Tuesday, December 14, 2004

"Open Source Warfare" vs. "Arcane Use for Power"

SETEC ASTRONOMY aside, there really are TOO MANY SECRETS. But enough with the anagrams…

Question: Has information secrecy, and the concept of secrets in general, outlived its usefulness?

I’ll go ahead and give a bold answer, and then try to support it: secrecy is an inefficient and outmoded symptom of hierarchy. While this theory has many adherents in the intellectual property and computer programming worlds, it is nearly universally rejected in the areas of foreign policy, security and warfare. Why?

First, let’s take a look at the mechanics of secrecy. Secrecy is based on constraining information access to select nodes in an organizational structure, which in turn creates new chains of information flow (see Diagram 1). Sometimes, due to the associated need to ensure secure transmission of secrets, additional communication links must be established between two nodes with access to a secret: one for non-secret communication, and another for secret communication. This burdens the communications structure of an organization. When our subject is a hierarchal structure, the extra burden imposed by secrecy further compounds the primary weakness of the organizational structure: the energy allocated to information processing. As R. A. Wilson has demonstrated, at some point in its growth, the information processing burden of a hierarchal structure exceeds the other efficiency gains of hierarchy. The demands of secrecy quickly mushroom (DoD has more than 6 levels of information classification transmitted over more than 4 separate and non-interacting networks), creating an extremely inefficient system.

Is this inherent inefficiency a cost worth paying for protecting critical secrets? That is the conventional wisdom, but I am proposing that there are two main reasons why secrets are not worth the cost of protecting them: the OODA loop and Economic Game Theory.

OODA loop

Air Force Colonel John Boyd developed the OODA loop model: Observation – Orientation – Decision – Action. It models how military forces (and almost anyone else) process information. An organization’s information processing capabilities are committed to observing a situation, orienting themselves and their goals to the observed situation, making a decision on how to act in order to best realize their goals given the situation, and then taking that action. Every step in the OODA loop is dependent on the information processing capability of an organization, and involving secrecy in the process slows the realization of action based on a given observation. The time that information remains in the loop before it is acted upon is critical: action is never based upon a current observation of a situation, but rather is based upon an observation of how a situation was at the time that the observation was made and the OODA loop process was initiated. While secrecy of information may prevent decisions and actions from getting into the hands of the enemy, it also results in taking action on increasingly outdated information. In contrast, the absence of secrecy of information, or open source warfare, facilitates a much faster OODA loop process, which grounds decisions and actions in much more current information. An enemy can only take advantage of available information if their OODA loop operates quickly enough to observe the available information, orient their goals to it, make a decision and take action inside the time frame of their opponent’s OODA loop. This is the fundamental information battleground: getting inside your opponent’s OODA loop. Secrecy or availability of information is irrelevant if your loop is quicker than your opponent’s, and secrecy only serves to slow down your loop!

Economic Game Theory

The second reason why secrets are not worth the cost of protecting them draws on economic game theory. Specifically, I will use the prisoner’s dilemma model. Conventional wisdom suggests that one should guard information about plans to exploit, harm or take advantage of another party, as the other party may react negatively if they learn of this information. First, I should point out that if Party A’s OODA loop operates more quickly than the OODA loop of Party B, it won’t matter if Party B finds out Party A’s nefarious intentions – it will be too late. But, more controversially, I will suggest that it is always in Party A’s best interest not to adopt plans to exploit, harm or take advantage of Party B in the first place. The Prisoner’s Dilemma will explain why:

For those not familiar, the prisoner’s dilemma is based on the following scenario: two thieves, X and Y, are arrested for collaborating on a robbery, and are held in separate cells for interrogation. If neither X nor Y confess and rat on the other, then neither serves jail time. If X confesses and rats on Y, but Y refuses to confess and give up X, then X gets a reduced sentence and Y goes to jail for a long time (and vice versa). If both X and Y independently confess and rat on the other, then both go to jail for an intermediate period. So, if you are X, and don’t know what Y will do, what action do you take?

If this process only plays out a single time (as with criminals), then it is difficult to reach an optimal conclusion: you don’t know what Y will do. But if this process plays out over and over again with the same actors (as in international relations, trade sanctions, etc.), then both parties can make calculations based on their counterparts previous actions. If the cycle is stuck in a process of reciprocal retaliation (both X and Y ratting on the other out of mistrust), then X has the option of making a conciliatory gesture—not confessing and ratting out Y. While X may suffer increased consequences in the short term, in the long run Y will realize that by working with X and not ratting each other out, they can both enjoy greatly increased benefits. Likewise, by not adopting plans to exploit, harm or take advantage of one’s counterparts, in the long run trust will build and parties can engage in mutually beneficial actions: free trade, information sharing, reduced protective and defensive expenditures, etc.

