Gotowa bibliografia na temat „United States. Central Intelligence Agency. Office of Support Services”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „United States. Central Intelligence Agency. Office of Support Services”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "United States. Central Intelligence Agency. Office of Support Services"

1

Schreiner, James. "Foreword by Guest Editor LTC James H. Schreiner, PhD, PMP, CPEM". Industrial and Systems Engineering Review 8, nr 1 (6.03.2021): 1. http://dx.doi.org/10.37266/iser.2020v8i1.pp1.

Pełny tekst źródła
Streszczenie:
FOREWORD This special issue of the Industrial and Systems Engineering Review highlights top papers from the 2020 annual General Donald R. Keith memorial capstone conference held at the United States Military Academy in West Point, NY. The conference was certainly a first of its kind virtual conference including asynchronous delivery of paper presentations followed by synchronous question and answer sessions with evaluation panels. Following a careful review of 63 total submissions, eleven were selected for publication in this journal. Unique to this year’s special edition is the mixed selection of seven project team capstone papers, and four honors research papers. Each paper incorporated features of systems or industrial engineering and presented detailed and reflective analysis on the topic. Although there are many elements which cut across the works, three general bodies of knowledge emerged in the papers including: systems engineering and decision analysis, systems design, modeling and simulation, and system dynamics. Systems Engineering and Decision Analysis topics included three unique contributions. Recognized as ‘best paper’ at the 2020 virtual conference, the work of Robinson et al. designed a multi-year predictive cost engineering model enabled through an MS O365 Power BI decision support interface to support U.S. Army Corps of Engineer (USACE) inland waterway national investment strategies. Schloo and Mittal’s work presents research in testing and evaluation of the Engagement Skills Trainer (EST) 2000 towards improving real-world soldier performance. Gerlica et al. employs a robust and scalable K-means clustering methodology to improve decision making in defensive shift schemes for Air Force Baseball outfield personnel. Systems Design works included three unique contributions. Binney et al. worked to design evaluation criteria for military occupational specialties associated with open-source intelligence (OSINT) analysts for the Army’s OSINT Office. Hales et al. interdisciplinary work aided in the design of search and identification systems to be incorporated on autonomous robotics to enable survivability improvements for the Army’s chemical, biological, radiological, nuclear, and explosives (CBRNE) units. Burke and Connell evaluated and designed a performance measurement-based assessment methodology for U.S. Pacific Command’s Key Leader Engagement process. System modeling and simulation included three unique contributions: Arderi et al. simulated and assessed how the Hyper-Enabled Operator (HEO) project improves situational awareness for U.S. Special Forces using the Infantry Warrior Simulation (IWARS). Blanks et al. employed a VBA module and Xpress software for a scheduling optimization model for enhancement of final exam scheduling at the U.S. Air Force Academy. Kelley and Mittal utilized a Batch Run Analysis and Simulation Studio (BRASS) program to batch multiple iterations of IWARS scenarios to study the integration of autonomous systems alongside military units. Finally, two unique contributions utilizing system dynamics (SD) modeling is presented: Dixon and Krueger developed a Vensim SD model to examine how policy recommendations across Central America could restrict gang activities while positively promoting women’s involvement in society. Cromer et al. utilized systems design approaches and a K-means clustering machine learning techniques to develop SD models in support of the U.S. Africa Command and Defense Threat Reduction Agency to examine the interdependence of threats across the Horn of Africa. Thank you and congratulations to the 2020 undergraduate scholars and all authors who provided meaningful contributions through steadfast intellectual efforts in their fields of study! Well done! LTC James H. Schreiner, PhD, PMP, CPEM Program Director, Systems and Decision Sciences (SDS) Department of Systems Engineering United States Military Academy Mahan Hall, Bldg 752, Room 423 West Point, NY 10996, USA james.schreiner@westpoint.edu
Style APA, Harvard, Vancouver, ISO itp.
2

Losh, Elizabeth. "Artificial Intelligence". M/C Journal 10, nr 5 (1.10.2007). http://dx.doi.org/10.5204/mcj.2710.

Pełny tekst źródła
Streszczenie:
On the morning of Thursday, 4 May 2006, the United States House Permanent Select Committee on Intelligence held an open hearing entitled “Terrorist Use of the Internet.” The Intelligence committee meeting was scheduled to take place in Room 1302 of the Longworth Office Building, a Depression-era structure with a neoclassical façade. Because of a dysfunctional elevator, some of the congressional representatives were late to the meeting. During the testimony about the newest political applications for cutting-edge digital technology, the microphones periodically malfunctioned, and witnesses complained of “technical problems” several times. By the end of the day it seemed that what was to be remembered about the hearing was the shocking revelation that terrorists were using videogames to recruit young jihadists. The Associated Press wrote a short, restrained article about the hearing that only mentioned “computer games and recruitment videos” in passing. Eager to have their version of the news item picked up, Reuters made videogames the focus of their coverage with a headline that announced, “Islamists Using US Videogames in Youth Appeal.” Like a game of telephone, as the Reuters videogame story was quickly re-run by several Internet news services, each iteration of the title seemed less true to the exact language of the original. One Internet news service changed the headline to “Islamic militants recruit using U.S. video games.” Fox News re-titled the story again to emphasise that this alert about technological manipulation was coming from recognised specialists in the anti-terrorism surveillance field: “Experts: Islamic Militants Customizing Violent Video Games.” As the story circulated, the body of the article remained largely unchanged, in which the Reuters reporter described the digital materials from Islamic extremists that were shown at the congressional hearing. During the segment that apparently most captured the attention of the wire service reporters, eerie music played as an English-speaking narrator condemned the “infidel” and declared that he had “put a jihad” on them, as aerial shots moved over 3D computer-generated images of flaming oil facilities and mosques covered with geometric designs. Suddenly, this menacing voice-over was interrupted by an explosion, as a virtual rocket was launched into a simulated military helicopter. The Reuters reporter shared this dystopian vision from cyberspace with Western audiences by quoting directly from the chilling commentary and describing a dissonant montage of images and remixed sound. “I was just a boy when the infidels came to my village in Blackhawk helicopters,” a narrator’s voice said as the screen flashed between images of street-level gunfights, explosions and helicopter assaults. Then came a recording of President George W. Bush’s September 16, 2001, statement: “This crusade, this war on terrorism, is going to take a while.” It was edited to repeat the word “crusade,” which Muslims often define as an attack on Islam by Christianity. According to the news reports, the key piece of evidence before Congress seemed to be a film by “SonicJihad” of recorded videogame play, which – according to the experts – was widely distributed online. Much of the clip takes place from the point of view of a first-person shooter, seen as if through the eyes of an armed insurgent, but the viewer also periodically sees third-person action in which the player appears as a running figure wearing a red-and-white checked keffiyeh, who dashes toward the screen with a rocket launcher balanced on his shoulder. Significantly, another of the player’s hand-held weapons is a detonator that triggers remote blasts. As jaunty music plays, helicopters, tanks, and armoured vehicles burst into smoke and flame. Finally, at the triumphant ending of the video, a green and white flag bearing a crescent is hoisted aloft into the sky to signify victory by Islamic forces. To explain the existence of this digital alternative history in which jihadists could be conquerors, the Reuters story described the deviousness of the country’s terrorist opponents, who were now apparently modifying popular videogames through their wizardry and inserting anti-American, pro-insurgency content into U.S.-made consumer technology. One of the latest video games modified by militants is the popular “Battlefield 2” from leading video game publisher, Electronic Arts Inc of Redwood City, California. Jeff Brown, a spokesman for Electronic Arts, said enthusiasts often write software modifications, known as “mods,” to video games. “Millions of people create mods on games around the world,” he said. “We have absolutely no control over them. It’s like drawing a mustache on a picture.” Although the Electronic Arts executive dismissed the activities of modders as a “mustache on a picture” that could only be considered little more than childish vandalism of their off-the-shelf corporate product, others saw a more serious form of criminality at work. Testifying experts and the legislators listening on the committee used the video to call for greater Internet surveillance efforts and electronic counter-measures. Within twenty-four hours of the sensationalistic news breaking, however, a group of Battlefield 2 fans was crowing about the idiocy of reporters. The game play footage wasn’t from a high-tech modification of the software by Islamic extremists; it had been posted on a Planet Battlefield forum the previous December of 2005 by a game fan who had cut together regular game play with a Bush remix and a parody snippet of the soundtrack from the 2004 hit comedy film Team America. The voice describing the Black Hawk helicopters was the voice of Trey Parker of South Park cartoon fame, and – much to Parker’s amusement – even the mention of “goats screaming” did not clue spectators in to the fact of a comic source. Ironically, the moment in the movie from which the sound clip is excerpted is one about intelligence gathering. As an agent of Team America, a fictional elite U.S. commando squad, the hero of the film’s all-puppet cast, Gary Johnston, is impersonating a jihadist radical inside a hostile Egyptian tavern that is modelled on the cantina scene from Star Wars. Additional laughs come from the fact that agent Johnston is accepted by the menacing terrorist cell as “Hakmed,” despite the fact that he utters a series of improbable clichés made up of incoherent stereotypes about life in the Middle East while dressed up in a disguise made up of shoe polish and a turban from a bathroom towel. The man behind the “SonicJihad” pseudonym turned out to be a twenty-five-year-old hospital administrator named Samir, and what reporters and representatives saw was nothing more exotic than game play from an add-on expansion pack of Battlefield 2, which – like other versions of the game – allows first-person shooter play from the position of the opponent as a standard feature. While SonicJihad initially joined his fellow gamers in ridiculing the mainstream media, he also expressed astonishment and outrage about a