewed later. It is a persistent record. It can be viewed not just by the 10 people on the sidewalk that I happen to pass, but anybody anywhere in the world that has electronic access to this dataset.
    Steven Cherry: And to connect it up with everything else you’re doing in your day . . .
    Lisa Shay: Right. Yes, and then to note that I went to a grocery store, and then the data collected by my grocery loyalty card can be linked to the fact that I didn’t go to the gym that day and instead bought a package of cookies, and then that goes to my health insurance company that says, “Oh, you’re no longer exercising and your diet has gone downhill. Perhaps we need to relook at your insurance premiums.” This all becomes very dystopian.
    Steven Cherry: Yeah, and I was going to ask you, Is it a bigger problem when the government is doing this, or private companies ?
    Lisa Shay: It’s no longer just the government that we have to concern ourselves with. Back in the Cold War, we certainly thought of Big Brother as the government, because the organizations with the most resources to devote to this sort of issue tended to be governmental, but that’s no longer the case. And that’s an even bigger concern, because in countries like the United States, we have a Bill of Rights. We have laws that regulate governmental behavior that’s different from the laws that regulate corporate behavior, and the corporate law hasn’t necessarily caught up with these notions of privacy and sharing data and aggregating data.
    Steven Cherry: In your writings you’ve used the phrase “police state.” You say we don’t have one, but we have the technology to have one. Actually, the problem in a way goes beyond that, right? It’s not just the police that can know everything about us, it’s Walmart, it’s our insurance company, it’s our bank, it’s everybody.
    Lisa Shay: Yes. “Police state” is a turn of phrase that perhaps is a bit dated now. It’s designed to elicit . . . it’s a metaphor, and certainly in the ’50s and ’60s, we were most concerned with what governments were doing. And if you think about what life might have been like in Eastern Europe or in the Soviet Union in the 1950s, imagine what the KGB would have done with this kind of technology. But nowadays it’s not just the governments that we have to think about, it’s what happens when Walmart and my insurance company and my Visa card and my auto insurance company all are collecting data about where I am every minute of the day. Is my life really intended to be something that everybody can view at any given moment?
    Steven Cherry: So the technology keeps getting better and cheaper and faster, and it seems that it is just going to become used more and more widely until we have no privacy at all. Do you see any way off of that roller coaster, which seems to be entirely downhill?
    Lisa Shay: No future is inevitable. There are certainly courses of action that can be taken. My colleagues and I have analyzed this phenomenon from a couple of different perspectives. First, you look at who are the owners of these surveillance systems and what is their interest in setting these systems up. They typically have a legitimate interest in a very specific purpose, and then the people who make these systems should then target their applications to meet that single need—and either through voluntary standards and best practices of how these systems are designed from the ground up, or from regulations and laws bounding how these systems can be operated.
    There are definitely ways to allow the owners of these systems to meet their immediate need for safety or security, or for monitoring employees’ behavior that are within the bounds of their employment contract, to meet those objectives in a way that doesn’t excessively violate our privacy. And we advocate designing systems with privacy built in from the ground up, so making these systems do their intended purpose but not more than that. But in many cases it may take government regulation or laws to limit how data is released. Something as simple as having individuals having opt-out or opt-in policies for surveillance would be a step in the right direction.
    Steven Cherry: Well, we can hope that those laws come to exist or that those options come to exist. And let me thank you, Lisa, first of all for your service. . . . Your biography mentions that you were deployed as part of the NATO peacekeeping mission in Bosnia.
    Lisa Shay: Oh, thank you.
    Steven Cherry: And, of course, for your continued service at West Point. And let me thank you for joining us today.
    Lisa Shay: Thank you very much for this opportunity.
    Steven Cherry: We’ve been speaking with Colonel Lisa Shay of the U.S. Military Academy about our continually diminishing privacy, this time from portable license-plate-reading video cameras.

  • #2
    Re: Privacy? What privacy?

    The most significant value of a computer network, of the type that has been built, is the ability to apply connection science across the network, specifically applying control-feedback techniques across network clusters. While general "openness" of individual nodes is critical to successful connection science, it is much less valuable on its own.

    The entire privacy debate is misfocused.... deliberately.
    The greatest obstacle to discovery is not ignorance - it is the illusion of knowledge ~D Boorstin

    Comment


    • #3
      Re: Privacy? What privacy?

      Reggie, can you expand upon that? I don't get it. Thanks

      Comment


      • #4
        Re: Privacy? What privacy?

        Originally posted by aaron View Post
        Reggie, can you expand upon that? I don't get it. Thanks
        In summary, the system was designed as an Operant conditioning chamber
        http://en.wikipedia.org/wiki/Operant...ioning_chamber

        In other words, a Skinner Box for it's users.


        An adherent to Watson's theory of behaviorism, B.F. Skinner was able to demonstrate how one can modify behavior through a process he called "shaping." In contrast to pure classical conditioning, Skinner utilized positive and negative reinforcement to cause behavior.

        Utilizing a contraption that became known as "Skinner's Box" he demonstrated how he could shape the behavior of pigeons by reinforcing their behavior.

        "By discovering the causes of behavior we can dispose of the imagined internal cause."
        - B.F. Skinner
        .
        Techniques such as Big Data collection, predictive algorthms, pattern matching, and dense social networks are what give the network the ability to discover behavior and "dispose of internal cause"
        The greatest obstacle to discovery is not ignorance - it is the illusion of knowledge ~D Boorstin

        Comment


        • #5
          Re: Privacy? What privacy?

          Originally posted by c1ue View Post
          Key points:
          3) The Army spokesmodel below either is deliberately being dumb or is dumb - cell phones are nowhere even remotely accurate enough to link a cell phone location with a license plate. Unless you're driving all alone in Wyoming...
          This is a trivial problem to solve. Simple take all the cell phones that were in range of a particular camera at a particular time when it snapped the car that you are interested in. Repeat for the next few cameras down the road.

          By a simple process of elimination you will have the numbers of all the phones that were in the car.

          Yes it might not work well just going down the motorway where everyone is going at a similar speed but in the UK pretty much every, if not all, of the major junctions have car plate readers noting all the cars that go past. For a typical journey there is unlikely to be many other cars making the same journey as you at the same time.

          If a car is used in a crime it would be possible to trace back where the car was driven and which phone numbers were in the car. Obviously if you are a sensible professional criminal (or a terrorist) you don’t drive past cameras or use a one time disposable phone when you are out committing crimes.

          Obviously our less intelligent criminals video everything on their mobile phones and then upload it to facebook or youtube.

          Comment


          • #6
            Re: Privacy? What privacy?

            Reggie, I fail to see what is so new and interesting. I took psych 101 in college and learned all about that stuff. Heck, I use it on my kids. If you are saying that people have a lot more data to control the sheeple, isn't that what this and many sites have commented on for years?

            Yes, I am missing the profoundness of what you are bringing. Are there powerful interests controlling populations? Absolutely. Are they using marketing firms to do so? Absolutely. Is any of this new? I would argue no, but I do agree they can be much more effective now.

            Comment


            • #7
              Re: Privacy? What privacy?

              but then we have the retailers pulling a fast one too?

              Websites Vary Prices, Deals Based on Users' Information


              By JENNIFER VALENTINO-DEVRIES, JEREMY SINGER-VINE and ASHKAN SOLTANI

              It was the same Swingline stapler, on the same Staples.com SPLS -2.17% website. But for Kim Wamble, the price was $15.79, while the price on Trude Frizzell's screen, just a few miles away, was $14.29.
              A key difference: where Staples seemed to think they were located.
              A Wall Street Journal investigation found that the Staples Inc. website displays different prices to people after estimating their locations. More than that, Staples appeared to consider the person's distance from a rival brick-and-mortar store, either OfficeMax Inc. OMX -0.51% or Office Depot Inc. ODP -2.88% If rival stores were within 20 miles or so, Staples.com usually showed a discounted price.


              "How can they get away with that?" said Ms. Frizzell, who works in Bergheim, Texas.
              In what appears to be an unintended side effect of Staples' pricing methods—likely a function of retail competition with its rivals—the Journal's testing also showed that areas that tended to see the discounted prices had a higher average income than areas that tended to see higher prices.
              Presented with the Journal's findings, Staples acknowledged that it varies its online and in-store prices by geography because of "a variety of factors" including "costs of doing business."
              For years, the Internet, with its promise of quick comparison shopping, has granted people a certain power over retailers. At the click of a button, shoppers could find a better deal elsewhere, no travel required.
              But the idea of an unbiased, impersonal Internet is fast giving way to an online world that, in reality, is increasingly tailored and targeted. Websites are adopting techniques to glean information about visitors to their sites, in real time, and then deliver different versions of the Web to different people. Prices change, products get swapped out, wording is modified, and there is little way for the typical website user to spot it when it happens.


