Open source information and the Military Intelligence Library.
"I work for the CIA CIA: see Central Intelligence Agency.
(1) (Confidentiality Integrity Authentication) The three important concerns with regards to information security. Encryption is used to provide confidentiality (privacy, secrecy). . I am not a spy. I just read books!"
--from Three Days of the Condor Three Days of the Condor is a United States motion picture made in 1975. It was produced by Stanley Schneider and directed by Sydney Pollack. The screenplay, by Lorenzo Semple Jr. and David Rayfiel, was adapted from the novel Six Days of the Condor by James Grady.
Most movie buffs The name Buffs can mean:
As the movie illustrates, intelligence does not have to be secret to be valuable. Open source intelligence (OSINT OSINT Open-Source Intelligence ) incorporates all types of accessible and unclassified un·clas·si·fied
1. Not placed or included in a class or category: unclassified mail.
2. information sources such as books, newspapers, magazines, academic journals, government documents, radio, television, and the Internet.
Emerging Army doctrine states that relevant, accurate, and timely OSINT be provided to commanders at all levels. This is to be accomplished by integrating OSINT into all disciplines and functions by exploiting the Information Age to make OSINT a vital intelligence resource. (1) The research library is a vital link in this effort. This article shows how a new vision and model of library services transformed an under-used and under-funded library into a dynamic intelligence research center focusing on open source (OS) information and value-added services. The U.S. Army Military Intelligence (MI) Library (2) at Fort Huachuca Fort Huachuca is an United States Army installation. It is located in Cochise County, in the Southeastern part of the state of Arizona, approximately 15 miles north of the border with Mexico. , Arizona, illustrates the application of this model, meeting the information needs of the OSINT user and aligning the mission of the research library to the mission of the MI professional. This model moves the MI Library beyond the traditional role of a "place" to house books and other resources to a research center with value-added intelligence services.
The Research Library Mission
Historically, the mission of a research library has been to acquire information (the collection), organize it, preserve it, and make it available. The mission of the Intelligence professional is also to acquire and organize information; however, this information is then analyzed and turned into intelligence. Without getting into a formal doctrine definition, the simplest definition of intelligence can be attributed to Sun Tsu in The Art of War. Know thine enemy." In order to win on the battlefield, intelligence about the enemy is necessary. For the MI Library to support the MI mission today, the library must focus on the Global War on Terrorism Terrorist acts and the threat of Terrorism have occupied the various law enforcement agencies in the U.S. government for many years. The Anti-Terrorism and Effective Death Penalty Act of 1996, as amended by the usa patriot act (GWOT GWOT Global War on Terrorism ).
Providing access to public or OS information has been the focus of libraries for hundreds, if not thousands, of years. Formats have evolved from the clay tablets found in ancient Mesopotamia five thousand years ago to the digital formats of today. (3) Unlike its classified counterparts (i.e., Human Intelligence, Signals Intelligence, Imagery Intelligence Intelligence derived from the exploitation of collection by visual photography, infrared sensors, lasers, electro-optics, and radar sensors such as synthetic aperture radar wherein images of objects are reproduced optically or electronically on film, electronic display devices, or other ), OSINT draws from information found in the open, unclassified world of secondary sources. This is the world of the research library. Because of limited financial resources and the expense of information sources, the following guidelines were important considerations in implementing this new library model at the Army MI Library.
The model implemented at the MI Library called for a new library marketing and promotion strategy--a new vision of library services. Although one would think that this step should happen after developing the collection, it was important that the vision and marketing strategy happen early in the process. Many of the younger soldiers today do not appreciate libraries and actually want to avoid them. A wonderful OS collection can be built, but if no one uses the library or knows about the resources, then the effort has been in vain. If new soldiers beginning their career in Intelligence develop an enthusiasm and appreciation of the value of OS resources early on, they will utilize these resources even after leaving the schoolhouse.
This model calls for a new library "image" which better meets this generation's learning style. An article in College Student Journal describes this generation very well.
"The world of contemporary students is bombarded with noise, color, and action; even their entertainment is interactive and high tech. This new environment has impacted all levels of education." (4)
This statement is probably even more accurate when describing military students--they thrive on action or they would not have joined the military! The traditional library image is the opposite of what today's generation is accustomed to.