larger politics of reception. In one interview he argued that the media illiteracy of Reuters potentially enabled a whole series of category errors, in which harmless gamers could be demonised as terrorists. It wasn’t intended for the purpose what it was portrayed to be by the media. So no I don’t regret making a funny video . . . why should I? The only thing I regret is thinking that news from Reuters was objective and always right. The least they could do is some online research before publishing this. If they label me al-Qaeda just for making this silly video, that makes you think, what is this al-Qaeda? And is everything al-Qaeda? Although Sonic Jihad dismissed his own work as “silly” or “funny,” he expected considerably more from a credible news agency like Reuters: “objective” reporting, “online research,” and fact-checking before “publishing.” Within the week, almost all of the salient details in the Reuters story were revealed to be incorrect. SonicJihad’s film was not made by terrorists or for terrorists: it was not created by “Islamic militants” for “Muslim youths.” The videogame it depicted had not been modified by a “tech-savvy militant” with advanced programming skills. Of course, what is most extraordinary about this story isn’t just that Reuters merely got its facts wrong; it is that a self-identified “parody” video was shown to the august House Intelligence Committee by a team of well-paid “experts” from the Science Applications International Corporation (SAIC), a major contractor with the federal government, as key evidence of terrorist recruitment techniques and abuse of digital networks. Moreover, this story of media illiteracy unfolded in the context of a fundamental Constitutional debate about domestic surveillance via communications technology and the further regulation of digital content by lawmakers. Furthermore, the transcripts of the actual hearing showed that much more than simple gullibility or technological ignorance was in play. Based on their exchanges in the public record, elected representatives and government experts appear to be keenly aware that the digital discourses of an emerging information culture might be challenging their authority and that of the longstanding institutions of knowledge and power with which they are affiliated. These hearings can be seen as representative of a larger historical moment in which emphatic declarations about prohibiting specific practices in digital culture have come to occupy a prominent place at the podium, news desk, or official Web portal. This environment of cultural reaction can be used to explain why policy makers’ reaction to terrorists’ use of networked communication and digital media actually tells us more about our own American ideologies about technology and rhetoric in a contemporary information environment. When the experts come forward at the Sonic Jihad hearing to “walk us through the media and some of the products,” they present digital artefacts of an information economy that mirrors many of the features of our own consumption of objects of electronic discourse, which seem dangerously easy to copy and distribute and thus also create confusion about their intended meanings, audiences, and purposes. From this one hearing we can see how the reception of many new digital genres plays out in the public sphere of legislative discourse. Web pages, videogames, and Weblogs are mentioned specifically in the transcript. The main architecture of the witnesses’ presentation to the committee is organised according to the rhetorical conventions of a PowerPoint presentation. Moreover, the arguments made by expert witnesses about the relationship of orality to literacy or of public to private communications in new media are highly relevant to how we might understand other important digital genres, such as electronic mail or text messaging. The hearing also invites consideration of privacy, intellectual property, and digital “rights,” because moral values about freedom and ownership are alluded to by many of the elected representatives present, albeit often through the looking glass of user behaviours imagined as radically Other. For example, terrorists are described as “modders” and “hackers” who subvert those who properly create, own, legitimate, and regulate intellectual property. To explain embarrassing leaks of infinitely replicable digital files, witness Ron Roughead says, “We’re not even sure that they don’t even hack into the kinds of spaces that hold photographs in order to get pictures that our forces have taken.” Another witness, Undersecretary of Defense for Policy and International Affairs, Peter Rodman claims that “any video game that comes out, as soon as the code is released, they will modify it and change the game for their needs.” Thus, the implication of these witnesses’ testimony is that the release of code into the public domain can contribute to political subversion, much as covert intrusion into computer networks by stealthy hackers can. However, the witnesses from the Pentagon and from the government contractor SAIC often present a contradictory image of the supposed terrorists in the hearing transcripts. Sometimes the enemy is depicted as an organisation of technological masterminds, capable of manipulating the computer code of unwitting Americans and snatching their rightful intellectual property away; sometimes those from the opposing forces are depicted as pre-modern and even sub-literate political innocents. In contrast, the congressional representatives seem to focus on similarities when comparing the work of “terrorists” to the everyday digital practices of their constituents and even of themselves. According to the transcripts of this open hearing, legislators on both sides of the aisle express anxiety about domestic patterns of Internet reception. Even the legislators’ own Web pages are potentially disruptive electronic artefacts, particularly when the demands of digital labour interfere with their duties as lawmakers. Although the subject of the hearing is ostensibly terrorist Websites, Representative Anna Eshoo (D-California) bemoans the difficulty of maintaining her own official congressional site. As she observes, “So we are – as members, I think we’re very sensitive about what’s on our Website, and if I retained what I had on my Website three years ago, I’d be out of business. So we know that they have to be renewed. They go up, they go down, they’re rebuilt, they’re – you know, the message is targeted to the future.” In their questions, lawmakers identify Weblogs (blogs) as a particular area of concern as a destabilising alternative to authoritative print sources of information from established institutions. Representative Alcee Hastings (D-Florida) compares the polluting power of insurgent bloggers to that of influential online muckrakers from the American political Right. Hastings complains of “garbage on our regular mainstream news that comes from blog sites.” Representative Heather Wilson (R-New Mexico) attempts to project a media-savvy persona by bringing up the “phenomenon of blogging” in conjunction with her questions about jihadist Websites in which she notes how Internet traffic can be magnified by cooperative ventures among groups of ideologically like-minded content-providers: “These Websites, and particularly the most active ones, are they cross-linked? And do they have kind of hot links to your other favorite sites on them?” At one point Representative Wilson asks witness Rodman if he knows “of your 100 hottest sites where the Webmasters are educated? What nationality they are? Where they’re getting their money from?” In her questions, Wilson implicitly acknowledges that Web work reflects influences from pedagogical communities, economic networks of the exchange of capital, and even potentially the specific ideologies of nation-states. It is perhaps indicative of the government contractors’ anachronistic worldview that the witness is unable to answer Wilson’s question. He explains that his agency focuses on the physical location of the server or ISP rather than the social backgrounds of the individuals who might be manufacturing objectionable digital texts. The premise behind the contractors’ working method – surveilling the technical apparatus not the social network – may be related to other beliefs expressed by government witnesses, such as the supposition that jihadist Websites are collectively produced and spontaneously emerge from the indigenous, traditional, tribal culture, instead of assuming that Iraqi insurgents have analogous beliefs, practices, and technological awareness to those in first-world countries. The residual subtexts in the witnesses’ conjectures about competing cultures of orality and literacy may tell us something about a reactionary rhetoric around videogames and digital culture more generally. According to the experts before Congress, the Middle Eastern audience for these videogames and Websites is limited by its membership in a pre-literate society that is only capable of abortive cultural production without access to knowledge that is archived in printed codices. Sometimes the witnesses before Congress seem to be unintentionally channelling the ideas of the late literacy theorist Walter Ong about the “secondary orality” associated with talky electronic media such as television, radio, audio recording, or telephone communication. Later followers of Ong extend this concept of secondary orality to hypertext, hypermedia, e-mail, and blogs, because they similarly share features of both speech and written discourse. Although Ong’s disciples celebrate this vibrant reconnection to a mythic, communal past of what Kathleen Welch calls “electric rhetoric,” the defence industry consultants express their profound state of alarm at the potentially dangerous and subversive character of this hybrid form of communication. The concept of an “oral tradition” is first introduced by the expert witnesses in the context of modern marketing and product distribution: “The Internet is used for a variety of things – command and control,” one witness states. “One of the things that’s missed frequently is how and – how effective the adversary is at using the Internet to distribute product. They’re using that distribution network as a modern form of oral tradition, if you will.” Thus, although the Internet can be deployed for hierarchical “command and control” activities, it also functions as a highly efficient peer-to-peer distributed network for disseminating the commodity of information. Throughout the hearings, the witnesses imply that unregulated lateral communication among social actors who are not authorised to speak for nation-states or to produce legitimated expert discourses is potentially destabilising to political order. Witness Eric Michael describes the “oral tradition” and the conventions of communal life in the Middle East to emphasise the primacy of speech in the collective discursive practices of this alien population: “I’d like to point your attention to the media types and the fact that the oral tradition is listed as most important. The other media listed support that. And the significance of the oral tradition is more than just – it’s the medium by which, once it comes off the Internet, it is transferred.” The experts go on to claim that this “oral tradition” can contaminate other media because it functions as “rumor,” the traditional bane of the stately discourse of military leaders since the classical era. The oral tradition now also has an aspect of rumor. A[n] event takes place. There is an explosion in a city. Rumor is that the United States Air Force dropped a bomb and is doing indiscriminate killing. This ends up being discussed on the street. It ends up showing up in a Friday sermon in a mosque or in another religious institution. It then