And here’s the kicker: the most efficient way to get other players to enter into cooperative, mutually beneficial endeavors with you is to adopt a comprehensive policy of no secrets. If you don’t have secrets, if you don’t have the capability to process information secretly, then trust builds very quickly that you do not have a secret motivation behind your friendly gesture.

Bottom line: information secrecy is not worth the cost. Faster OODA-loop processes prevent a potential adversary from exploiting your open information, and the Prisoner’s Dilemma demonstrates that your openness will increase interaction efficiency for all parties, over time.

7 comments:

Jason Godesky said...

Actually, secrecy isn't much used in computer programming, either. At least not in cryptology. The case of ENIAC highlights the uselessness of secrecy to maintain a secure code. Something like the RSA algorithm is much more secure, since there's no "master key" you have to worry about falling into "enemy" hands.

So I guess the only place where secrecy still holds any pride of place is in the lawyers' world, where the divorce between theory and reality is sufficiently large to tolerate such absurd notions. The strict mathematical nature of computer programming, I have found, often lays bare such foolishness.

I'm wondering also what you think of emerging applications of the "open source" paradigm to fields other than computer programming, such as journalism with the recent emergence of "the Blogosphere," or to the arts with Larry Lessig's Creative Commons Project.

Jason Godesky said...

Sorry, not ENIAC (the first computer), but Enigma, the German cipher in World War II.

fdg said...

I like your blog. Thank you. They are really great . Ermunterung ++ .
Some new style Puma Speed is in fashion this year.
chaussure puma is Puma shoes in french . Many Franzose like seach “chaussure sport” by the internet when they need buy the Puma Shoes Or nike max shoes. The information age is really convenient .




By the way ,the nike max ltd is really good NIKE air shoes ,don’t forget buy the puma mens shoes and nike air max ltd by the internet when you need them . Do you know Nike Air Shoes is a best Air Shoes . another kinds of Nike shoes is better . For example , Nike Air Rift is good and Cheap Nike Shoes .the nike shox shoes is fitting to running.



Spring is coming, Do you think this season is not for Ugg Boots? maybe yes .but this season is best time that can buy the cheap ugg boots. Many sellers are selling discounted. Do not miss . Please view my fc2 blog and hair straighteners blog.
.thank you .


I like orange converse shoes ,I like to buy the cheap converse shoes by the internet shop . the puma shoes and the adidas shoes (or addidas shoes) are more on internet shop .i can buy the cheap nike shoes and cheap puma shoes online. It’s really convenient.
Many persons more like Puma basket shoes than nike air rift shoes . the Puma Cat shoes is a kind of Cheap Puma Shoes .
If you want to buy the Cheap Nike Air shoes ,you can buy them online. They are same as the Nike Air shoes authorized shop. Very high-caliber Air shoes and puma cat shoes . the cheap puma shoes as same as other.




polo shirts

ralph lauren polo shirts
chaussure puma

chaussure sport



chaussures puma

puma CAT

ed hardy clothing

ed hardy clothes



ed hardy womens

ed hardy sunglasses

fdg said...

http://www.myshoess.com/cheap-shoes-show
http://danacarnegie.blog126.fc2.com
http://nlla20.blog126.fc2.com
http://fashion-ugg-boots.blogspot.com
http://fengwind789.blogspot.com
http://cheap-puma.blogspot.com

j said...

Burberry polo shirt the steady, solid, so many young girls also love it. Speaking of people of a ralph lauren polo, think it a sign of nobility elegant waving in the horse club.spyder jacket in the cold in your winter activities can be easily.columbia jacket it is expensive, but here you do not need to consider the price of it. the north face jacket one of my favorite money, I do not know how many in this world of its fans.
ed hardy clothing
ed hardy clothes
ed hardy shirts
ed hardy t-shirts
ed hardy sunglasses
ed hardy mens
ed hardy womens
Wholesale Handbags
Cheap Handbags


In preparation for the purchase of a tennis racquetbefore, we must consider your financial ability to bear; On this basis, a further comparison, as far as possible, choose your tennis racket. Now a lot of cheap tennis racquet and more mixed materials, the proportion of mixed-use to control the stiffness of the tennis racquet discount and the shock-absorbing capacity, the more rigid cheap tennis racket, the swing more powerful force; but the relative resilience of the shock-absorbing capacity and discount tennis racket performance of talks on the easier it is for the wrist and elbow injury.
head junior tennis racket
wilson tennis racquet
wilson tennis racket
head tennis racket
babolat tennis racket
Womens Handbags
Cheap Purses
Designer Handbags

nike said...