              The Journal identified several companies, including Staples, Discover Financial Services, DFS +0.03% Rosetta Stone Inc. RST -0.48% and Home Depot Inc., HD +0.41% that were consistently adjusting prices and displaying different product offers based on a range of characteristics that could be discovered about the user. Office Depot, for example, told the Journal that it uses "customers' browsing history and geolocation" to vary the offers and products it displays to a visitor to its site.
              Offering different prices to different people is legal, with a few exceptions for race-based discrimination and other sensitive situations. Several companies pointed out that their online price-tweaking simply mirrors the real world. Regular shops routinely adjust their prices to account for local demand, competition, store location and so on. Nobody is surprised if, say, a gallon of gas is cheaper at the same chain, one town over.
              But price-changing online isn't popular among shoppers. Some 76% of American adults have said it would bother them to find out that other people paid a lower price for the same product, according to the Annenberg Public Policy Center at the University of Pennsylvania.
              "I think it's very discriminatory," said Ms. Wamble, an insurance account manager in Boerne, Texas, who priced the Swingline stapler for the Journal this month. She was just 10 miles or so down the road from Ms. Frizzell, but she saw higher prices on the Staples website than Ms. Frizzell did for all five products tested. Items tested included a pack of Bic pens, a case of orange masking tape, a set of crimped-end mailing tubes and a big safe.
              It remains unclear precisely what formula Staples used to set online prices. Staples declined to answer detailed questions about the findings. It told the Journal that "in-store and online prices do vary by geography due to a variety of factors, including rent, labor, distribution and other costs of doing business."
              It is possible that Staples' online-pricing formula uses other factors that the Journal didn't identify. The Journal tested to see whether price was tied to different characteristics including population, local income, proximity to a Staples store, race and other demographic factors. Statistically speaking, by far the strongest correlation involved the distance to a rival's store from the center of a ZIP Code. That single factor appeared to explain upward of 90% of the pricing pattern.
              What economists call price discrimination—when companies offer different prices to different people based on their perceived willingness to pay—is commonplace and can be beneficial. Movie theaters give senior-citizen discounts. One traveler's willingness to pay top dollar for an airplane seat might mean other people will pay less.
              In other cases, though, shoppers can be the loser. That same airline might easily just pocket the big spender's extra money and leave other prices unchanged.
              Of course, not all price differences are instances of price discrimination. Prices driven down by competition wouldn't generally be considered discriminatory, for example.
              Three Years of Privacy Insights




              The Wall Street Journal is conducting a long-running investigation into the profound transformation of personal privacy in America.
              Selected findings:



              Basing online prices on geography can make sense for various reasons, from shipping costs to local popularity of a particular item. Some retailers might naturally cluster in specific areas as well—a prosperous suburb, say—boosting the competitive pressure to discount.
              But using geography as a pricing tool can also reinforce patterns that e-commerce had promised to erase: prices that are higher in areas with less competition, including rural or poor areas. It diminishes the Internet's role as an equalizer.
              In the Journal's examination of Staples' online pricing, the weighted average income among ZIP Codes that mostly received discount prices was roughly $59,900, based on Internal Revenue Service data. ZIP Codes that saw generally high prices had a lower weighted average income, $48,700.
              Staples didn't comment on the income split beyond saying that the company offers a low-price guarantee.
              Online businesses have experimented with tailored offers since the dawn of the Internet era. In 1997, a startup called Personify sold software that tried to personalize Web pages for shoppers. For example, people taking a certain path through a site could be tagged as price-conscious and be shown low-end items, said Eileen Gittins, Personify's former chief executive.
              "The idea was more advanced than the technology could support at the time," said Ms. Gittins. Today she runs an online company, Blurb, that lets people make books using their own photos.
              In 2000, Amazon.com Inc. AMZN +0.66% infuriated many customers when it sold DVDs to different people for different prices. Amazon called it merely a test and ultimately refunded the price difference to people who paid more.
              In 2010, the Journal reported that Capital One Financial Corp. COF -0.58% was using personalization technology to decide which credit cards to show first-time visitors to its website. Recent Journal follow-up testing indicated that Capital One was showing different users different cards first—either those for "excellent credit" or "average credit."
              Capital One says it gathers data about visitors while they are on its website and uses this information to suggest different products to them. "We do not use any of this data in credit decisioning or underwriting," a Capital One spokeswoman said. "We're making an educated guess about what we think consumers will like."
              This year, researchers in Spain studied more than 200 online retailers and found a handful of examples of price differences—including at Staples within Massachusetts—that appeared to be based on location and other factors. Those findings suggest that Staples' price adjustments have been present at least since this summer.
              It is difficult for online shoppers to know why, or even if, they are being offered different deals from other people. Many sites switch prices at lightning speed in response to competitors' offerings and other factors, a practice known as "dynamic pricing." Other sites test different prices but do so without regard to the buyer's characteristics.
              To find differences that weren't purely the result of dynamic pricing or randomized tests, the Journal conducted preliminary scans by simulating visits from different computers to a variety of e-commerce sites. If a website showed different prices or offers, the Journal then analyzed the site's computer code and conducted follow-up testing.
              The Journal's tests, which were conducted in phases between August and December, indicated that some big-name retailers are experimenting with offering different prices and products to different users.
              Some sites, for example, gave discounts based on whether or not a person was using a mobile device. A person searching for hotels from the Web browser of an iPhone or Android phone on travel sites Orbitz and CheapTickets would see discounts of as much as 50% off the list price, Orbitz said.
              Both sites are run by Orbitz Worldwide Inc., OWW +0.76% which in fact markets the differences as "mobile steals." Orbitz says the deals are also available on the iPad if a person installs the Orbitz app.
              "Many hotels have proven willing to provide discounts for mobile sites," said Chris Chiames, Orbitz's vice president of corporate affairs. Hotels on Orbitz mobile sites also offer discounts "that might target shoppers in a specific geographic region," as determined by the physical location of the user, as well as "other factors."
              Often, sites tailored results by geography. In the tests, Discover, for instance, showed a prominent offer for the company's new "it" card to computers connecting from cities including Denver, Kansas City, Mo., and Dallas, Texas. Computers connecting from Scranton, Penn., Kingsport, Tenn., and Los Angeles didn't see the same offer.
              A Discover spokeswoman said that the company was testing the card, but that for competitive reasons, it wouldn't comment further on its "acquisition strategy" for new customers.
              At home-improvement site Lowe's Cos., LOW +0.57% prices depend on location. For example, a refrigerator in the Journal's tests cost $449 in Chicago, Los Angeles and Ashburn, Va., but $499 in seven other test cities. Lowe's said online shoppers receive the lower of the online store price or the price at their local Lowe's store as indicated by their ZIP Code.
              Home Depot's website offered price variations that appeared to be based on the nearest brick-and-mortar store as well. A 250-foot spool of electrical wiring fell into six pricing groups, including $70.80 in Ashtabula, Ohio; $72.45 in Erie, Pa.; $75.98 in Olean, N.Y and $77.87 in Monticello, N.Y.
              The company said it uses "IP address," a number assigned to devices that connect to the Internet, to try to match users to the closest store and align online prices accordingly.
              Location also seemed to be important for some international companies. The Journal saw Rosetta Stone, which sells software for learning languages, offering discounts of as much as 20% for people who bought multiple levels of its German lessons from certain locations in the U.S. or Canada, but not others from the U.K. or Argentina.
              Rosetta Stone said it sometimes tests and offers different product "bundles" in different places. It also personalizes its suggestions based on how the visitor gets to the site, Rosetta Stone said—whether from a search engine, a social-media link, a mobile device or a PC. "We are increasingly focused on segmentation and targeting," a spokesman said. "Every customer is different."
              The differences found on the Staples website presented a complex pricing scheme. The Journal simulated visits to Staples.com from all of the more than 42,000 U.S. ZIP Codes, testing the price of a Swingline stapler 20 times in each. In addition, the Journal tested more than 1,000 different products in 10 selected ZIP Codes, 10 times in each location.
              The Journal saw as many as three different prices for individual items. How frequently a simulated visitor saw low and high prices appeared to be tied to the person's ZIP Code. Testing suggested that Staples tries to deduce people's ZIP Codes by looking at their computer's IP address. This can be accurate, but isn't foolproof.
              In the Journal's tests, ZIP Codes whose center was farther than 20 miles from a Staples competitor saw higher prices 67% of the time. By contrast, ZIP Codes within 20 miles of a rival saw the high price least often, only 12% of the time.
              Staples.com showed higher prices most often—86% of the time—when the ZIP Code actually had a brick-and-mortar Staples store in it, but was also far from a competitor's store. In calculating these percentages, the Journal excluded New York City and used the more than 29,000 "standard" ZIP Codes in the 50 states and District of Columbia. This meant things like ZIP Codes with only post-office boxes weren't counted.
              Prices varied for about a third of the more than 1,000 randomly selected Staples.com products tested. The discounted and higher prices differed by about 8% on average.
              There were a few areas of the U.S. and its territories that offer exceptions. The Journal found that Puerto Rico was generally shown the higher prices no matter how close the ZIP Code was to local OfficeMax or Office Depot outlets. For Guam, on the other hand, tests of Staples.com almost always returned the lower prices, even though the nearest U.S. OfficeMax or Office Depot is listed online as being in Hawaii, nearly 4,000 miles away.
              New York City, too, appeared to be a special case. Tests of Staples.com using ZIP Codes in the boroughs of the Bronx, Manhattan and Staten Island consistently saw higher prices, while Brooklyn and Queens saw almost only the discounted prices. This despite the fact that all parts of New York City look to be within 20 miles of a Staples competitor, according to the websites.
              As a final test, the Journal ordered two separate Swingline staplers from Staples.com, from two nearby ZIP Codes—one costing $14.29 and the other one $15.79. The staplers arrived the same day. They appear to be indistinguishable from one another and do an equally thorough job of stapling.
              Write to Jennifer Valentino-DeVries at Jennifer.Valentino-DeVries@wsj.com
              A version of this article appeared December 24, 2012, on page A1 in the U.S. edition of The Wall Street Journal, with the headline: Websites Vary Prices, Deals Based on Users' Information.