gets recycled into written materials. Media picks up the story and broadcasts it, at which point it’s now a fact. In this particular case that we were telling you about, it showed up on a network television, and their propaganda continues to go back to this false initial report on network television and continue to reiterate that it’s a fact, even though the United States government has proven that it was not a fact, even though the network has since recanted the broadcast. In this example, many-to-many discussion on the “street” is formalised into a one-to many “sermon” and then further stylised using technology in a one-to-many broadcast on “network television” in which “propaganda” that is “false” can no longer be disputed. This “oral tradition” is like digital media, because elements of discourse can be infinitely copied or “recycled,” and it is designed to “reiterate” content. In this hearing, the word “rhetoric” is associated with destructive counter-cultural forces by the witnesses who reiterate cultural truisms dating back to Plato and the Gorgias. For example, witness Eric Michael initially presents “rhetoric” as the use of culturally specific and hence untranslatable figures of speech, but he quickly moves to an outright castigation of the entire communicative mode. “Rhetoric,” he tells us, is designed to “distort the truth,” because it is a “selective” assembly or a “distortion.” Rhetoric is also at odds with reason, because it appeals to “emotion” and a romanticised Weltanschauung oriented around discourses of “struggle.” The film by SonicJihad is chosen as the final clip by the witnesses before Congress, because it allegedly combines many different types of emotional appeal, and thus it conveniently ties together all of the themes that the witnesses present to the legislators about unreliable oral or rhetorical sources in the Middle East: And there you see how all these products are linked together. And you can see where the games are set to psychologically condition you to go kill coalition forces. You can see how they use humor. You can see how the entire campaign is carefully crafted to first evoke an emotion and then to evoke a response and to direct that response in the direction that they want. Jihadist digital products, especially videogames, are effective means of manipulation, the witnesses argue, because they employ multiple channels of persuasion and carefully sequenced and integrated subliminal messages. To understand the larger cultural conversation of the hearing, it is important to keep in mind that the related argument that “games” can “psychologically condition” players to be predisposed to violence is one that was important in other congressional hearings of the period, as well one that played a role in bills and resolutions that were passed by the full body of the legislative branch. In the witness’s testimony an appeal to anti-game sympathies at home is combined with a critique of a closed anti-democratic system abroad in which the circuits of rhetorical production and their composite metonymic chains are described as those that command specific, unvarying, robotic responses. This sharp criticism of the artful use of a presentation style that is “crafted” is ironic, given that the witnesses’ “compilation” of jihadist digital material is staged in the form of a carefully structured PowerPoint presentation, one that is paced to a well-rehearsed rhythm of “slide, please” or “next slide” in the transcript. The transcript also reveals that the members of the House Intelligence Committee were not the original audience for the witnesses’ PowerPoint presentation. Rather, when it was first created by SAIC, this “expert” presentation was designed for training purposes for the troops on the ground, who would be facing the challenges of deployment in hostile terrain. According to the witnesses, having the slide show showcased before Congress was something of an afterthought. Nonetheless, Congressman Tiahrt (R-KN) is so impressed with the rhetorical mastery of the consultants that he tries to appropriate it. As Tiarht puts it, “I’d like to get a copy of that slide sometime.” From the hearing we also learn that the terrorists’ Websites are threatening precisely because they manifest a polymorphously perverse geometry of expansion. For example, one SAIC witness before the House Committee compares the replication and elaboration of digital material online to a “spiderweb.” Like Representative Eshoo’s site, he also notes that the terrorists’ sites go “up” and “down,” but the consultant is left to speculate about whether or not there is any “central coordination” to serve as an organising principle and to explain the persistence and consistency of messages despite the apparent lack of a single authorial ethos to offer a stable, humanised, point of reference. In the hearing, the oft-cited solution to the problem created by the hybridity and iterability of digital rhetoric appears to be “public diplomacy.” Both consultants and lawmakers seem to agree that the damaging messages of the insurgents must be countered with U.S. sanctioned information, and thus the phrase “public diplomacy” appears in the hearing seven times. However, witness Roughhead complains that the protean “oral tradition” and what Henry Jenkins has called the “transmedia” character of digital culture, which often crosses several platforms of traditional print, projection, or broadcast media, stymies their best rhetorical efforts: “I think the point that we’ve tried to make in the briefing is that wherever there’s Internet availability at all, they can then download these – these programs and put them onto compact discs, DVDs, or post them into posters, and provide them to a greater range of people in the oral tradition that they’ve grown up in. And so they only need a few Internet sites in order to distribute and disseminate the message.” Of course, to maintain their share of the government market, the Science Applications International Corporation also employs practices of publicity and promotion through the Internet and digital media. They use HTML Web pages for these purposes, as well as PowerPoint presentations and online video. The rhetoric of the Website of SAIC emphasises their motto “From Science to Solutions.” After a short Flash film about how SAIC scientists and engineers solve “complex technical problems,” the visitor is taken to the home page of the firm that re-emphasises their central message about expertise. The maps, uniforms, and specialised tools and equipment that are depicted in these opening Web pages reinforce an ethos of professional specialisation that is able to respond to multiple threats posed by the “global war on terror.” By 26 June 2006, the incident finally was being described as a “Pentagon Snafu” by ABC News. From the opening of reporter Jake Tapper’s investigative Webcast, established government institutions were put on the spot: “So, how much does the Pentagon know about videogames? Well, when it came to a recent appearance before Congress, apparently not enough.” Indeed, the very language about “experts” that was highlighted in the earlier coverage is repeated by Tapper in mockery, with the significant exception of “independent expert” Ian Bogost of the Georgia Institute of Technology. If the Pentagon and SAIC deride the legitimacy of rhetoric as a cultural practice, Bogost occupies himself with its defence. In his recent book Persuasive Games: The Expressive Power of Videogames, Bogost draws upon the authority of the “2,500 year history of rhetoric” to argue that videogames represent a significant development in that cultural narrative. Given that Bogost and his Watercooler Games Weblog co-editor Gonzalo Frasca were actively involved in the detective work that exposed the depth of professional incompetence involved in the government’s line-up of witnesses, it is appropriate that Bogost is given the final words in the ABC exposé. As Bogost says, “We should be deeply bothered by this. We should really be questioning the kind of advice that Congress is getting.” Bogost may be right that Congress received terrible counsel on that day, but a close reading of the transcript reveals that elected officials were much more than passive listeners: in fact they were lively participants in a cultural conversation about regulating digital media. After looking at the actual language of these exchanges, it seems that the persuasiveness of the misinformation from the Pentagon and SAIC had as much to do with lawmakers’ preconceived anxieties about practices of computer-mediated communication close to home as it did with the contradictory stereotypes that were presented to them about Internet practices abroad. In other words, lawmakers found themselves looking into a fun house mirror that distorted what should have been familiar artefacts of American popular culture because it was precisely what they wanted to see. References ABC News. “Terrorist Videogame?” Nightline Online. 21 June 2006. 22 June 2006 http://abcnews.go.com/Video/playerIndex?id=2105341>. Bogost, Ian. Persuasive Games: Videogames and Procedural Rhetoric. Cambridge, MA: MIT Press, 2007. Game Politics. “Was Congress Misled by ‘Terrorist’ Game Video? We Talk to Gamer Who Created the Footage.” 11 May 2006. http://gamepolitics.livejournal.com/285129.html#cutid1>. Jenkins, Henry. Convergence Culture: Where Old and New Media Collide. New York: New York UP, 2006. julieb. “David Morgan Is a Horrible Writer and Should Be Fired.” Online posting. 5 May 2006. Dvorak Uncensored Cage Match Forums. http://cagematch.dvorak.org/index.php/topic,130.0.html>. Mahmood. “Terrorists Don’t Recruit with Battlefield 2.” GGL Global Gaming. 16 May 2006 http://www.ggl.com/news.php?NewsId=3090>. Morgan, David. “Islamists Using U.S. Video Games in Youth Appeal.” Reuters online news service. 4 May 2006 http://today.reuters.com/news/ArticleNews.aspx?type=topNews &storyID=2006-05-04T215543Z_01_N04305973_RTRUKOC_0_US-SECURITY- VIDEOGAMES.xml&pageNumber=0&imageid=&cap=&sz=13&WTModLoc= NewsArt-C1-ArticlePage2>. Ong, Walter J. Orality and Literacy: The Technologizing of the Word. London/New York: Methuen, 1982. Parker, Trey. Online posting. 7 May 2006. 9 May 2006 http://www.treyparker.com>. Plato. “Gorgias.” Plato: Collected Dialogues. Princeton: Princeton UP, 1961. Shrader, Katherine. “Pentagon Surfing Thousands of Jihad Sites.” Associated Press 4 May 2006. SonicJihad. “SonicJihad: A Day in the Life of a Resistance Fighter.” Online posting. 26 Dec. 2005. Planet Battlefield Forums. 9 May 2006 http://www.forumplanet.com/planetbattlefield/topic.asp?fid=13670&tid=1806909&p=1>. Tapper, Jake, and Audery Taylor. “Terrorist Video Game or Pentagon Snafu?” ABC News Nightline 21 June 2006. 30 June 2006 http://abcnews.go.com/Nightline/Technology/story?id=2105128&page=1>. U.S. Congressional Record. Panel I of the Hearing of the House Select Intelligence Committee, Subject: “Terrorist Use of the Internet for Communications.” Federal News Service. 4 May 2006. Welch, Kathleen E. Electric Rhetoric: Classical Rhetoric, Oralism, and the New Literacy. Cambridge, MA: MIT Press, 1999. Citation reference for this article MLA Style Losh, Elizabeth. "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress." M/C Journal 10.5 (2007). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0710/08-losh.php>. APA Style Losh, E. (Oct. 2007) "Artificial Intelligence: Media Illiteracy and the SonicJihad Debacle in Congress," M/C Journal, 10(5). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0710/08-losh.php>.
Style APA, Harvard, Vancouver, ISO itp.
3

Inoue, Masaya. "Yoshida Shigeru's "Counter Infiltration" Plan against China: The Plan for Japanese Intelligence Activities in Mainland China 1952-1954". World Political Science 5, nr 1 (26.01.2009). http://dx.doi.org/10.2202/1935-6226.1069.