Utilizing this new vision of library services, the MI Library increased attendance by 850 percent by creating a new model of library service and pursuing a new marketing strategy. The vision for the MI Library is focused on a simple strategy: Get the customers to come to the library and create enthusiasm for using open source resources. Lure them in and then hook them! Change the image of the library. Make the library fun, comfortable, and relaxed. Create an environment that is extremely customer-focused.
"If you build it, they will come" does not always work. Some bookstore chains have transformed their image with great success--customers drink a cup of coffee and relax in a comfortable chair while reading books. Why would a profit based business allow customers to read the books without first buying them? Why would they risk having coffee spilled on the materials? The answer is simple: It is a marvelous marketing strategy which brings in the customers.
The marketing strategy of the MI Library includes briefings to all leaders, Open Houses, newsletters, class presentations, and library orientations.
Borrowing from the success of the chain bookstores, free coffee is always available to the customers. With comfortable chairs, music in the background, ice cream and soda machines, Internet access See how to access the Internet. , cable news, and videos, the MI Library attracts around 9000 customers a month. Before implementing the new library model, the MI Library was fortunate to have 50 customers a month. The soldiers may initially come for the coffee and ambience am·bi·ence
Variant of ambiance.
ambience or ambiance
the atmosphere of a place
Noun 1. , but judging from the circulation increase of over 500 percent, they soon start reading journals, perusing the military reading lists, and checking out books. Eating is allowed in the library and many customers, utilizing the microwave, eat breakfast and lunch while studying. This library is a place where the customers never hear "Shh SHH Sonic Hedgehog
SHH Super Hero Hype
SHH Sacred Heart Hospital (Allentown, Pennsylvania)
SHH Hickory Shad (FAO fish species code)
SHH Sonic Hedge Hog
SHH Shishmaref, Alaska !"
Tailor the Collection and Services
Tailor the collection to meet specific needs of the intelligence customer. Go for depth; not breadth. Consistent evaluation, feedback, and needs assessments from the OSINT user are necessary to meet the OS information needs created by such a rapidly changing world. (5) Research libraries, academic libraries, and special libraries are all similar because they do not attempt to collect everything; they do not try to be "all things to all people." The MI Library model proposes that the library focus on the present needs of the customers. What are the specific issues of the customer? What world events are taking place? How do these events impact the MI professional?
Continual needs assessments, surveys and evaluations of the existing services and resources are necessary to meet the needs of the customer. For example, before implementing this model, an evaluation of the present library collection at the MI Library found that 85 percent of the resources were over 25 years old with most focusing on the Cold War era. Based on an assessment of current world events and needs of the MI professional, an aggressive collection development plan was implemented in the areas of the Middle East and the GWOT. The customer surveys also indicated that longer hours were needed at the library since many of the MI customers could not use the library except at night. Library hours were increased by over 40 percent; the MI Library is now open 13 hours per day and on the weekend.
Provide Value-Added Services
Value-added services at the MI Library include an OS Lab with virtual private network (VPN (Virtual Private Network) A private network that is configured within a public network (a carrier's network or the Internet) in order to take advantage of the economies of scale and management facilities of large networks. ) connectivity to the Open Source Information System (OSIS OSIS Open Source Information System (now Intelink-U; US DOD)
OSIS Ocean Surveillance Information System
OSIS One-Stop Internet Shop (European Union)
OSIS Open Scriptural Information Standard ), instructional briefings in using OSIS, a National Geospatial-Intelligence Agency (NGA) Digital Map Library, and a Computer Center. To have an OS Lab is not enough--the value of OSIS as one-stop shopping for intelligence resources has to be aggressively promoted. Enthusiasm for OSIS is generated through class briefings, instruction, and OSIS demonstrations to include MI Corps leaders.
Almost 50 computers with Internet access are available to the customers, as excellent intelligence related sources are available via the Internet. Many of the students use the computers to write papers, build PowerPoint[TM] presentations, use FormFlow[TM] to fill out paperwork, take distance learning classes, book travel arrangements and take online surveys. A keyboarding tutorial program was even initiated at the library to assist the MI students who were having difficulty in class because typing skills slowed down their ability to write reports. Another popular value-added service A value-added service (VAS) is a telecommunications industry term for non-core services or, in short, all services beyond standard voice calls and fax transmissions. is the new multi-media instruction room, with customers reserving this room for meetings, classes, role-playing activities, etc. Value-added services are not just the domain of the physical library, but can also be provided by the digital library through pathfinders 1. Experienced aircraft crews who lead a formation to the drop zone, release point, or target.