              Comment


              • #8
                Re: Privacy? What privacy?

                Originally posted by bungee
                This is a trivial problem to solve. Simple take all the cell phones that were in range of a particular camera at a particular time when it snapped the car that you are interested in. Repeat for the next few cameras down the road.
                If you're the government, you can do that.

                No one else can. For one thing, you can't access all of the cell phones unless you have APIs into all of the possible service providers.

                If you're the government, you have far better ways to get this information - like Echelon.

                Comment


                • #9
                  Re: Privacy? What privacy?

                  Obligatory hilarious and informative Juice News Media rap video. The ending summary is especially illuminating.
                  ...Big Brother is WWWatching You:

                  Warning: Network Engineer talking economics!

                  Comment


                  • #10
                    Re: Privacy? What privacy?

                    Originally posted by aaron View Post
                    Reggie, I fail to see what is so new and interesting. I took psych 101 in college and learned all about that stuff. Heck, I use it on my kids. If you are saying that people have a lot more data to control the sheeple, isn't that what this and many sites have commented on for years?

                    Yes, I am missing the profoundness of what you are bringing. Are there powerful interests controlling populations? Absolutely. Are they using marketing firms to do so? Absolutely. Is any of this new? I would argue no, but I do agree they can be much more effective now.
                    Of course it's new. Never has there ever been a Global Feedback-Control system that can provide customized data in order to "pursuade" down to an individual level. This [deployment of OODA theory on a global basis] is a far cry from the "Internet is a democratising force" propaganda spewed by Silicon Valley, DC NPO's, and the media establishment.

                    Moreover, there are literally thousands of articles presenting the loss of privacy on an individual basis, but virtually nothing, except perhaps in academic circles, that discuss the Meta-level controlling ability of such a system.

                    Articles such as this are provided as a lightening rod for public outrage, but ultimately misguide the public and disarm them. This is propaganda at its best: capturing the opposition channel and diverting it while making it believeable.
                    The greatest obstacle to discovery is not ignorance - it is the illusion of knowledge ~D Boorstin

                    Comment


                    • #11
                      Re: Privacy? What privacy?

                      who?

                      Comment


                      • #12
                        Re: Privacy? What privacy?

                        Originally posted by reggie
                        This [deployment of OODA theory on a global basis] is a far cry from the "Internet is a democratising force" propaganda spewed by Silicon Valley, DC NPO's, and the media establishment.
                        You keep going on and on and on on OODA, but frankly it seems OODA is far more imagination than it is actual policy - here is a pretty thorough take-down of decision cycle theory in general and OODA in particular:

                        http://www.baenebooks.com/10.1125/Ba...0675.htm?blurb

                        Indirectly Mistaken Decision Cycles
                        by Tom Kratman

                        Let me tell you a story, true story as it happens. Way in the dim mists of antiquity, which is to say circa 1979, I looked at the number of troops available to both sides along the central front in Germany, added in the absolutely huge numbers of second and third echelon divisions coming from further inside the Soviet Union, matched those against the likewise huge numbers of more or less trained reservists the German army could call up (to say nothing of the French), matched all those against the terrain and the weapons, and came to the conclusion: “ ‘Swirling maelstrom of fire teams,’ my butt. If we duke it out, it’s going to look like the Great War in the West, especially since everyone on both sides is probably going to run out of ammunition about the same time.”

                        Now, one of the things people in my branch, infantry, did in the Great War was the trench raid. In these, a group of men would slip across no man’s land, fight their way into the enemy trenches, then generally raise havoc, destroy things, grab items of intelligence value—especially prisoners— and slip back. They would, generally speaking, not use firearms ammunition for a trench raid, since not using it would confuse the enemy as to where they were, even as the enemy self-identified by their own muzzle flashes. Instead, the raiding party would use hand grenades, bayonets and rifle butts, knives, shovels, axes, bicycle chains and the like.

                        Figuring, therefore, that one of these days there was a fair chance I’d end up leading a trench raid, I asked myself, “Self, what’s better for fighting in very close quarters than a bayonet, rifle butt, knife, e-tool, axe, or bicycle chain?” The answer I got was, “Sword, not too long, preferable good for both thrusting and chopping.”

                        So I ended up, in 1979 and 1980, spending a massive amount of time learning to use various sharp pointy things, European and Asian, both. One of these was essentially a katana, with the instructor being a highly talented and skilled Korean, Master Kim, from whom I took about six hours of private lessons a week. Hey, this is my life we’re talking about here.

                        One of the normal features of the lessons was a kind of fencing, done with sticks. You’ve got to picture it, on one particular occasion: I am using a mix of French, Italian, and Korean. I am operating against Master Kim’s line of least expectations, in the best traditions of B.H. Liddell Hart. I am parrying and thrusting, in the best traditions of Gordon R. Dickson’s Dorsai, to bring Kim’s “blade” out from covering his vitals. And, even though I didn’t know it—for that matter, in 1979, possibly neither did Air Force Colonel John Boyd— I am operating inside Kim’s Boyd cycle.

                        That is, I am doing all of these things, right up until the point that Kim said, “Bullshit,” and hit me on the head, knocking me to the floor.
                        This also marked the beginning of my long disenchantment with intellectualism, generally.

                        Boyd identified a four-step mental process: observation, orientation, decision, and action. Boyd theorized that each party to a conflict first observes the situation. On the basis of the observation, he orients; that is, he makes an estimate of the situation. On the basis of the orientation, he makes a decision. And, finally, he implements the decision—he acts. Because his action has created a new situation, the process begins anew. Boyd argued that the party that consistently completes the cycle faster gains an advantage that increases with each cycle. His enemy's reactions become increasingly slower by comparison and therefore less effective until, finally, he is overcome by events.

                        --From FMFM 1, Warfighting, Footnote 20, carried over to MCDP 1, Warfighting, Footnote 18.

                        There is, in military science fiction, probably no meme or theory as widely proclaimed and encountered as decision cycle theory, also known as the OODA (Observation-Orientation-Decision-Action) Loop or the Boyd Cycle, After Air Force Colonel John Boyd. Yes, you’ve seen it, sometimes explicitly and sometimes merely implicitly. It’s there so often, so unremarkably, that many and perhaps most military science fiction readers just accept it.