Pełny tekst źródła
Streszczenie:
On December 27, 1951, Prime Minister Yoshida Shigeru sent John F. Dulles a letter that explained “Counter Infiltration" against China. Yoshida thought the best way to wean Chinese from the Communist regime was by sending people into China through trade activities and encouraging an anticommunist movement in China. He believed that Japan could have a major role in such an operation. The purpose of this paper is to examine Yoshida's “Counter Infiltration" plan against China from the standpoint of intelligence. Yoshida, taking a special interest in intelligence, established intelligence organs such as the Public Security Intelligence Agency and the Cabinet Research Office (CRO) in quick succession soon after the San Francisco Peace Treaty went into effect in April 1952. Worried about indirect aggression from communist countries, Yoshida concentrated his efforts on developing an interior intelligence framework. At the same time, he tried to foster the growth of a Japanese intelligence organization that could gather information and perform covert operations in Mainland China.This study shows that Yoshida proactively tried to strengthen intelligence cooperation with governments of both Taiwan and the United States. Yoshida appointed Ogata Taketora Chief Cabinet Secretary and made him supervisor of Japanese intelligence organs. Ogata urged the Nationalist government on Taiwan to cooperate in establishing a Communist information exchange organ, and asked the U.S. Central Intelligence Agency (CIA) for assistance in creating a Japanese CIA. On the other hand, Yoshida let retired lieutenant General Tatsumi Eiichi recruit ex-military personnel for service in the CRO. With the assistance of Tatsumi, the CRO started actual intelligence activity against China after January 1953. The CRO interrogated repatriates from China, and proposed a joint operation with the CIA to send Japanese agents into Macao. Thus Yoshida tried to establish a Japanese intelligence system and backed U.S. strategy against China in the intelligence field.Yoshida's idea, however, was frustrated by rapid changes at home and abroad. After the Peace Treaty came into force, Yoshida couldn't maintain a firm hold on power. Not only the opposition parties but also the media criticized Ogata's plan to launch a Japanese CIA. In the end, Ogata had no choice but to downscale his ambitious plans, and eliminate overseas covert operations. Moreover, Yoshida's confrontational approach against the Chinese government was criticized for being behind the times after the Indochina armistice in 1954. In the last days of his ministry, Yoshida encouraged both Britain and U.S. to set up a “high command" on China in Singapore. His aim was to use overseas Chinese based in Southeast Asia to infiltrate Mainland China, but his idea wasn't put into practice because he was unable to gain the support of either Britain and the United States or even his own entourage.
Style APA, Harvard, Vancouver, ISO itp.
4

Stockwell, Stephen. "The Manufacture of World Order". M/C Journal 7, nr 6 (1.01.2005). http://dx.doi.org/10.5204/mcj.2481.

Pełny tekst źródła
Streszczenie:
Since the fall of the Berlin Wall, and most particularly since 9/11, the government of the United States has used its security services to enforce the order it desires for the world. The US government and its security services appreciate the importance of creating the ideological environment that allows them full-scope in their activities. To these ends they have turned to the movie industry which has not been slow in accommodating the purposes of the state. In establishing the parameters of the War Against Terror after 9/11, one of the Bush Administration’s first stops was Hollywood. White House strategist Karl Rove called what is now described as the Beverley Hills Summit on 19 November 2001 where top movie industry players including chairman of the Motion Picture Association of America, Jack Valenti met to discuss ways in which the movie industry could assist in the War Against Terror. After a ritual assertion of Hollywood’s independence, the movie industry’s powerbrokers signed up to the White House’s agenda: “that Americans must be called to national service; that Americans should support the troops; that this is a global war that needs a global response; that this is a war against evil” (Cooper 13). Good versus evil is, of course, a staple commodity for the movie industry but storylines never require the good guys to fight fair so with this statement the White House got what it really wanted: Hollywood’s promise to stay on the big picture in black and white while studiously avoiding the troubling detail in the exercise extra-judicial force and state-sanctioned murder. This is not to suggest that the movie industry is a monolithic ideological enterprise. Alternative voices like Mike Moore and Susan Sarandon still find space to speak. But the established economics of the scenario trade are too strong for the movie industry to resist: producers gain access to expensive weaponry to assist production if their story-lines are approved by Pentagon officials (‘Pentagon provides for Hollywood’); the Pentagon finances movie and gaming studios to provide original story formulas to keep their war-gaming relevant to emerging conditions (Lippman); and the Central Intelligence Agency’s “entertainment liaison officer” assists producers in story development and production (Gamson). In this context, the moulding of story-lines to the satisfaction of the Pentagon and CIA is not even an issue, and protestations of Hollywood’s independence is meaningless, as the movie industry pursues patriotic audiences at home and seeks to garner hearts and minds abroad. This is old history made new again. The Cold War in the 1950s saw movies addressing the disruption of world order not so much by Communists as by “others”: sci-fi aliens, schlock horror zombies, vampires and werewolves and mad scientists galore. By the 1960s the James Bond movie franchise, developed by MI5 operative Ian Fleming, saw Western secret agents ‘licensed to kill’ with the justification that such powers were required to deal with threats to world order, albeit by fanciful “others” such as the fanatical scientist Dr. No (1962). The Bond villains provide a catalogue of methods for the disruption of world order: commandeering atomic weapons and space flights, manipulating finance markets, mind control systems and so on. As the Soviet Union disintegrated, Hollywood produced a wealth of material that excused the paranoid nationalism of the security services through the hegemonic masculinity of stars such as Sylvester Stallone, Arnold Schwarzenegger, Steven Seagal and Bruce Willis (Beasley). Willis’s Die Hard franchise (1988/1990/1995) characterised US insouciance in the face of newly created terrorist threats. Willis personified the strategy of the Reagan, first Bush and Clinton administrations: a willingness to up the ante, second guess the terrorists and cower them with the display of firepower advantage. But the 1997 instalment of the James Bond franchise saw an important shift in expectations about the source of threats to world order. Tomorrow Never Dies features a media tycoon bent on world domination, manipulating the satellite feed, orchestrating conflicts and disasters in the name of ratings, market share and control. Having dealt with all kinds of Cold War plots, Bond is now confronted with the power of the media itself. As if to mark this shift, Austin Powers: International Man of Mystery (1997) made a mockery of the creatively bankrupt conventions of the spy genre. But it was the politically corrupt use to which the security services could be put that was troubling a string of big-budget filmmakers in the late 90s. In Enemy of the State (1998), an innocent lawyer finds himself targeted by the National Security Agency after receiving evidence of a political murder motivated by the push to extend the NSA’s powers. In Mercury Rising (1998), a renegade FBI agent protects an autistic boy who cracks a top-secret government code and becomes the target for assassins from an NSA-like organisation. Arlington Road (1999) features a college professor who learns too much about terrorist organisations and has his paranoia justified when he becomes the target of a complex operation to implicate him as a terrorist. The attacks on September 11 and subsequent Beverley Hills Summit had a major impact on movie product. Many film studios edited films (Spiderman) or postponed their release (Schwarzenegger’s Collateral Damage) where they were seen as too close to actual events but insufficiently patriotic (Townsend). The Bond franchise returned to its staple of fantastical villains. In Die Another Day (2002), the bad guy is a billionaire with a laser cannon. The critical perspective on the security services disappeared overnight. But the most interesting development has been how fantasy has become the key theme in a number of franchises dealing with world order that have had great box-office success since 9/11, particularly Lord of the Rings (2001/2/3) and Harry Potter (2001/2/4). While deeply entrenched in the fantasy genre, each of these franchises also addresses security issues: geo-political control in the Rings franchise; the subterfuges of the Ministry for Muggles in the _Potter _franchise. Looking at world order through the supernatural lens has particular appeal to audiences confronted with everyday threats. These fantasies follow George Bush’s rhetoric of the “axis of evil” in normalising the struggle for world order in term of black and white with the expectation that childish innocence and naïve ingenuity will prevail. Only now with three years hindsight since September 11 can we begin to see certain amount of self-reflection by disenchanted security staff return to the cinema. In Man on Fire (2004) the burned-out ex-CIA assassin has given up on life but regains some hope while guarding a child only to have everything disintegrate when the child is killed and he sets out on remorseless revenge. Spartan (2004) features a special forces officer who fails to find a girl and resorts to remorseless revenge as he becomes lost in a maze of security bureaucracies and chance events. Security service personnel once again have their doubts but only find redemption in violence and revenge without remorse. From consideration of films before and after September 11, it becomes apparent that the movie industry has delivered on their promises to the Bush administration. The first response has been the shift to fantasy that, in historical terms, will be seen as akin to the shift to musicals in the Depression. The flight to fantasy makes the point that complex situations can be reduced to simple moral decisions under the rubric of good versus evil, which is precisely what the US administration requested. The second, more recent response has been to accept disenchantment with the personal costs of the War on Terror but still validate remorseless revenge. Quentin Tarantino’s Kill Bill franchise (2003/4) seeks to do both. Thus the will to world order being fought out in the streets of Iraq is sublimated into fantasy or excused as a natural response to a world of violence. It is interesting to note that television has provided more opportunities for the productive consideration of world order and the security services than the movies since September 11. While programs that have had input from the CIA’s “entertainment liaison officer” such as teen-oriented, Buffy-inspired Alias and quasi-authentic The Agency provide a no-nonsense justification for the War on Terror (Gamson), others such as 24, West Wing _and _Threat Matrix have confronted the moral problems of torture and murder in the War on Terrorism. 24 uses reality TV conventions of real-time plot, split screen exposition, unexpected interventions and a close focus on personal emotions to explore the interactions between a US President and an officer in the Counter Terrorism Unit. The CTU officer does not hesitate to summarily behead a criminal or kill a colleague for operational purposes and the president takes only a little longer to begin torturing recalcitrant members of his own staff. Similarly, the president in West Wing orders the extra-judicial death of a troublesome player and the team in Threat Matrix are ready to exceeded their powers. But in these programs the characters struggle with the moral consequences of their violent acts, particularly as family members are drawn into the plot. A running theme of Threat Matrix is the debate within the group of their choices between gung-ho militarism and peaceful diplomacy: the consequences of a simplistic, hawkish approach are explored when an Arab-American college professor is wrongfully accused of supporting terrorists and driven towards the terrorists because of his very ordeal of wrongful accusation. The world is not black and white. Almost half the US electorate voted for John Kerry. Television still must cater for liberal, and wealthy, demographics who welcome the extended format of weekly television that allows a continuing engagement with questions of good or evil and whether there is difference between them any more. Against the simple world view of the Bush administration we have the complexities of the real world. References Beasley, Chris. “Reel Politics.” Australian Political Studies Association Conference, University of Adelaide, 2004. Cooper, Marc. “Lights! Cameras! Attack!: Hollywood Enlists.” The Nation 10 December 2001: 13-16. Gamson, J. “Double Agents.” The American Prospect 12.21 (3 December 2001): 38-9. Lippman, John. “Hollywood Casts About for a War Role.” Wall Street Journal 9 November 2001: A1. “Pentagon Provides for Hollywood.” USA Today 29 March 2001. http://www.usatoday.com/life/movies/2001-05-17-pentagon-helps-hollywood.htm>. Townsend, Gary. “Hollywood Uses Selective Censorship after 9/11.” e.press 12 December 2002. http://www.scc.losrios.edu/~express/021212hollywood.html>. Citation reference for this article MLA Style Stockwell, Stephen. "The Manufacture of World Order: The Security Services and the Movie Industry." M/C Journal 7.6 (2005). echo date('d M. Y'); ?> <http://journal.media-culture.org.au/0501/10-stockwell.php>. APA Style Stockwell, S. (Jan. 2005) "The Manufacture of World Order: The Security Services and the Movie Industry," M/C Journal, 7(6). Retrieved echo date('d M. Y'); ?> from <http://journal.media-culture.org.au/0501/10-stockwell.php>.