2. Teams dropped or air landed at an objective to establish and operate navigational aids for the purpose of guiding aircraft to drop and landing zones.
3. (6), portals, and a virtual reference service. The heart of the "brick and mortar See bricks and mortar. " library is its collections. However, the soul of the library is its vision, value-added services and customer focus.
Leveraging sources is another guideline in implementing the new library model. Simply put, this means that the MI Library does not purchase anything that can be obtained for free. Commercial databases are very expensive and most small libraries cannot afford the license or access fee. As depicted in Table 1, Army Knowledge Online (AKO Ako (äkō`), city (1990 pop. 51,131), Hyogo prefecture, W Honshu, Japan, on the Harima Sea. Relying on its steel and chemical industries, Ako has become one of Japan's most polluted industrial cities. ) and OSIS licenses commercial databases. The MI Library leverages these sources and does not duplicate effort and expense.
OS information also resides in many databases on the Internet. However, this information cannot be accessed using a search engine like Goggle gog·gle
v. gog·gled, gog·gling, gog·gles
1. To stare with wide and bulging eyes.
2. To roll or bulge. Used of the eyes.
To roll or bulge (the eyes). . This information is considered "invisible" or "deep web" because it resides on a website designed around a database, there are no static pages to index (See Table 2 below). Some commercial vendors often create fee-based databases; with public information. For example, an 89 page thesis from the Naval Postgraduate School The Naval Postgraduate School is a graduate school operated by the United States Navy. Located in Monterey, California, it grants primarily master's degrees plus some doctoral degrees to its students, who are mostly active duty officers from U.S. and foreign military services. can be obtained for free by searching the Science and Technical Information Network (STINET STINET Scientific and Technical Information Network ) database. However, this same thesis is offered by several commercial vendors with a price tag of around $25.00.
Although a cliche, this is the Information Age. Information, whether it is classified or open source, wins battle and wars. The library of the 21st century has no walls, no set hours, and no geographical constraints. Access issues are as important as ownership issues. The MI Library is both a physical "brick and mortar" library and a virtual library with information available anytime from anyplace an·y·place
To, in, or at any place; anywhere. See Usage Note at everyplace.
Adv. 1. anyplace - at or in or to any place; "you can find this food anywhere"; (`anyplace' is used informally for `anywhere')
anywhere . The physical library and the virtual library both develop collections. Traditionally, collection development has been defined as the planned purchase of materials in various formats to match the instructional and research needs of the customers. However, today these collections can be owned, licensed, or just accessed.
The virtual collection is just as important as the physical collection, but has different considerations and constraints. In addition to the library catalog catalog, descriptive list, on cards or in a book, of the contents of a library. Assurbanipal's library at Nineveh was cataloged on shelves of slate. The first known subject catalog was compiled by Callimachus at the Alexandrian Library in the 3d cent. B.C. pointing the customer to what is owned by the library, the Internet can be viewed as a gigantic catalog of information sources available worldwide. However, this information has to be tailored to the information needs of the OSINT user. A value-added service to the customers is to sort and filter the myriad of online sources and create pathfinders and portals on the library website (See Table 3 below).
When possible, the collection should reflect both physical sources available in the library, as well as accessible digital sources. By exploiting technology, the library catalog of today not only reflects what is owned by the library, but also shows digital sources on the Internet. Even if a source is not owned by the library, it can be cataloged and accessed the same as an owned, physical source. With a click of the mouse, the online source or virtual reference is available.
The physical library collection is important if one lives or works near it. However, for most of us, a virtual library is necessary. The MI soldier transfers frequently to new locations and needs to consistently access sources regardless of geographic location. The MI Library provides a website with online access to the library catalog. A full time virtual model of library reference services is also available (Table 4 below). Collaboration and sharing of files via listserves and knowledge communities are important for the MI professional (Table 5 below).