                        Science fiction, of course, tries to be at the forefront of human, societal, and technological development. It usually fails—just think of how much sci fi, before the fall of the Soviet Union, presumed the ultimate victory of atheism and socialism; Star Trek: TNG, anyone?—but gets at least a B for effort. Military science fiction tries the same thing, in a military vein, and succeeds maybe a little more often. Think here: Powered Armor, a la Heinlein’s Starship Troopers. It’s coming.

                        “Everyone knows,” of course, that Heinlein invented the concept. Interestingly enough, though, he didn’t invent the concept of powered armor. Indeed, the idea predated Starship Troopers by a couple of decades, at least, in E.E. “Doc” Smith’s Lensman series.

                        Here’s something I don’t know, but suspect very strongly: that Colonel Boyd’s Decision Cycle Theory, in whole or in part, drew its inspiration from Gordon R. Dickson’s Dorsai novel, Tactics of Mistake, while possibly both drew some degree of thought and inspiration from Liddell Hart’s theories on the indirect approach. I’m not going to talk a great deal about the indirect approach, and only a little about Dickson. In the main, I am interested in decision cycle theory.

                        Similar to Dickson’s Tactics of Mistake? Yes; think about it: Boyd proposes an analogy from the individual fighter pilot to the commander of a ground combat organization. Dickson proposed an analogy from an individual fencer to the commander of a ground combat unit. Boyd proposed that by cycling through the OODA loop faster than the enemy, we would finally get so far ahead that he would find himself in a position of vulnerability. Dickson similarly proposed a series of thrusts that bring the enemy’s blade further and further away from his vitals until those vitals are exposed in time and space for a killing thrust.

                        Those similarities only carry one so far. Where the two theories are most similar is in the way the individual combatants are dissimilar to the ground combatant unit.
                        More on that a little later.

                        First, however, some background and concepts:

                        One of the problems with Decision Cycle Theory, recognized even by most of its proponents, is that Boyd wrote little down in literate prose, just one short essay, “Destruction and Creation”, which is surely in the background of decision cycle theory, but is not that theory. Instead, he spoke to people, often rather important and influential people. He gave his briefing, Patterns of Conflict. He cajoled and nagged. He is alleged to have wandered the labyrinthine corridors of the Pentagon muttering, “Not one pound for air to ground.” Writing, however, he would not do more of.

                        Instead, we’ve got the briefing and a few secondary sources from people interpreting Boyd: William S. Lind’s Maneuver Warfare Handbook and some Marine Corps doctrinal manuals, like MDCP 1, Warfighting, which replaced FMFM 1, of the same title.

                        Some have alleged, indeed Wikipedia has alleged (perhaps originating from that same “some”), that the Army’s prior doctrine of AirLand Battle sprang from Decision Cycle Theory. This, however, is false. I was thoroughly indoctrinated into AirLand Battle at Benning in 1984 and Leavenworth in 1988. Of Decision Cycle Theory, the OODA Loop, or Colonel John Boyd, there was not a word. Instead, AirLand Battle was mostly a physical and geometric concept, that of using the deep attack to ration the enemy into the battle area, thereby turning the point of his assault into an isolated and vulnerable physical flank. The nearest AirLand battle came to OODA was with the concept of synchronicity. That, however, was mostly about taking advantage of delayed effects when they arise or can be predicted to arise. For example, an effort, air or ground, that requires the enemy to use his air forces intensively, will be followed at some fairly predictable point in time by a weakness in his air power in the form of a lot of aircraft down for maintenance. That’s not a decision cycle; that’s an attrition cycle.

                        Speaking of attrition— eventually— the US Armed Forces, and most of our allies, recognize nine Principles of War: Mass, Objective, Security, Surprise, Maneuver, Offensive, Unity of Effort (aka Unity of Command), Simplicity, and Economy of Force. I think there are at least three more: Attrition, Annihilation (which is a Russian Principle of War), and Geometry (or Shape).

                        The latter, Geometry (or Shape) concerns the physical shape of the ground, that in relation to enemy forces and weapons effects, time-space relationships, modified by transportation nets and obstacles, and the like. If you want a simple illustration, look up the Battle of Leuctra, 371 BC. What you will see on the part of the Thebans under their commander, Epaminondas, is a very strong force on the left, a weaker force in the center and set back, and a very weak and thin force on the right, set back still further. On the other side, Epaminondas’ Spartan enemy set up in the usual broad phalanx.

                        What happened on the field was that the Thebans’ strong left struck the Spartan right with overwhelming power, crushing it before their own much weaker center and right could be engaged. The military term of art for this is “echeloning.” Now imagine it without “Geometry” or “Shape” with the whole Theban army organized the same way but all on line. Correct: The strong Spartan left and center crush the Thebans opposite them, setting the Theban army to rout, before the Theban left can be decisive.

                        Annihilation simply observes that when an enemy force is completely and utterly destroyed, annihilated, it cannot be rebuilt in as effective a form, if indeed it can be rebuilt at all. This is very closely related to that twelfth principle (again, these are my views, nobody’s doctrine), Attrition.

                        Attrition claims that in war everything costs and nothing is cheap. It is similar to the British principle of “Sustainability” and the Soviet principle of “Logistics.” The difference is that those latter two presuppose adequacy of available replacements and replenishments. This, however, is not something one can always count on. In effect, they put the cart before the horse.

                        The principles, whoever’s set you are using, are not checklists to victory. They are not formulae for success. Instead, they serve three purposes. They are guides to the study of war. They are, somewhat similarly, useful guides to the structuring of collective combat training. And they are warnings against nonsensical theories.

                        So, speaking of nonsense, how good is that analogy between the individual combatant and the ground combat organization? They’ve both got a brain, the fighter pilots’ brains in Boyd and the latest incarnation of a Graham among Dickson’s Dorsai, the commander and staff in real life. They both have a body in the sense of a physical presence that occupies space and requires sustenance.

                        Now presuppose that Dickson’s duelist has had his skilled hand cut off. Then presuppose that Boyd’s combat pilot has a) had his leg below the knee blown off in action and b) is not Hans Ulrich Rudel (Rudel being a very special case) or c) has had an eye shot out in action and d) is not Saburo Sakai (who was also a very special case). In the former case, the combatant has lost less than one percent of his body, yet he has lost entirely and his death will soon follow. In the latter two (again, leaving out some special cases), the individual combatant had lost only a small or infinitesimal part of his body, yet – having suffered similarly debilitating pain – he too has lost his duel.

                        Ah, but what of the collective ground combat commander, a three star, say, commanding a corps, who has lost one percent of his force? He shrugs. He tells his adjutant to request some replacements for the lost troops and to prepare some award recommendations and perhaps letters to next of kin. He tells his chief logistician to order replacement equipment and supplies (if needed). Then he gets on with the war, unfazed. He has what the individual combatant typically does not: Detachment from pain, depth, and the ability that flows from those to take a certain amount of attrition.

                        And what of the individual combatant; what does he have that the commander of a ground combat unit does not? He has nearly perfect coordination. When he tells his hand or finger or eye or foot to move, it does, no arguments, no delays. He has little or no friction, in the Clausewitzian sense. The duelist’s blade moves and the resistance of the air matters little. The mud, far below, will not slow the F-16. The river is too far away, and really too grand, to matter to the duelist; the fighter pilot simply overflies it. Nothing of consequence obstructs the will of either.

                        Conversely, that three star’s will is continuously thwarted by his own machine. His men are fearful and, being self-willed, unlike jet or sword, move slowly into action. His subordinate leaders, in dread of an unfavorable Evaluation Report should they make a mistake, are deliberate and careful. Mud chokes his supply lines. Disease or weather can cripple or hobble his force overnight.

                        There are further important differences. The individual combatant lacks the physical wherewithal to launch simultaneously both fixing attacks and maneuvering attacks, which the collective combat unit had. Also note step one in the Boyd Cycle: Observation. You can see your opponent in a duel, even in a case of “Swords and Lanterns.” Boyd is presupposing being able to see an enemy MiG through the bubble canopy of an F-86. In neither case is there much the enemy can do about being seen.
                        This is not always the case. On the ground, being able to see has been the exception rather than the rule. This is still true, for all our technology. We cannot see through hills. We lose much ability to see in the rain or snow…or fog. The term “Fog of War” is still accurate, if for no other reason than that the enemy will use every means at his disposal to keep us from seeing. Then, too, in the current war, where the key terrain is the human brain and the human heart, we are utterly blind.