Style APA, Harvard, Vancouver, ISO itp.
5

Burns, Alex. "Doubting the Global War on Terror". M/C Journal 14, nr 1 (24.01.2011). http://dx.doi.org/10.5204/mcj.338.

Pełny tekst źródła
Streszczenie:
Photograph by Gonzalo Echeverria (2010)Declaring War Soon after Al Qaeda’s terrorist attacks on 11 September 2001, the Bush Administration described its new grand strategy: the “Global War on Terror”. This underpinned the subsequent counter-insurgency in Afghanistan and the United States invasion of Iraq in March 2003. Media pundits quickly applied the Global War on Terror label to the Madrid, Bali and London bombings, to convey how Al Qaeda’s terrorism had gone transnational. Meanwhile, international relations scholars debated the extent to which September 11 had changed the international system (Brenner; Mann 303). American intellectuals adopted several variations of the Global War on Terror in what initially felt like a transitional period of US foreign policy (Burns). Walter Laqueur suggested Al Qaeda was engaged in a “cosmological” and perpetual war. Paul Berman likened Al Qaeda and militant Islam to the past ideological battles against communism and fascism (Heilbrunn 248). In a widely cited article, neoconservative thinker Norman Podhoretz suggested the United States faced “World War IV”, which had three interlocking drivers: Al Qaeda and trans-national terrorism; political Islam as the West’s existential enemy; and nuclear proliferation to ‘rogue’ countries and non-state actors (Friedman 3). Podhoretz’s tone reflected a revival of his earlier Cold War politics and critique of the New Left (Friedman 148-149; Halper and Clarke 56; Heilbrunn 210). These stances attracted widespread support. For instance, the United States Marine Corp recalibrated its mission to fight a long war against “World War IV-like” enemies. Yet these stances left the United States unprepared as the combat situations in Afghanistan and Iraq worsened (Ricks; Ferguson; Filkins). Neoconservative ideals for Iraq “regime change” to transform the Middle East failed to deal with other security problems such as Pakistan’s Musharraf regime (Dorrien 110; Halper and Clarke 210-211; Friedman 121, 223; Heilbrunn 252). The Manichean and open-ended framing became a self-fulfilling prophecy for insurgents, jihadists, and militias. The Bush Administration quietly abandoned the Global War on Terror in July 2005. Widespread support had given way to policymaker doubt. Why did so many intellectuals and strategists embrace the Global War on Terror as the best possible “grand strategy” perspective of a post-September 11 world? Why was there so little doubt of this worldview? This is a debate with roots as old as the Sceptics versus the Sophists. Explanations usually focus on the Bush Administration’s “Vulcans” war cabinet: Vice President Dick Cheney, Secretary of Defense Donald Rumsfield, and National Security Advisor Condoleezza Rice, who later became Secretary of State (Mann xv-xvi). The “Vulcans” were named after the Roman god Vulcan because Rice’s hometown Birmingham, Alabama, had “a mammoth fifty-six foot statue . . . [in] homage to the city’s steel industry” (Mann x) and the name stuck. Alternatively, explanations focus on how neoconservative thinkers shaped the intellectual climate after September 11, in a receptive media climate. Biographers suggest that “neoconservatism had become an echo chamber” (Heilbrunn 242) with its own media outlets, pundits, and think-tanks such as the American Enterprise Institute and Project for a New America. Neoconservatism briefly flourished in Washington DC until Iraq’s sectarian violence discredited the “Vulcans” and neoconservative strategists like Paul Wolfowitz (Friedman; Ferguson). The neoconservatives' combination of September 11’s aftermath with strongly argued historical analogies was initially convincing. They conferred with scholars such as Bernard Lewis, Samuel P. Huntington and Victor Davis Hanson to construct classicist historical narratives and to explain cultural differences. However, the history of the decade after September 11 also contains mis-steps and mistakes which make it a series of contingent decisions (Ferguson; Bergen). One way to analyse these contingent decisions is to pose “what if?” counterfactuals, or feasible alternatives to historical events (Lebow). For instance, what if September 11 had been a chemical and biological weapons attack? (Mann 317). Appendix 1 includes a range of alternative possibilities and “minimal rewrites” or slight variations on the historical events which occurred. Collectively, these counterfactuals suggest the role of agency, chance, luck, and the juxtaposition of better and worse outcomes. They pose challenges to the classicist interpretation adopted soon after September 11 to justify “World War IV” (Podhoretz). A ‘Two-Track’ Process for ‘World War IV’ After the September 11 attacks, I think an overlapping two-track process occurred with the “Vulcans” cabinet, neoconservative advisers, and two “echo chambers”: neoconservative think-tanks and the post-September 11 media. Crucially, Bush’s “Vulcans” war cabinet succeeded in gaining civilian control of the United States war decision process. Although successful in initiating the 2003 Iraq War this civilian control created a deeper crisis in US civil-military relations (Stevenson; Morgan). The “Vulcans” relied on “politicised” intelligence such as a United Kingdom intelligence report on Iraq’s weapons development program. The report enabled “a climate of undifferentiated fear to arise” because its public version did not distinguish between chemical, biological, radiological or nuclear weapons (Halper and Clarke, 210). The cautious 2003 National Intelligence Estimates (NIE) report on Iraq was only released in a strongly edited form. For instance, the US Department of Energy had expressed doubts about claims that Iraq had approached Niger for uranium, and was using aluminium tubes for biological and chemical weapons development. Meanwhile, the post-September 11 media had become a second “echo chamber” (Halper and Clarke 194-196) which amplified neoconservative arguments. Berman, Laqueur, Podhoretz and others who framed the intellectual climate were “risk entrepreneurs” (Mueller 41-43) that supported the “World War IV” vision. The media also engaged in aggressive “flak” campaigns (Herman and Chomsky 26-28; Mueller 39-42) designed to limit debate and to stress foreign policy stances and themes which supported the Bush Administration. When former Central Intelligence Agency director James Woolsey’s claimed that Al Qaeda had close connections to Iraqi intelligence, this was promoted in several books, including Michael Ledeen’s War Against The Terror Masters, Stephen Hayes’ The Connection, and Laurie Mylroie’s Bush v. The Beltway; and in partisan media such as Fox News, NewsMax, and The Weekly Standard who each attacked the US State Department and the CIA (Dorrien 183; Hayes; Ledeen; Mylroie; Heilbrunn 237, 243-244; Mann 310). This was the media “echo chamber” at work. The group Accuracy in Media also campaigned successfully to ensure that US cable providers did not give Al Jazeera English access to US audiences (Barker). Cosmopolitan ideals seemed incompatible with what the “flak” groups desired. The two-track process converged on two now infamous speeches. US President Bush’s State of the Union Address on 29 January 2002, and US Secretary of State Colin Powell’s presentation to the United Nations on 5 February 2003. Bush’s speech included a line from neoconservative David Frumm about North Korea, Iraq and Iran as an “Axis of Evil” (Dorrien 158; Halper and Clarke 139-140; Mann 242, 317-321). Powell’s presentation to the United Nations included now-debunked threat assessments. In fact, Powell had altered the speech’s original draft by I. Lewis “Scooter” Libby, who was Cheney’s chief of staff (Dorrien 183-184). Powell claimed that Iraq had mobile biological weapons facilities, linked to Abu Musab al-Zarqawi. However, the International Atomic Energy Agency’s (IAEA) Mohamed El-Baradei, the Defense Intelligence Agency, the State Department, and the Institute for Science and International Security all strongly doubted this claim, as did international observers (Dorrien 184; Halper and Clarke 212-213; Mann 353-354). Yet this information was suppressed: attacked by “flak” or given little visible media coverage. Powell’s agenda included trying to rebuild an international coalition and to head off weather changes that would affect military operations in the Middle East (Mann 351). Both speeches used politicised variants of “weapons of mass destruction”, taken from the counterterrorism literature (Stern; Laqueur). Bush’s speech created an inflated geopolitical threat whilst Powell relied on flawed intelligence and scientific visuals to communicate a non-existent threat (Vogel). However, they had the intended effect on decision makers. US Under-Secretary of Defense, the neoconservative Paul Wolfowitz, later revealed to Vanity Fair that “weapons of mass destruction” was selected as an issue that all potential stakeholders could agree on (Wilkie 69). Perhaps the only remaining outlet was satire: Armando Iannucci’s 2009 film In The Loop parodied the diplomatic politics surrounding Powell’s speech and the civil-military tensions on the Iraq War’s eve. In the short term the two track process worked in heading off doubt. The “Vulcans” blocked important information on pre-war Iraq intelligence from reaching the media and the general public (Prados). Alternatively, they ignored area specialists and other experts, such as when Coalition Provisional Authority’s L. Paul Bremer ignored the US State Department’s fifteen volume ‘Future of Iraq’ project (Ferguson). Public “flak” and “risk entrepreneurs” mobilised a range of motivations from grief and revenge to historical memory and identity politics. This combination of private and public processes meant that although doubts were expressed, they could be contained through the dual echo chambers of neoconservative policymaking and the post-September 11 media. These factors enabled the “Vulcans” to proceed with their “regime change” plans despite strong public opposition from anti-war protestors. Expressing DoubtsMany experts and institutions expressed doubt about specific claims the Bush Administration made to support the 2003 Iraq War. This doubt came from three different and sometimes overlapping groups. Subject matter experts such as the IAEA’s Mohamed El-Baradei and weapons development scientists countered the UK intelligence report and Powell’s UN speech. However, they did not get the media coverage warranted due to “flak” and “echo chamber” dynamics. Others could challenge misleading historical analogies between insurgent Iraq and Nazi Germany, and yet not