http://www.shoesbuying.com/ : 2009 nike shoes
http://www.shoesbuying.com/2009-nike-shoes-c-153.htm : new nike shoes
http://www.shoesbuying.com/air-max-classic-bw-c-185.htm : Women's max
http://www.shoesbuying.com/mens-max-93-c-188.htm : Men's max 93
http://www.shoesbuying.com/nike-shox-c-165.htm : nike shox
http://www.shoesbuying.com/nike-force-c-174.htm : Nike air force
http://www.shoesbuying.com/nike-2003-c-181.htm : Nike air max 2003
http://www.shoesbuying.com/nike-air-max-ltd-c-166.htm : nike air max ltd
http://www.shoesbuying.com/nike-air-max-tn-c-167.htm : nike air max tn
http://www.shoesbuying.com/nike-rift-shoes-c-162.htm : Nike air rift
http://www.shoesbuying.com/nike-yeezy-c-184.htm : Nike air Yeezy
http://www.shoesbuying.com/nike-airmax-c-154.htm : nike airmax
http://www.shoesbuying.com/nike-airmax-c-155.htm : Nike air max 90
http://www.shoesbuying.com/nike-airmax-c-157.htm : Nike air max 97
http://www.shoesbuying.com/nike-birds-nest-shoes-c-152.htm : nike birds nest shoes
http://www.shoesbuying.com/nike-dunk-high-c-177.htm : nike dunk
http://www.shoesbuying.com/nike-shoes-c-168.htm : nike RT1 shoes
http://www.shoesbuying.com/nike-sb-c-180.htm : nike SB
http://www.shoesbuying.com/nike-shox-shoes-c-156.htm : nike shox shoes
http://www.shoesbuying.com/nike-shox-shoes-c-158.htm : Nike shox OZ shoes
http://www.shoesbuying.com/nike-shox-shoes-c-159.htm : Nike shox R2 shoes
http://www.shoesbuying.com/nike-shox-shoes-c-160.htm : Nike shox R3 shoes
http://www.shoesbuying.com/nike-shox-shoes-c-163.htm : Nike shox R4 shoes
http://www.shoesbuying.com/nike-shox-shoes-c-164.htm : Nike shox R5 shoes
http://www.shoesbuying.com/nike-shox-c-171.htm : Nike shox TL3
http://www.shoesbuying.com/nike-trainers-lovers-c-118.htm : nike trainers lovers

http://www.racketsoffer.com/ : tennis rackets
http://www.racketsoffer.com/wilson-racquets-c-19/ : Wilson tennis rackets
http://www.racketsoffer.com/head-racquets-c-18/ : HEAD tennis rackets
http://www.racketsoffer.com/babolat-racquets-c-17/ : Babolat tennis rackets

theprophet said...

There was this guy who believed very much in true love and decided to take his time to wait for his right girl to appear. He believed that there would definitely be someone special out there for him, but none came.
Every year at Christmas, his ex-girlfriend would return from Vancouver to look him up. He was aware that she still held some hope of re-kindling the past romance with him. He did not wish to mislead her in any way. nike shoxsSo he would always get one of his girl friends to pose as his steady whenever she came back. That went on for several years and each year, the guy would get a different girl to pose as his romantic interest. So whenever the ex-girlfriend came to visit him, she would be led into believing that it was all over between her and the guy. nike womens shoes The girl took all those rather well, often trying to casually tease him about his different girlfriends, or so, as it seemed! In fact, the girl often wept in secret whenever she saw him with another girl, but she was too proud to admit it. Still, every Christmas, she returned, hoping to re-kindle some form of romance. But each time, she returned to Vancouver feeling disappointed.
Finally she decided that she could not play that game any longer. puma mens shoes Therefore, she confronted him and professed that after all those years, he was still the only man that she had ever loved. mens puma shoesAlthough the guy knew of her feelings for him, he was still taken back and have never expected her to react that way. He always thought that she would slowly forget about him over time and come to terms that it was all over between them. nike shox Although he was touched by her undying love for him and wanted so much to accept her again, he remembered why he rejected her in the first place-she was not the one he wanted. nike 360 air maxSo he hardened his heart and turned her down cruelly. nike running shoesSince then, three years have passed and the girl never return anymore. They never even wrote to each other. NIKE air shoes The guy went on with his life..... still searching for the one but somehow deep inside him, he missed the girl.
On the Christmas of 1995, he went to his friend's party alone. "Hey, how come all alone this year? Where are all your girlfriends? What happened to that Vancouver babe who joins you every Christmas?", asked one of his friend.nike air max He felt warm and comforted by his friend's queries about her, still he just surged on.
Then, he came upon one of his many girlfriends whom he once requested to pose as his steady. He wanted so much to ignore her ..... not that he was impolite,wholesale nike shoes but because at that moment, he just didn't feel comfortable with those girlfriends anymore. nike shox torchIt was almost like he was being judged by them. The girl saw him and shouted across the floor for him. Unable to avoid her, he went up to acknowledge her.
"Hi......how are you? Enjoying the party?" the girl asked.
"Sure.....yeah!", he replied.
She was slightly tipsy..... must be from the whiskey on her hand.