                        Lastly, something one can say about combat in the air and the combat of a formal duel: They are very empty, lonely, and simple fields. How different the battlefield for the ground combatant. Where is that fire coming from? Is a sniper tracking me? Is a forward observer even now calling in the fire mission that will drop several tons of high explosive and razor sharp flying steel hards on me? Where’s my RTO? Where’s Schmidlap? Mines! Mines!

                        It is, in short, a very poor analogy. How likely is it, really, that such a poor analogy can lead to true and legitimate military doctrine?

                        It is interesting and illustrative that Boyd, Decision Cycle Theory, and the OODA Loop only appear in a footnote of the central Marine Corps doctrinal publication on how they intend to fight. Know why? Neither do I, but I suspect it’s because many Marines don’t really believe it in either. I know that some don’t.

                        "Myth" has many connotations, but for our purposes "myth" is defined as a "thing existing only in imagination or whose actuality is not verifiable; a belief given uncritical acceptance by members of a group in support of existing ... practices and institutions. [Myth] is ... used to designate a story, belief, or notion commonly held to be true but utterly without a factual basis." In this context myth is opposed to history since it is "usually fabulous in content even when loosely based on historical events." The classical Greek philosophers contrasted the verb muthos, meaning to speak with emotion and mythic thought, with the verb logos, meaning to speak with reason and analytical thought. The contrast in meaning defines the qualitative difference between arguments based on emotion and arguments based on logic and reason. The thesis of this paper is that maneuver warfare, as delined and limited by FMFM-1 Warfighting has the substance of myth. In its current form this manual—capstone doctrine of the Marine Corps—speaks with an emotion opposed to history in a document where reason and analysis should prevail.

                        Major Craig A. Tucker, USMC, False Prophets: The Myth of Maneuver Warfare and the Inadequacies of FMFM-1, Warfighting

                        I’ll leave dissection of Marine Corps doctrine to the Marines. Being human, they’re much more likely to reform themselves through their own thoughts and efforts than if prodded by an outsider. William S. Lind’s Maneuver Warfare Handbook gets no such pass.

                        One can hear the defense now: “All right, maybe the analogy to the individual combatant is bad, but that’s all it was, an analogy trying to bring the light of maneuver warfare theory to all you military cretins, dwelling in the darkness. Jomini and Clausewitz did as much.”

                        I don’t believe that for a minute, but let’s just accept it for the nonce, arguendo. If we don’t have the analogy, then surely the history of warfare, carefully and flawlessly analyzed by Boyd, Lind, and company, will support the theory. Won’t it?
                        Sadly not.

                        Lind’s Maneuver Warfare Handbook cites eight battles or campaigns to support the Boyd theory of Maneuver Warfare. These are 1) Leuctra and 2) Cannae, from the ancient world, 3) Chattanooga, 4) Vicksburg, and 5) Jackson in the Valley, from our civil war, 6) the German offensives of 1918, 7) the Blitzkrieg of World War Two, and 8) the Israeli strike across the Suez in 1973. Boyd, be it noted, mentioned many other battles and campaigns, and their commanders, in his briefing. Sadly, since we don’t have Boyd but only the bare slides, while Lind is Boyd’s semi-official interpreter, we’ll stick with his eight.

                        Before continuing, however, gentle reader, don’t get the idea that I am impugning either Boyd’s or Lind’s patriotism or intelligence. I think they’re wrong, dreadfully and almost totally wrong. But smart people can be wrong, especially when they see their country facing a war they don’t expect to win, and are desperate to find some way for us to win that war.

                        Leuctra, 371 BC
                        Epaminondas (Thebes) vs. Cleombrotus (Sparta)

                        There’s been some effort of late to try to transform this battle from something planned well in advance to something very spur of the moment. The difference, as far as decision cycle theory goes, is that if done on the spot and the spur of the moment, then somebody, at least, was observing, orienting, deciding and acting. If, however, all the important decisions were made early, notably how to form up a column fifty ranks deep and get it to move without the men tripping over each other or becoming a human accordion, then the last decision made on the field was to order, “Forward March,” and no OODA loop was taking place.

                        I reject that recent position even as I wonder if it doesn’t arise from people who were sold on the Boyd Cycle and then, consciously or subconsciously, twisted the facts to fit.

                        I reject it for several reasons. One is that, as mentioned above, it is damned difficult to get troops to march well in units or blocks larger than they are used to. The US Army, for example, has no trouble, not even among the support types, in marching in platoons or companies. When parade time comes around, though, they must practice it for anywhere from a few days to a couple of weeks, this even though nearly all of the troops will have stood a parade in the past, usually several, and should have some feel for the thing. How much worse for then, for the Thebans, if they have never marched in a fifty rank deep column before?

                        Moreover, though fifty shields deep was something new, the Thebans had the example of Pagondas, at the Battle of Delium, fifty-three years earlier, and his massing of his main effort twenty-five deep. Thus, in broad, nontechnical terms, heavy massing was within the realm of the conceivable. Then there is the triple layout, strong left, pushed forward, weak center, held back, weaker right, held back further still. Those argue for thought, given early. Lastly, there was the clear intention to take on the Spartan contingent of the opposing Spartan-led army, the most prestigious troops in Greece, head on and smash them, which makes perfect sense in the context of the refused Theban center and right.

                        Leuctra was maneuver warfare, to be sure, albeit with a heavy admixture of attrition. What it was not was maneuver warfare in which the OODA loop had any battlefield part to play. It was not the application of a quicker idea, it was the application of a better one or, rather, several better ideas: Mass, Economy of Force, and Shape, in a combination worked out before the battle, and with the technicalities—how to march and fight in a fifty man deep column—likewise worked out in advance.

                        Oh, you want to know what happened? In the last decision made by either commander, Epaminondas and Cleombrotus gave the command, “Forward March,” or its equivalent in Greek, and the two sides smashed into each other over by the Spartan right. Overwhelmed by sheer numbers and physical power, the Spartans lost about four hundred of their own citizens—a huge percentage at the time—and fell or were driven back. Seeing this, the rest of the Spartan army, more or less unwilling allies of Sparta, anyway, broke and ran before ever getting in contact with the Theban center and right.


                        [Wikimedia Commons, Kirill Lokshin]

                        Cannae, 216 BC
                        Hannibal (Carthage) vs. Paullus and Varro (Rome)

                        On the face of it, Cannae seems to be better candidate for an illustration of decision cycle in operation than Leuctra is. Here’s what I think happened:

                        The Romans assembled as army of some sixteen legions, eight Roman, eight allied, plus about six thousand to sixty-four hundred cavalry, mostly allied. Because of the size of the army, the Roman commander (traditionally Varro but there are some theories, backed up by testimony reported from Hannibal, that it was actually Paullus in command; for our purposes it makes no difference), had the sub units of the legions, the maniples, form up much deeper that was their usual wont, no doubt expecting to overwhelm Hannibal through sheer weight, as the Thebans had the Spartans, at Leuctra. Even so, it seems to me unlikely that the Romans had entirely gotten rid of the spaces they traditionally left between maniples; they were too critical for relief by line of battle, for transmission of orders, for removal of the wounded, for oversight of the troops by their centurions, and to prevent shocks and disorder from being transmitted across the entire army’s front. The army probably couldn’t even move without those spaces, since without them every little obstacle would have thrown it into disorder.

                        The Romans assembled with their own infantry in the center, flanked by the allies’ legions, their own cavalry on the right and the allied cavalry on the left. About ten thousand Roman troops had been left to guard the camps. In total, the Romans may have mustered as many as ninety thousand men.

                        Hannibal’s army mustered a bit over half the strength of the Romans. He had (sources differ; this is my take on it) about twelve or thirteen thousand Libyan and Berber infantry, perhaps ten thousand cavalry, mostly Spanish and Gallic heavies, plus another twenty-seven or twenty-eight Spanish, Balearic, and Gallic infantry, heavy and light.

                        The fact that he had seized the supply dump/granary at the town of Cannae may have made it imperative that the Romans defeat him if they were going to eat. That doesn’t really matter either; his several years’ romp in Italy, coupled with the numerous humiliating defeats Hannibal had inflicted on them, to date, gave the Romans all the motivation they needed. Seizing the town had also given Hannibal a high perch from which he could see the Roman deployment.