In conclusion, Intelligence professionals are working in a different environment today. Stephen Mercado For the hispanic surname "Mercado", please see de Mercado.
Mercado first originated in Spain. In English it means 'market'.
Is the last name of the 'Great' Fifa Soccer player Eswold. in an article in Studies in Intelligence says it best:
"Collecting intelligence these days is at times less a matter of stealing through dark alleys in a foreign land to meet some secret agent than one of surfing the Internet under the fluorescent lights of an office cubicle to find some open source. The world is changing with the advance of commerce and technology. Mouse clicks and online dictionaries today often prove more useful than stylish cloaks and shiny daggers in gathering intelligence required to help analysts and officials understand the world." (7)
This article presents a model that moved the MI Library beyond the traditional role of a place to house books to a dynamic research center with value-added intelligence services and sources, such as an OS Lab. This model includes a new marketing strategy and image for the library which better meets this generation's learning style. By leveraging sources and exploiting technology, the MI Library is an important link in the MI Corps' effort to make OSINT a vital intelligence resource.
Editor's Note: The MI Library has been chosen by the Library of the Congress as the Federal Information Center of the Year for 2005.
(1) INSCOM INSCOM United States Army Intelligence & Security Command Open Source Intelligence (OSINT) Operations Handbook, May 2003.
(2) U.S. Army Military Intelligence Library URL URL
in full Uniform Resource Locator
Address of a resource on the Internet. The resource can be any type of file stored on a server, such as a Web page, a text file, a graphics file, or an application program. : http://www.universityofmiltaryintelligence.us/mi_library/default.asp.
(3) History of Libraries, at http://encarta.msn.com /encyclopedia_761564555_16/Library_(institution).html#s76.
(4) Gary W. Howard, Holly Howard Ellis, and Karen Rasmussen, "From the Arcade to the Classroom: Capitalizing on Students' Sensory Rich Media Preferences in Disciplined-based Learning," College Student Journal 38, 3 (2004): 431-440.
(5) Wyn Bowen, "Open-Source Intelligence: A Valuable National Security Resource," Janes intelligence Review 11, 11 (1999), 50-54.
(6) A pathfinder pathfinder /path·find·er/ (path´find?er)
1. an instrument for locating urethral strictures.
2. a dental instrument for tracing the course of root canals.
n. is a list of sources in a specific subject area.
(7) Stephen C. Mercado, "Sailing the Sea of OSINT in the Information Age," Studies in Intelligence 48, 3 (2004). At http://www.odci.gov/csi/studies/vol48no3/article05.html.
Dr. Vee Herrington is the Chief of the U.S. Army Military Library at Fort Huachuca. Arizona. Past recent positions include Business Intelligence Specialist and Corporate Librarian for Lucent Technologies. In addition to a Master's Degree in Information and Library Science from the University of Tennessee The University of Tennessee (UT), sometimes called the University of Tennessee at Knoxville (UT Knoxville or UTK), is the flagship institution of the statewide land-grant University of Tennessee public university system in the American state of Tennessee. . Dr. Herrington holds a PhD in Education from Arizona State University Arizona State University, at Tempe; coeducational; opened 1886 as a normal school, became 1925 Tempe State Teachers College, renamed 1945 Arizona State College at Tempe. Its present name was adopted in 1958. and a Master's Degree in School Psychology from the University of Cincinnati The University of Cincinnati is a coeducational public research university in Cincinnati, Ohio. Ranked as one of America’s top 25 public research universities and in the top 50 of all American research universities, . Her other published works include 'Way Beyond BI: A Look to the Future." Journal of Academic Librarianship, September: 1998 and "Toward a New Paradigm New Paradigm
In the investing world, a totally new way of doing things that has a huge effect on business.
The word "paradigm" is defined as a pattern or model, and it has been used in science to refer to a theoretical framework. of Library Instruction in the Digital Library," 2nd European Conference on Research and Advanced Technology for Digital Libraries, September 1998. Readers can reach Dr. Herrington at vee.herrington@us. army.mil An Internet address domain name for a military agency. See Internet address.
(networking) mil - The top-level domain for entities affiliated with US armed forces. or the MI Library homepage at http ://www.universityofmilitaryintelligence.us/mi_library/default.asp.