change the broader outcomes (Benjamin). Independent journalists one group who gained new information during the 1990-91 Gulf War: some entered Iraq from Kuwait and documented a more humanitarian side of the war to journalists embedded with US military units (Uyarra). Finally, there were dissenters from bureaucratic and institutional processes. In some cases, all three overlapped. In their separate analyses of the post-September 11 debate on intelligence “failure”, Zegart and Jervis point to a range of analytic misperceptions and institutional problems. However, the intelligence community is separated from policymakers such as the “Vulcans”. Compartmentalisation due to the “need to know” principle also means that doubting analysts can be blocked from releasing information. Andrew Wilkie discovered this when he resigned from Australia’s Office for National Assessments (ONA) as a transnational issues analyst. Wilkie questioned the pre-war assessments in Powell’s United Nations speech that were used to justify the 2003 Iraq War. Wilkie was then attacked publicly by Australian Prime Minister John Howard. This overshadowed a more important fact: both Howard and Wilkie knew that due to Australian legislation, Wilkie could not publicly comment on ONA intelligence, despite the invitation to do so. This barrier also prevented other intelligence analysts from responding to the “Vulcans”, and to “flak” and “echo chamber” dynamics in the media and neoconservative think-tanks. Many analysts knew that the excerpts released from the 2003 NIE on Iraq was highly edited (Prados). For example, Australian agencies such as the ONA, the Department of Foreign Affairs and Trade, and the Department of Defence knew this (Wilkie 98). However, analysts are trained not to interfere with policymakers, even when there are significant civil-military irregularities. Military officials who spoke out about pre-war planning against the “Vulcans” and their neoconservative supporters were silenced (Ricks; Ferguson). Greenlight Capital’s hedge fund manager David Einhorn illustrates in a different context what might happen if analysts did comment. Einhorn gave a speech to the Ira Sohn Conference on 15 May 2002 debunking the management of Allied Capital. Einhorn’s “short-selling” led to retaliation from Allied Capital, a Securities and Exchange Commission investigation, and growing evidence of potential fraud. If analysts adopted Einhorn’s tactics—combining rigorous analysis with targeted, public denunciation that is widely reported—then this may have short-circuited the “flak” and “echo chamber” effects prior to the 2003 Iraq War. The intelligence community usually tries to pre-empt such outcomes via contestation exercises and similar processes. This was the goal of the 2003 NIE on Iraq, despite the fact that the US Department of Energy which had the expertise was overruled by other agencies who expressed opinions not necessarily based on rigorous scientific and technical analysis (Prados; Vogel). In counterterrorism circles, similar disinformation arose about Aum Shinrikyo’s biological weapons research after its sarin gas attack on Tokyo’s subway system on 20 March 1995 (Leitenberg). Disinformation also arose regarding nuclear weapons proliferation to non-state actors in the 1990s (Stern). Interestingly, several of the “Vulcans” and neoconservatives had been involved in an earlier controversial contestation exercise: Team B in 1976. The Central Intelligence Agency (CIA) assembled three Team B groups in order to evaluate and forecast Soviet military capabilities. One group headed by historian Richard Pipes gave highly “alarmist” forecasts and then attacked a CIA NIE about the Soviets (Dorrien 50-56; Mueller 81). The neoconservatives adopted these same tactics to reframe the 2003 NIE from its position of caution, expressed by several intelligence agencies and experts, to belief that Iraq possessed a current, covert program to develop weapons of mass destruction (Prados). Alternatively, information may be leaked to the media to express doubt. “Non-attributable” background interviews to establishment journalists like Seymour Hersh and Bob Woodward achieved this. Wikileaks publisher Julian Assange has recently achieved notoriety due to US diplomatic cables from the SIPRNet network released from 28 November 2010 onwards. Supporters have favourably compared Assange to Daniel Ellsberg, the RAND researcher who leaked the Pentagon Papers (Ellsberg; Ehrlich and Goldsmith). Whilst Elsberg succeeded because a network of US national papers continued to print excerpts from the Pentagon Papers despite lawsuit threats, Assange relied in part on favourable coverage from the UK’s Guardian newspaper. However, suspected sources such as US Army soldier Bradley Manning are not protected whilst media outlets are relatively free to publish their scoops (Walt, ‘Woodward’). Assange’s publication of SIPRNet’s diplomatic cables will also likely mean greater restrictions on diplomatic and military intelligence (Walt, ‘Don’t Write’). Beyond ‘Doubt’ Iraq’s worsening security discredited many of the factors that had given the neoconservatives credibility. The post-September 11 media became increasingly more critical of the US military in Iraq (Ferguson) and cautious about the “echo chamber” of think-tanks and media outlets. Internet sites for Al Jazeera English, Al-Arabiya and other networks have enabled people to bypass “flak” and directly access these different viewpoints. Most damagingly, the non-discovery of Iraq’s weapons of mass destruction discredited both the 2003 NIE on Iraq and Colin Powell’s United Nations presentation (Wilkie 104). Likewise, “risk entrepreneurs” who foresaw “World War IV” in 2002 and 2003 have now distanced themselves from these apocalyptic forecasts due to a series of mis-steps and mistakes by the Bush Administration and Al Qaeda’s over-calculation (Bergen). The emergence of sites such as Wikileaks, and networks like Al Jazeera English and Al-Arabiya, are a response to the politics of the past decade. They attempt to short-circuit past “echo chambers” through providing access to different sources and leaked data. The Global War on Terror framed the Bush Administration’s response to September 11 as a war (Kirk; Mueller 59). Whilst this prematurely closed off other possibilities, it has also unleashed a series of dynamics which have undermined the neoconservative agenda. The “classicist” history and historical analogies constructed to justify the “World War IV” scenario are just one of several potential frameworks. “Flak” organisations and media “echo chambers” are now challenged by well-financed and strategic alternatives such as Al Jazeera English and Al-Arabiya. Doubt is one defence against “risk entrepreneurs” who seek to promote a particular idea: doubt guards against uncritical adoption. Perhaps the enduring lesson of the post-September 11 debates, though, is that doubt alone is not enough. What is needed are individuals and institutions that understand the strategies which the neoconservatives and others have used, and who also have the soft power skills during crises to influence critical decision-makers to choose alternatives. Appendix 1: Counterfactuals Richard Ned Lebow uses “what if?” counterfactuals to examine alternative possibilities and “minimal rewrites” or slight variations on the historical events that occurred. The following counterfactuals suggest that the Bush Administration’s Global War on Terror could have evolved very differently . . . or not occurred at all. Fact: The 2003 Iraq War and 2001 Afghanistan counterinsurgency shaped the Bush Administration’s post-September 11 grand strategy. Counterfactual #1: Al Gore decisively wins the 2000 U.S. election. Bush v. Gore never occurs. After the September 11 attacks, Gore focuses on international alliance-building and gains widespread diplomatic support rather than a neoconservative agenda. He authorises Special Operations Forces in Afghanistan and works closely with the Musharraf regime in Pakistan to target Al Qaeda’s muhajideen. He ‘contains’ Saddam Hussein’s Iraq through measurement and signature, technical intelligence, and more stringent monitoring by the International Atomic Energy Agency. Minimal Rewrite: United 93 crashes in Washington DC, killing senior members of the Gore Administration. Fact: U.S. Special Operations Forces failed to kill Osama bin Laden in late November and early December 2001 at Tora Bora. Counterfactual #2: U.S. Special Operations Forces kill Osama bin Laden in early December 2001 during skirmishes at Tora Bora. Ayman al-Zawahiri is critically wounded, captured, and imprisoned. The rest of Al Qaeda is scattered. Minimal Rewrite: Osama bin Laden’s death turns him into a self-mythologised hero for decades. Fact: The UK Blair Government supplied a 50-page intelligence dossier on Iraq’s weapons development program which the Bush Administration used to support its pre-war planning. Counterfactual #3: Rogue intelligence analysts debunk the UK Blair Government’s claims through a series of ‘targeted’ leaks to establishment news sources. Minimal Rewrite: The 50-page intelligence dossier is later discovered to be correct about Iraq’s weapons development program. Fact: The Bush Administration used the 2003 National Intelligence Estimate to “build its case” for “regime change” in Saddam Hussein’s Iraq. Counterfactual #4: A joint investigation by The New York Times and The Washington Post rebuts U.S. Secretary of State Colin Powell’s speech to the United National Security Council, delivered on 5 February 2003. Minimal Rewrite: The Central Intelligence Agency’s whitepaper “Iraq’s Weapons of Mass Destruction Programs” (October 2002) more accurately reflects the 2003 NIE’s cautious assessments. Fact: The Bush Administration relied on Ahmed Chalabi for its postwar estimates about Iraq’s reconstruction. Counterfactual #5: The Bush Administration ignores Chalabi’s advice and relies instead on the U.S. State Department’s 15 volume report “The Future of Iraq”. Minimal Rewrite: The Coalition Provisional Authority appoints Ahmed Chalabi to head an interim Iraqi government. Fact: L. Paul Bremer signed orders to disband Iraq’s Army and to De-Ba’athify Iraq’s new government. Counterfactual #6: Bremer keeps Iraq’s Army intact and uses it to impose security in Baghdad to prevent looting and to thwart insurgents. Rather than a De-Ba’athification policy, Bremer uses former Baath Party members to gather situational intelligence. Minimal Rewrite: Iraq’s Army refuses to disband and the De-Ba’athification policy uncovers several conspiracies to undermine the Coalition Provisional Authority. AcknowledgmentsThanks to Stephen McGrail for advice on science and technology analysis.References Barker, Greg. “War of Ideas”. PBS Frontline. Boston, MA: 