                        How much of his own force Hannibal left to guard his own camp is unknown, but he must have left some. Whatever it was, however, or how many, didn’t appear to have any effect on the battle.

                        Hannibal formed his men with light infantry skirmishers out front, his Spanish and Gallic infantry in the center, his heavy Libyan spear in two blocks behind the Spaniards and Gauls, but off to the flanks. His cavalry was split into two blocks, light Numidian horse on his right (the Roman left) facing Varro and the allied cavalry, and the larger group, heavier Spanish and Gallic horse facing the Roman cavalry on the Roman right.

                        Following the indecisive play of the skirmishers, the action begins. Hasdrubal, commanding the heavy Spanish and Gallic horse, smashes into the badly outnumbered Roman cavalry on the Carthaginian left, defeating it, and then pursuing it to something close to destruction. Meanwhile, Maharbal, in command of the lighter, javelin-tossing, Numidian horse on Hannibal’s right fix the allied cavalry in position. If the allies advance, the Numidians run away. If they retreat, the Numidians pursue, wounding and killing them from behind. The Numidians are better horseman, on better horses. There is no chance for the allied cavalry to catch them. They can only sit and endure or wear themselves out with futile charges that never strike home.

                        While the cavalry action is beginning, Hannibal advances his center in a wedge or crescent. We should not understand by the latter term an actual crescent, with the troops facing outward away from some central point. That would be too hard to march them into. Rather, we should envision blocks of troops, advancing forward for a pre-ordered number of paces, such that the ones on the flanks march little if at all while the most central block advances perhaps half way to the Roman lines. A line drawn through the center of mass of each of these blocks may have formed a crescent or may have formed a wedge. It doesn’t really matter.


                        Likewise from Wiki. The date’s wrong. The orientation is wrong. The troops in the center are infantry, not cavalry. Moreover, one should not think of five blocks forming the central wedge or crescent, but something closer to fifty. Still, in broad terms, leaving aside those errors, it’s a useful illustration. [Wikimedia Commons, Department of History, United States Military Academy]

                        The Roman commander likewise ordered, “Forward, march,” at about the same time Hannibal ordered his central front to form into a crescent.

                        And that was the last action but one taken by either commander that had any effect over a substantial portion of the army. Thereafter, the play moved in accordance with the prewritten script of Hannibal.

                        To the best of my knowledge, no one has ever really explained why the Roman army began funneling into the center. Adrian Goldsworthy came close, in his book on the battle, but didn’t seem to want to commit. Here, again, is what I think happened.

                        I think the two Roman centurions of Hastati on either side of the first block of Carthaginian troops each saw an open flank and wheeled inward, left and right, to take that block in flank. They could do this because they could have confidence that the maniples to their outside flanks would move in to cover them, as would the maniple of Princeps behind them. Taken in flank like that, the Carthaginian group would have run for it, right into the gap they’d left behind when they’d advanced. Now their flanks would be covered. But for the Romans who had swung inward there was no going back; the outer maniples had moved inward and there was no real higher direction to order them out again.

                        The Romans advanced. Now they met the central block of three groups of Carthaginians. But this group still had open flanks. Again, other Roman centurions use the initiative they are expected to use, and swing in on those open flanks. They also are confident that their own flanks can be covered. Again, stung by those flank attacks, the Carthaginians retreat into the open space behind until that block of three has its flanks protected.

                        Imagine that happening twenty or twenty-five times. Not only are the Romans moving into the center of their own accord and, I am quite certain, in accordance with their own doctrine, but Hannibal is training them even more to do so. They are getting used to shifting left, if on the right, and shifting right, if on the left. They now have a kind of inertia going. This is all made worse by them being arrayed in maniples much deeper than usual. And, very likely, those spaces between maniples have disappeared, such that people are getting in each others’ way, while shocks and obstacles are being transmitted laterally throughout the Roman army.

                        I saw something like this once, as a private in the 101st. My company was marching to a parade in a block about fifteen on a side. (Yes, it was a huge company.) A car moving very slowly from a side street managed to impact the company from the side. The car was only going a few miles an hour, but that shock when it hit was sent throughout the company. People were knocked over. Even the men at the front were pushed sideways so that their progress stopped, too. Multiply that by about four hundred.

                        Meanwhile, Hasdrubal has had enough of chasing the Roman cavalry. They’ve had it, anyway. Now he returns and takes the allied cavalry from behind. They are wrecked in an instant. Maharbal and Hasdrubal pursue them for a while. Then Hasdrubal turns back, toward the Roman rear.

                        At about this point Hannibal gives the last order. The heavy Libyan spear that had been held back on the flanks swings in. There is essentially no chance of them timing the strike to hit simultaneously, but they will be very close in time. Imagine the first blow hitting on the Roman left. That shock is then, as in the example above, transmitted almost instantaneously throughout the Roman force. Anywhere from a few seconds to a few minutes later (though probably closer to the latter), the second blow falls on the Roman right. Again the shock runs through the army. Forward motion stops.

                        Then Hasdrubal falls on the Roman rear. The rest is massacre.


                        The date is still wrong. [Wikimedia Commons, Department of History, United States Military Academy]

                        There is clearly a whole bunch of maneuvering going on here. How much of it has to do with the Boyd Cycle?

                        None.

                        Oh, Hannibal observed, mind you. He could hardly help it. He had been a soldier from early childhood, grown up in his father’s army’s camp surrounded by men who knew the Roman army intimately, as only those who had fought it for years could know it. He’d fought and beaten the Roman army three times already in pitched battle. He knew how they worked. How else (if the reader accepts my theory of the maniples swinging in, and there’s really no other good way to account for the Roman funneling toward the center) could he have predicted how the Romans would react to the open flanks they were, over and over, presented.

                        That observation all took place before the battle commenced. It was quality observation, to be sure, but speed had nothing to do with it.

                        Hannibal oriented too, of course, which is to say he made an estimate of the situation. There is nothing in the record, no significant changes to his troop deployment, to suggest anything but that his orientation merely confirmed what he had already decided on.

                        He made no additional decision. He’d decided on battle well before and stuck with it. There’s no Boyd cycle in there, and of speed of the OODA loop there was none.
                        Decision and Action? As mentioned, he gave two significant orders, from just before the battle began to its end. One was “Forward into a crescent, march,” the other swung the Libyan heavy infantry inward. Both of these were already decided on, well in advance. And in the case of the latter, Hannibal was merely waiting for the right time to roll around, in the course of preplanned events, not trying to out decision cycle anybody.

                        But what of Hasdrubal? Surely his maneuvers out decision cycled somebody.
                        Not a chance. Hasdrubal acted in accordance with the orders he had been given before the battle ever commenced.

                        Between these two battles, Leuctra and Cannae, I think there is a showing of a place where decision cycle theory has some validity. It has nothing to do with maneuver warfare, but when we are discussing things that take place far from the battlefield—Research and Development (which, by the way, is what Epaminondas was doing, pre-Leuctra), Procurement, Diplomacy … these are all fields of endeavor where people do get into an OODA loop. Even these, though, show an advantage to quality of decision over speed of decision. It is generally only the good decisions which have enough of an impact to make the opponent react at all.

                        There are also a couple of other areas where I suspect decision cycle theory may have some validity. These illustrate it, by the decisions made well in advance. Let’s wait a bit on those other areas, though.

                        The Tullahoma Campaign

                        Rosecrans (Union) vs. Bragg (Confederacy)

                        23 June to 3 July, 1863

                        It’s less than clear what Lind meant by “Rosecranz (sic) at Chattanooga.” Since there’s nothing in his performance there that would suggest to the most fevered brain that anything like decision cycle theory was in operation, on either side, I suspect that what was really meant was Rosecrans in the Tullahoma campaign, which brought him to Chattanooga. Since it’s not clear just what he meant, and since Boyd’s briefing skips over Rosecrans entirely, I’m afraid I’ll be punching into a vacuum.

                        Still: Essayons.

                        What actually happened in the Tullahoma campaign? Initially, for about six months, nothing happened, beyond indecisive—though sometimes costly—cavalry skirmishing and raiding. Notwithstanding, some very important things were happening, without so much as a nod of anyone’s head toward OODA. Among these things were:
                        a) Rosecrans spent six months training his troops, building up his logistics, and planning and preparing (hmmm … how like Epaminondas and Hannibal, no, to make all the important decisions and take most of the important actions early?), and
                        b) the mounting of Wilders’ Brigade of infantry and the 39th Indiana, while equipping them with repeating rifles.