Table 1. Commercial Fee-Based Databases. Information Need Army Knowledge Open Source Information Online (1) System (2) http://us.army.mil http://www.osis.gov Index for full-text Academic Search Academic Search Premier journal, magazine Premier MasterFile and newspaper Premier articles Defense and Military Periscope Jane's Online Information Military & Government Collection Country Studies CountryWatch Oxford Analytica publications via China Vitae Military and Government Collection Terrorism Periscope Jane's Online Global Analysis and Oxford Analytica Events Jane's Online World Economic and The Economist Business Indicators Oxford Analytica The Economist Intelligence Unit (EIU Data Services) http: //www.cosp.osis.gov/ Note: pages/eiu.htm (1.) Accessing Databases via AKO. Login to AKO. At bottom left, click on Reference tab then Army Libraries tab to reach the Library Reference Center. Select title from "Databases and Resources by Title" (right frame). (2.) OSIS Account and VPN Software. To access OSIS http://www.osis.gov a password and virtual private network (VPN) connectivity are needed. The OSIS link will not open until the customer has connected to the OSIS via VPN software. Passwords and VPN software can be obtained via AKO. Login to AKO. Do a search on "DA-IIS", which stands for the Department of Army Intelligence Information Services. This page guides the user to getting a password for OSIS and downloading the VPN connectivity software. Table 2. Deep Web or Invisible Web Databases. Information Need Location Scholarly documents Google Scholar: Public Internet at across disciplines http://scholar.google.com/ Google Scholar searches specifically for scholarly literature, including peer-reviewed papers, theses, books, preprints, abstracts and technical reports from all broad areas of research. Lessons Learned: Center for Army Lessons Learned (CALL): Intelligence Public Internet at http://call.army.mil/ or use AKO password for FOLIO. Intelligence Center Online Network (ICON): Observations, Insights, and Lessons Learned (OIL): Public Internet with AKO password at http://iconportal.hua.army.mil Scientific and Defense Technical Information Center Technical Information (DTIC): Public Internet with password at http://www.dtic.mil DTIC Research & Engineering Portal: Public Internet with password at https://rdte.osd.mil. Scientific and Technical Information Network (STINET): Public Internet with password at https://dtic-stinet.dtic.mii/. This site is more restricted than DTIC. Intelligence, Emerging World Basic Information Library (WBIL): Threats, Defense, and Research library located on OSIS and Military Information managed by the Foreign Military Studies Office (FMSO). Worldwide Intelligent Road/Rail Information System Infrastructure (IRRIS): This is a web-based portal to worldwide infrastructure and real-time data. Public Internet with password at https://www.irris.tea.army.mil/irris/site/. Request account at https://www.irris.tea.army.mil/site/ default.htm. Intelligence: Field Reimer Digital Library Manuals and http://atiam.train.army.mil/soldierPortal/ Regulations appmanager/soldier/start? Nfp b=true&pageLabel=rdlservices page Intelligence: Army Doctrine and Training Publications: Doctrine and Training Use AKO password. https://akocomm.us.army.mil/usapa/doctrine/ 34SeriesCollection-l.html Note: Some database sites require registration or OSIS password. Table 3. Examples of Pathfinders and Portals. Name Location Air War College http://www.au.af.mil/au/awc/awcgate/ awc-ntel.htm Army War College http://carlisle-www.army.mil/library/ Bibliographies bibliographies.htm Air University http://www.au.af.mil/au/aul/bibs/ Bibliographies bib97.htm Table 4. Virtual References. Name Location Army Libraries Reference Access through AKO "Reference" Center "Ask the Librarian" US Army MI Library Virtual http: Reference //www.universityofmilitaryintelligence. "Ask A Librarian" us/mi_library/default.asp Table 5. Communities and Listserves. Name Location Intelligence Community Access through AKO "Army Organizations" Military Intelligence email@example.com Information Sharing Intelligence Center Use AKO password Online Network http://iconportal.hua.army.mil Community Collaboration Blogging and web publishing. Access via Environment OSIS at http://www.osis.gov//cce/ Intelligence Community Access via OSIS at Library Consortium http://web.iclc.osis.gov Note: Some database sites require registration or OSIS password.