                        Note that neither of these things took place within the framework of the Boyd Cycle. Note further that Rosecrans was the subject of near continuous nagging and frequent threat of relief for cause by people who had, at least, the speed notion of the Boyd Cycle down.

                        On Bragg’s part, the positions he took up were dictated by the need to live off the surrounding countryside. There were better positions nearer to Chattanooga, for defensive purposes, but these were too barren too support his army. Even with the position he had taken up, however, living was poor and the horses underfed and weak, hence slow.

                        The offensive began on the 23rd of June, 1863, with a feint against Bragg’s left. This had the effect of concentrating Bragg’s mind on the left, though he didn’t—really, couldn’t—do much to bolster the left.

                        The decisive action began the next day, with the assault on and seizure of Hoover’s Gap by Wilder’s Brigade, and Liberty Gap by the similarly mounted, trained, and armed 39th Indiana, followed by August Willich’s infantry brigade. Of these, the former was the more important. Punching through the pickets of the Confederate 1st Kentucky Cavalry, Wilder’s command, their mounts in better condition, physically won the race to Hoover’s Gap. They didn’t decide to move quicker. They didn’t observe quicker. They didn’t orient quicker. They simply moved quicker.

                        Counterattacks to recover the gaps were, of course, thrown in by Bragg’s men. These were defeated and the gaps retained not because Wilder or Willich observed, oriented, decided, or acted quicker, but because their men shot more and better.

                        The loss of those key defensive positions at the gaps made Bragg’s position untenable. Hardee—Bragg’s subordinate commander on the right—also made a bad decision in retreating in the wrong direction. He didn’t observe too slowly. He didn’t orient too slowly. He didn’t decide too slowly. He didn’t act too slowly. Rather, he did all of these things wrongly, and without regard to decision cycle theory.

                        Lastly, although Rosecrans failed in his objective of destroying Bragg’s army, and though slowness had most to do with that, it was not slowness of Rosecrans’ OODA loop. It was because the roads were too muddy for a rapid pursuit.
                        (All the above is a one of the world rendition. I heartily recommend, to any serious student of warfare, a thorough analysis of the Tullahoma Campaign on your own.)


                        This map seems good. The 23 or 24 June date depends on whether one cares to count from Rosecrans launching the feint in the west or the setting in motion of Wilder’s Brigade in the east. [Wikimedia Commons, Hasl Jespersen]

                        Vicksburg Campaigns

                        Grant (Union) vs. Joe Johnston and Pemberton (Confederacy)

                        December, 1862 – July, 1863

                        When you’re a hammer, everything starts to look like a nail. When you’re an acolyte of decision cycle theory, everything starts to look like an OODA loop. There’s something terribly circular about the whole thing: “We believe, as an article of religious faith, that decision cycle theory and only decision cycle theory accounts for successful maneuver in war, therefore every successful maneuver in war must, a priori, be the result of the successful side making better use than the losing side of the OODA loop.”
                        The theory itself tacitly posits a certain equality between the contestants, a similar mutual existence in the same conceptual universe, as does Dickson’s Tactics of Mistake. Thus, the fighter pilots are both in armed aircraft in the air. The duelists both have swords and face each other on the field. If the effectiveness of the decision cycle depends entirely or almost entirely on other factors, then the decision cycle itself must be seen as fairly irrelevant. Thus Vicksburg.

                        The campaign opened (in the early attempt) with a Union numerical superiority between Grant and Sherman, of about six to one with regard to Pemberton’s force in Vicksburg and two to one if we count that and van Dorn’s force in Grenada. No decision that could have been made would have allowed Pemberton’s twelve thousand in Vicksburg to do a great deal about Sherman’s thirty-two thousand moving on the town, other than to sit pat and defend the town if Sherman pressed on. This Pemberton did and in this he succeeded, at Chickasaw Bayou, but there wasn’t any maneuvering or decision cycling to it, just a heads up exchange of fire and shock.

                        No decision, or at least no intelligent decision, on van Dorn’s part was going to get him out in the open to attack Grant, as Grant hoped, when the latter outnumbered van Dorn five to three. A couple of raids against Grant’s supply lines forced him to fall back. Was this speed of the OODA loop in action? That’s preposterous; it was simply a couple of good decisions, well executed, against a vulnerability caused by the totality of Grant’s physical circumstances.

                        In the next attempt, raiding back, Grant launched two cavalry raids, one by Abel Streight and another, just after, by Benjamin Grierson. Streight’s raid failed and he and his command were captured. Grierson succeeded, in good part because Nathan Bedford Forrest was busy elsewhere rounding up Streight.

                        That, by the way, was an example of decision cycle theory in action, albeit not in quite the way that Boyd or Lind might have thought. You see, Forrest was out decision cycled. This was not because he went through his own OODA loop slowly. No, it was because two enemy forces can throw more decisions at you, faster, than one can and, especially if widely separated, more than you can physically deal with. Since decision cycle theory purports to be a theory of fighting outnumbered and winning, and since greater forces can apparently toss more decisions one’s way, there would seem to be another flaw in the theory.

                        Where else, though, was a decision cycle operating at Vicksburg? When Johnston failed to strike west into the rear of Grant’s army, during the siege? No, Johnston didn’t lack the ability to make a timely decision. What he lacked was the transportation—wagons and horses—to support an army at any distance from the railhead. This was also a problem with the besieged, inside the town. Given drayage, they could have collected enough sustenance to both support themselves and make it impossible for Grant to support an army on the countryside. They knew they should, and needed no OODA loop to say so, but lacked the physical transportation to do it.

                        Or was the OODA loop operating when Porter’s riverine fleet, in two groups on two dates, ran past the guns of the town so that they could carry Grant’s army over from the west back to the east? This seems unlikely. The Confederates saw it, though it was dark, made an estimate of the situation, decided to fire and did fire … but simply lacked the physical power to stop the Union fleet.

                        Jackson’s Valley Campaign

                        Jackson (Confederate) vs. sundry Union commanders

                        March through June, 1862

                        The reverse charge, of being a nail and seeing everything as a hammer, may attach to being a decision cycle theory skeptic. There are moments in the Jackson’s Valley Campaign where something like decision cycle theory seems to be operating, sometimes in Jackson’s favor and other times against him. And yet … and yet …

                        In the first major move of the campaign, Union General Nathanial Banks moves southwest down the valley, with Jackson fleeing before him. Content with that, Banks leaves a smaller force behind and withdraws northward. At this time Jackson’s observation and orientation is timely enough, but it is wrong. His eyes, Turner Ashby’s cavalry, have badly underestimated the force left behind by Banks. Jackson decides to attack, and then does attack, but is beaten at Kernstown. (This has valuable strategic implications, for the Confederacy, mind you, but as an example of operational or tactical decision cycling…well…I’m at a loss.)

                        Next, at McDowell (the town, not the general), we see Jackson, reinforced by Ewell, observe, correctly, that a small Union force (under Milroy) is out there and vulnerable. He decides to attack it and does move to attack it. Milroy, however, also makes a correct estimate of the situation—he’s badly outnumbered—and launches a spoiling attack himself, then retreats, staying ahead of Jackson all the way to Franklin. It’s not clear that anyone actually got inside anyone else’s OODA loop at McDowell. Instead we see good and timely decisions all around.

                        Next, at Front Royal and Winchester, Jackson turns on Banks and routs him northward. Is this because Jackson got within Banks’ OODA loop? Sadly not; it’s because Banks has been ordered to send almost all his troops eastward, well out of range to reach him should Jackson attack, while Ewell and Jackson, together again, have the numbers.

                        The reader may recall my suggestion that “Shape” belongs on the list of principles of war. I’d further suggest that what happened next illustrates that better than it illustrates decision cycle theory. Lincoln, effectively taking command of the Valley from the White House, ordered Fremont, in the west, and Shields, in the east, to converge on the Valley, trapping Jackson north of them. (It’s more complex and, from Lincoln’s point of view, infuriating than that.) Jackson escaped. Was this because he was operating inside Lincoln’s decision cycle? Maybe a little, but we probably ought to credit a bit more that Jackson had the excellent macadamized Valley Pike to march down, while Fremont had crappy mountain roads.

                        And there I’ll stop, if only because this is getting tiresome, with the words that, before assigning to decision cycle theory the credit for Jackson’s Valley Campaign, it might be better to take account of the Shape of the theater and note that Jackson’s timing advantage came mostly from being able to operate along interior lines to gain numerical superiority in most of the engagements he fought.

                        The German Offensives of 1918

                        Rather than give a blow by blow breakdown of these, we should note four things: 1) The tactics employed by the Germans remain the basis of all sound offensive infantry tactics, today, and 2) they are also the basis of all sound armor tactics. The last thing to be noted, though, are that 3) the Allies were not, in fact, out decision cycled by the Germans; they were neither panicked into flight nor demoralized into passivity. Meanwhile 4), the Germans, in fact—and the reader will recall my admonition that “Attrition,” too, belongs in the list of Principles of War—simply wore themselves out.

                        This is one of the other flaws to decision cycle theory; the decisions one tosses at the enemy do not come without cost. And the cost may well break you, as it broke the Germans of 1918. (Not that they weren’t probably going to lose anyway, of course.)

                        Blitzkrieg, 1940, and 1973

                        This is an interesting one. The latter case, the Crossing of the Suez, I’ll just dismiss out of hand. Why? Because, decision cycle theory-wise, operationally speaking, being tactically minded, beating Arab armies is typically the military equivalent of stealing candy from a baby, lifting coins from the blind man’s cup, or winning a footrace with a quadriplegic. It’s just too easy for it to prove anything. They’re neither cowards nor stupid, but they have cultural traits that carry over into their armies that render those armies almost invariably unfit for battle.

                        As for France, 1940, I don’t know that it’s possible to say this better than this:
                        The fact that it worked but once is ignored. The fact that Guderian's attack was supported by attacks of attrition to his North and South is ignored. The moral, social, and military bankruptcy of France that made that nation susceptible to the effects of the indirect approach is not considered. The steadfast, heroic resistance of the outmaneuvered British surrounded at Dunkirk and the futile heroics of the French army acting as rearguard for the British evacuation-forces—which in theory should have surrendered or offered minimal resistance—is ignored. Hitler's decision to halt the Panzers is dismissed as lunacy. Given free rein, according to the argument, Guderian would have destroyed the Allied enclave. To consider his logistics diffculties, the very real threat to his flanks posed by a theoretically paralyzed enemy, and the fact that political considerations constrain maneuver in any war would destroy the myth. Better to concentrate on that portion of the French campaign that supports the illusion. From this tenuous link between theory and practice, from what Guderian proved is sometimes possible, has emerged the dogma and myth of maneuver warfare as defined by William Lind and FMFM-I.

                        Major Craig A. Tucker, USMC, False Prophets: The Myth of Maneuver Warfare and the Inadequacies of FMFM-1, Warfighting

                        In short, sure, sometimes, if everything works out for you, under the kind of ideal circumstances that almost never arise, you might be able to out-decision cycle somebody, but it’s hardly likely enough to chance the farm – or the country – on

                        Beyond the poor analogy, beyond the lack of much history to support it at all, the theory doesn’t hold up very well even in a purely intellectual realm. I’ve already hinted at much of this.

                        Consider: As discussed, decisions can be made—we might even say, built up—in advance. Try this one: Force A had stood on the defensive for months. It has used its time well. Every meter of ground is mined. Every avenue of approach is covered by heavy weapons protected by obstacles, bunkers, and entrenchments. Some of its force is on reverse slopes, where aerial and satellite recon can see it generally, but where it cannot be well targeted by ground forces. Much is hidden underground. False positions abound.

                        What is the position of the attacker, faced with all this? Imagine he is engaged, but apparently from four positions, three of which are false. He has observed. He has oriented. He decides to call in artillery on Position X, and to direct his own fires on X, but it is position Y that is engaging him (since Force A goes out of its way to make Position Y more obvious). He is out decision cycled in advance.

                        Something much like that has happened, at least at lower levels, almost every time an attacking force has attempted to force its way through a serious defense that had the entire front organized and covered. The question for the student is: is this an example of decision cycle theory supporting maneuver warfare, or of decision cycle theory crushing maneuver warfare except where the attacker had the numbers and the willingness to bleed to chew his way through?

                        Hmmm … don’t we call that, “attrition”?

                        Finally, an enemy may be content to watch you "Boyd Cycle” at the speed of light, secure in the knowledge that he is on Iwo Jima, you need Iwo Jima, and eventually you are going to have to come ashore and root him out cave by cave. That is attrition. But attrition, in the peculiar logic of Lind's maneuver warfare, is not necessary.

                        Major Craig A. Tucker, USMC, False Prophets: The Myth of Maneuver Warfare and the Inadequacies of FMFM-1, Warfighting

                        Consider, too, that if one combatant can throw x decisions at you, two can throw 2x, four can throw 4x. Is decision cycle theory then, by its own logic, not a matter of fighting outnumbered but of having the numbers? In other words, by its own logic is it not a theory of mass?

                        So, do I think decision cycle theory has no place? Not exactly. It has a place, I think, in research and development, as we can see in the tank-gun-armor races of the Second World War. It has, I think, some place in diplomacy. I lack the knowledge to say it has no place in business, generally, and suspect it might. Where it has little place, however, is on the battlefield.

                        I’ll close now with some advice I used to give my lieutenants, against the day when they would be commanders and might find their commands fighting against someone who had adopted the fantasy of decision cycle theory: “Boys, when the enemy is tossing at you more decisions, in the form of probing fingers, than you’re comfortable with, take your reserve and smash one of those fingers to bloody pulp. It will provide useful marksmanship training to your men, inject some highly desirable caution on the enemy, and make you, personally, feel much, much better.”
                        Last edited by c1ue; December 25, 2012, 08:09 PM.

                        Comment


                        • #13
                          Re: Privacy? What privacy?

                          I've got at least 100 years of mathematical, logical, and computational theory on my side and you post one bizarre article that claims to refute the entire area of science, an area of science that much of today's system is founded upon. Of course, to really understand the history, one has to go back and read and understand the likes of Weiner, von Neuman, Vannevar Bush, Turing, Beer, and Lorenz. But hey, why invest the time and energy to learn and understand the backbone of the systems that far too many of us buy-into when you can just read propaganda?

                          Let me once again summarize my position here... Computer networks have been designed and deployed for the following primary reasons:

                          (a) implement extremely granular control-feedback theory on it's users for the purpose of social control via fine-tuned pursuasion;
                          (b) break down national boundaries in preparation for globalization
                          (c) provide a global communication system for commercial enterprise under GATT
                          (d) apply social prediction techniques found under Chaos theories and models
                          (e) create a believable virtual system that is "consistent" and "complete" employing Number Theory models (based upon the findings under Godel Numbering)

                          Revocation of privacy, as depicted in this and many other "opposition" articles is a low-priority goal that is focused upon in the public domain for the purpose of fear propagation. I will grant you this, however, loss of privacy is ultimately necessary in order to support the Big data needs of accurate prediction models, so privary loss is a necessary precursor to meeting the higher level goals.

                          Edit: I suggest those intersted study the techniques that Soros employs, disregarding his fake interest in and promotion of Karl Popper, and you will find that he relies heavily on Social Cybernetics and OODA loop theory in all of his dealings.
                          Last edited by reggie; December 26, 2012, 03:31 PM.
                          The greatest obstacle to discovery is not ignorance - it is the illusion of knowledge ~D Boorstin

                          Comment


                          • #14
                            Re: Privacy? What privacy?

                            Originally posted by reggie
                            I've got at least 100 years of mathematical, logical, and computational theory on my side and you post one bizarre article that claims to refute the entire area of science, an area of science that much of today's system is founded upon.
                            That's funny, OODA isn't even 1 generation old and you're calling it 100 years?

                            I also find it amusing that you're saying that computational theory is 100 years old; we don't even have 50 years of programmable computers.

                            But hey, to a hammer - all things are OODA.

                            Comment


                            • #15
                              Re: Privacy? What privacy?

                              i dont understand how my zip is picked up by a website. I assume they can do a packet trace of some sort to my ISP. Last time I checked, I look like I live in Detroit via my ISP. I understand how if I have logged into their web site with a uid, they know my id, or use their store locator etc. Then a cookie download can probably figure out that I am a returning user. I also understand that certain companies may be selling my name and address.

                              Comment

                              Working...
                              X