2007. ‹http://www.pbs.org/frontlineworld/stories/newswar/video1.html› Benjamin, Daniel. “Condi’s Phony History.” Slate 29 Aug. 2003. ‹http://www.slate.com/id/2087768/pagenum/all/›. Bergen, Peter L. The Longest War: The Enduring Conflict between America and Al Qaeda. New York: The Free Press, 2011. Berman, Paul. Terror and Liberalism. W.W. Norton & Company: New York, 2003. Brenner, William J. “In Search of Monsters: Realism and Progress in International Relations Theory after September 11.” Security Studies 15.3 (2006): 496-528. Burns, Alex. “The Worldflash of a Coming Future.” M/C Journal 6.2 (April 2003). ‹http://journal.media-culture.org.au/0304/08-worldflash.php›. Dorrien, Gary. Imperial Designs: Neoconservatism and the New Pax Americana. New York: Routledge, 2004. Ehrlich, Judith, and Goldsmith, Rick. The Most Dangerous Man in America: Daniel Ellsberg and the Pentagon Papers. Berkley CA: Kovno Communications, 2009. Einhorn, David. Fooling Some of the People All of the Time: A Long Short (and Now Complete) Story. Hoboken NJ: John Wiley & Sons, 2010. Ellison, Sarah. “The Man Who Spilled The Secrets.” Vanity Fair (Feb. 2011). ‹http://www.vanityfair.com/politics/features/2011/02/the-guardian-201102›. Ellsberg, Daniel. Secrets: A Memoir of Vietnam and the Pentagon Papers. New York: Viking, 2002. Ferguson, Charles. No End in Sight, New York: Representational Pictures, 2007. Filkins, Dexter. The Forever War. New York: Vintage Books, 2008. Friedman, Murray. The Neoconservative Revolution: Jewish Intellectuals and the Shaping of Public Policy. New York: Cambridge UP, 2005. Halper, Stefan, and Jonathan Clarke. America Alone: The Neo-Conservatives and the Global Order. New York: Cambridge UP, 2004. Hayes, Stephen F. The Connection: How Al Qaeda’s Collaboration with Saddam Hussein Has Endangered America. New York: HarperCollins, 2004. Heilbrunn, Jacob. They Knew They Were Right: The Rise of the Neocons. New York: Doubleday, 2008. Herman, Edward S., and Noam Chomsky. Manufacturing Consent: The Political Economy of the Mass Media. Rev. ed. New York: Pantheon Books, 2002. Iannucci, Armando. In The Loop. London: BBC Films, 2009. Jervis, Robert. Why Intelligence Fails: Lessons from the Iranian Revolution and the Iraq War. Ithaca NY: Cornell UP, 2010. Kirk, Michael. “The War behind Closed Doors.” PBS Frontline. Boston, MA: 2003. ‹http://www.pbs.org/wgbh/pages/frontline/shows/iraq/›. Laqueur, Walter. No End to War: Terrorism in the Twenty-First Century. New York: Continuum, 2003. Lebow, Richard Ned. Forbidden Fruit: Counterfactuals and International Relations. Princeton NJ: Princeton UP, 2010. Ledeen, Michael. The War against The Terror Masters. New York: St. Martin’s Griffin, 2003. Leitenberg, Milton. “Aum Shinrikyo's Efforts to Produce Biological Weapons: A Case Study in the Serial Propagation of Misinformation.” Terrorism and Political Violence 11.4 (1999): 149-158. Mann, James. Rise of the Vulcans: The History of Bush’s War Cabinet. New York: Viking Penguin, 2004. Morgan, Matthew J. The American Military after 9/11: Society, State, and Empire. New York: Palgrave Macmillan, 2008. Mueller, John. Overblown: How Politicians and the Terrorism Industry Inflate National Security Threats, and Why We Believe Them. New York: The Free Press, 2009. Mylroie, Laurie. Bush v The Beltway: The Inside Battle over War in Iraq. New York: Regan Books, 2003. Nutt, Paul C. Why Decisions Fail. San Francisco: Berrett-Koelher, 2002. Podhoretz, Norman. “How to Win World War IV”. Commentary 113.2 (2002): 19-29. Prados, John. Hoodwinked: The Documents That Reveal How Bush Sold Us a War. New York: The New Press, 2004. Ricks, Thomas. Fiasco: The American Military Adventure in Iraq. New York: The Penguin Press, 2006. Stern, Jessica. The Ultimate Terrorists. Boston, MA: Harvard UP, 2001. Stevenson, Charles A. Warriors and Politicians: US Civil-Military Relations under Stress. New York: Routledge, 2006. Walt, Stephen M. “Should Bob Woodward Be Arrested?” Foreign Policy 10 Dec. 2010. ‹http://walt.foreignpolicy.com/posts/2010/12/10/more_wikileaks_double_standards›. Walt, Stephen M. “‘Don’t Write If You Can Talk...’: The Latest from WikiLeaks.” Foreign Policy 29 Nov. 2010. ‹http://walt.foreignpolicy.com/posts/2010/11/29/dont_write_if_you_can_talk_the_latest_from_wikileaks›. Wilkie, Andrew. Axis of Deceit. Melbourne: Black Ink Books, 2003. Uyarra, Esteban Manzanares. “War Feels like War”. London: BBC, 2003. Vogel, Kathleen M. “Iraqi Winnebagos™ of Death: Imagined and Realized Futures of US Bioweapons Threat Assessments.” Science and Public Policy 35.8 (2008): 561–573. Zegart, Amy. Spying Blind: The CIA, the FBI and the Origins of 9/11. Princeton NJ: Princeton UP, 2007.
Style APA, Harvard, Vancouver, ISO itp.
6

Makeham, Paul Benedict, Bree Jamila Hadley i Joon-Yee Bernadette Kwok. "A "Value Ecology" Approach to the Performing Arts". M/C Journal 15, nr 3 (3.05.2012). http://dx.doi.org/10.5204/mcj.490.

Pełny tekst źródła
Streszczenie:
In recent years ecological thinking has been applied to a range of social, cultural, and aesthetic systems, including performing arts as a living system of policy makers, producers, organisations, artists, and audiences. Ecological thinking is systems-based thinking which allows us to see the performing arts as a complex and protean ecosystem; to explain how elements in this system act and interact; and to evaluate its effects on Australia’s social fabric over time. According to Gallasch, ecological thinking is “what we desperately need for the arts.” It enables us to “defeat the fragmentary and utilitarian view of the arts that dominates, to make connections, to establish overviews of the arts that can be shared and debated” (Gallasch NP). The ecological metaphor has featured in debates about the performing arts in Brisbane, Australia, in the last two or three years. A growing state capital on Australia’s eastern seaboard, Brisbane is proud of its performing arts culture. Its main theatre organisations include the state flagship Queensland Theatre Company; the second major presenter of adapted and new text-based performances La Boite Theatre Company; venues which support local and touring performances such as the Judith Wright Centre for Contemporary Arts and the Brisbane Powerhouse; emerging talent incubator Metro Arts; indigenous companies like Kooemba Jdarra; independent physical theatre and circus companies such as Zen Zen Zo and Circa; and contemporary play-producing company 23rd Productions (cf. Baylis 3). Brisbane aspires to be a cultural capital in Australia, Australasia, and the Asia Pacific (Gill). Compared to Australia’s southern capitals Sydney and Melbourne, however, Brisbane does have a relatively low level of performing arts activity across traditional and contemporary theatre, contemporary performance, musicals, circus, and other genres of performance. It has at times been cast as a piecemeal, potentially unsustainable arts centre prone to losing talent to other states. In 2009, John Baylis took up these issues in Mapping Queensland Theatre, an Arts Queensland-funded survey designed to map practices in Brisbane and in Queensland more broadly, and to provide a platform to support future policy-making. This report excited debate amongst artists who, whilst accepting the tenor of Baylis’s criticisms, also lamented the lack of nuanced detail and contextualised relationships its map of Queensland theatre provided. In this paper we propose a new approach to mapping Brisbane’s and Queensland’s theatre that extends Baylis’s “value chain” into a “value ecology” that provides a more textured picture of players, patterns, relationships, and activity levels. A “value chain” approach emphasises linear relationships and gaps between production, distribution, and consumption in a specific sector of the economy. A “value ecology” approach goes further by examining a complex range of rhizomatic relationships between production, distribution, and consumption infrastructure and how they influence each other within a sector of the economy such as the performing arts. Our approach uses a “value ecology” model adapted from Hearn et al. and Cherbo et al. to map and interpret information from the AusStage performing arts database, the Australian Bureau of Statistics, and other sources such as previews, reviews, and an ongoing local blogosphere debate. Building upon Baylis’s work, our approach produces literal and conceptual maps of Queensland’s performing arts as they change over time, with analysis of support, infrastructure, and relationships amongst government, arts organisations, artists, and audiences. As debate on Mapping Queensland Theatre gives way to more considered reflection, and as Baylis develops a follow-up report, our approach captures snapshots of Queensland’s performing arts before, during, and after such policy interventions. It supports debate about how Queensland artists might manage their own sustainability, their own ability to balance artistic, cultural, and economic factors that influence their work in a way that allows them to survive long term, and allows policy makers, producers, and other players to better understand, articulate, assess, and address criticisms. The Ecological Metaphor In recent years a number of commentators have understood the performing arts as an “ecology,” a system characterised by interacting elements, engagements, flows, blockages, breaks, and breakthroughs whose “health” (synonymous in this context with sustainability) depends on relationships between players within and without the system. Traditionally, performing arts policies in Australia have concentrated on singular elements in a system. They have, as Hunt and Shaw argue, “concentrate[d] on individual companies or an individual artist’s practice rather than the sector as a whole” (5, cf. 43). The focus has been on how to structure, support, and measure the success—the aesthetic and social benefits—of individual training institutions, artists, administrators, and arts organisations. The “health” of singular elements has been taken as a sign of the “health” of the system. An ecologies approach, by contrast, concentrates on engagements, energies, and flows as signs of health, and thus sustainability, in a system. Ecological thinking enables policy makers, practitioners, and scholars to go beyond debate about the presence of activity, the volume of activity, and the fate of individual agents as signs of the health or non-health of a system. In an ecologies context, level of activity is not the only indicator of health, and low activity does not necessarily equate with instability or unsustainability. An ecological approach is critical in Brisbane, and in Queensland more broadly, where attempts to replicate the nature or level of activity in southern capitals are not necessarily the best way to shore up the “health” of our performing arts system in our own unique environment. As the locus of our study Queensland is unique. While Queensland has 20% of Australia’s population (OESR; ABS ‘ Population Projections’), and is regularly recognised as a rapidly growing “lifestyle superstate” which values innovation, creativity, and cultural infrastructure (Cunningham), it is still home to significantly less than 20% of Australia’s performing arts producers, and many talented people continue to migrate to the south to pursue career opportunities (Baylis 4, 28). An ecologies approach can break into oft-cited anxieties about artist, activity, and audience levels in Brisbane, and in Queensland, and create new ideas about what a “healthy” local performing arts sector might look like. This might start to infuse some of the social media commentary that currently tends to emphasise the gaps in the sector. Ecologies are complex systems. So, as Costanza says, when we consider ecosystem health, we must consider the overall performance of the system, including its ability to deal with “external stress” (240) from macro-level political, legal, social, cultural, economic, or technological currents that change the broader society this particular sector or ecosystem sits within. In Brisbane, there is a growing population and a desire to pursue a cultural capital tag, but the distinctive geographic, demographic, and behavioural characteristics of Brisbane’s population—and the associated ‘stresses’, conditions, or constraints—mean that striving to replicate patterns of activity seen in Sydney or Melbourne may not be the straightest path to a “healthy” or “sustainable” sector here. The attitudes of the players and the pressures influencing the system are different, so this may be like comparing rainforests with deserts (Costanza), and forgetting that different elements and engagements are in fact “healthy” in different ecosystems. From an ecologies point of view, policy makers and practitioners in Brisbane and in Queensland more broadly might be well advised to stop trying to match Sydney or Melbourne, and to instead acknowledge that a “healthy” ecosystem here may look different, and so generate policy, subsidy, and production systems to support this. An ecological approach can help determine how much activity is in fact necessary to ensure a healthy and sustainable local performing arts sector. It can, in other words, provide a fresh approach that inspires new ideas and strategies for sector sustainability. Brisbane, Baylis and the Blogosphere Debate The ecological metaphor has clearly captured the interest of policy makers as they consider how to make Queensland’s performing arts more sustainable and successful. For Arts Queensland: The view of the sector as a complex and interdependent ‘ecosystem’ is forging new thinking, new practices and new business models. Individual practitioners and organisations are rethinking where they sit within the broader ecology, and what they contribute to the health and vitality of the sector, and how they might address the gaps in services and skills (12). This view informed the commissioning of Mapping Queensland Theatre, an assessment of Queensland’s theatre sector which offers a framework for allocation of resources under the Queensland Arts & Cultural Sector Plan 2010-2013. It also offers a framework for negotiation with funded organisations to ensure “their activities and focus support a harmonious ecology” (Baylis 3) in which all types and levels of practice (emerging, established, touring, and so on) are functioning well and are well represented within the overall mix of activities. Utilising primary and secondary survey sources, Mapping Queensland Theatre seeks: to map individuals, institutions, and organisations who have a stake in developing Queensland’s professional theatre sector; and to apply a “value chain” model of production from supply (training, creation, presentation, and distribution) to demand (audiences) to identify problems and gaps in Queensland’s professional theatre sector and recommend actions to address them. The report is critical of the sector. Baylis argues that “the context for great theatre is not yet in place in Queensland … therefore works of outstandingly high quality will be rare” (28).Whilst acknowledging a lack of ready answers about how much activity is required in a vibrant theatre culture, Baylis argues that “comparisons are possible” (27) and he uses various data sets to compare numbers of new Australian productions in different states. He finds that “despite having 20% of the Australian population, [Queensland] generates a dramatically lower amount of theatre activity” (4, cf. 28). The reason, according to Baylis (20, 23, 25, 29, 32, 40-41, 44), is that there are gaps in the “value chain” of Queensland theatre, specifically in: Support for the current wave of emerging and independent artistsSpace for experimentation Connections between artists, companies, venues and festivals, between and within regional centres, and between Queensland companies and their (inter)national peers Professional development for producers to address the issue of market distributionAudience development “Queensland lacks a critical mass of theatre activity to develop a sustainable theatre culture” (48), and the main gap is in pathways for independent artists. Quality new work does not emerge, energy dissipates, and artists move on. The solution, for Baylis, is to increase support for independent companies (especially via co-productions with mainstage companies), to improve (inter)national touring, and to encourage investment in audience development. Naturally, Queensland’s theatre makers responded to this report. Responses were given, for example, in inaugural speeches by new Queensland Theatre Company director Wesley Enoch and new La Boite Theatre Company director David Berthold, in the media, and in blogosphere commentary on a range of articles on Brisbane performing arts in 2010. The blogosphere debate in particular raged for months and warrants more detailed analysis elsewhere. For the purposes of this paper, though, it is sufficient to note that blogosphere debate about the health of Queensland theatre culture acknowledged many of the deficits Baylis identified and called for: More leadershipMore government supportMore venuesMore diversityMore audience, especially for risky work, and better audience engagementMore jobs and retention of artists Whilst these responses endorse Baylis’s findings and companies have since conceived programs that address Baylis’s criticisms (QTC’s introduction of a Studio Season and La Boite’s introduction of an Indie program in 2010 for example) a sense of frustration also emerged. Some, like former QTC Chair Kate Foy, felt that “what’s really needed in the theatre is a discussion that breaks out from the old themes and encourages fresh ideas—approaches to solving whatever problems are perceived to exist in ‘the system’.” For commentators like Foy the blogosphere debate enacted a kind of ritual rehearsal of an all-too-familiar set of concerns: inadequate and ill-deployed funding, insufficient venues, talent drain, and an impoverished local culture of theatre going. “Value Chains” versus “Value Ecologies” Why did responses to this report demand more artists, more arts organisations, more venues, and more activities? Why did they repeat demands for more government-subsidised venues, platforms, and support rather than drive toward new seed- or non- subsidised initiatives? At one level, this is to do with the report’s claims: it is natural for artists who have been told quality work is “rare” amongst them to point to lack of support to achieve success. At another level, though, this is because—as useful as it has been for local theatre makers—Baylis’s map is premised on a linear chain from training, to first productions, to further developed productions (involving established writers, directors, designers and performers), to opportunities to tour (inter)nationally, etc. It provides a linear image of a local performing arts sector in which there are individuals and institutions with potential, but specific gaps in the production-distribution-consumption chain that make it difficult to deliver work to target markets. It emphasises gaps in the linear pathway towards “stability” of financial, venue, and audience support and thus “sustainability” over a whole career for independent artists and the audiences they attract. Accordingly, asking government to plug the gaps through elements added to the system (venues, co-production platforms, producer hubs, subsidy, and entrepreneurial endeavours) seems like a logical solution. Whilst this is true, it does not tell the whole story. To generate a wider story, we need to consider: What the expected elements in a “healthy” ecosystem would be (e.g. more versus alternative activity);What other aesthetic, cultural, or economic pressures affect the “health” of an ecosystem;Why practices might need to cycle, ebb, and flow over time in a “healthy” ecosystem. A look at the way La Boite works before, during, and after Baylis’s analysis of Brisbane theatre illustrates why attention to these elements is necessary. A long-running company which has made the transition from amateur to professional to being a primary developer of new Australian work in its distinctive in-the-round space, La Boite has recently shifted its strategic position. A focus on text-based Australian plays has given way to adapted, contemporary, and new work in a range of genres; regular co-productions with companies in Brisbane and beyond; and an “Indie” program that offers other companies a venue. This could be read as a response to Baylis’s recommendation: the production-distribution-consumption chain gap for Brisbane’s independents is plugged, the problem is solved, the recommendation has led to the desired result. Such a reading might, though, overlook the range of pressures beyond Brisbane, beyond Queensland, and beyond the Baylis report that drive—and thus help, hinder, or otherwise effect—the shift in La Boite’s program strategies. The fact that La Boite recently lost its Australia Council funding, or that La Boite like all theatre companies needs co-productions to keep its venue running as costs increase, or that La Boite has rebranded to appeal to younger audiences interested in postdramatic, do-it-your-self or junkyard style aesthetics. These factors all influence what La Boite might do to sustain itself, and more importantly, what its long-term impact on Brisbane’s theatre ecology will be. To grasp what is happening here, and get beyond repetitive responses to anxieties about Brisbane’s theatre ecology, detail is required not simply on whether programs like La Boite’s “plugged the gap” for independent artists, but on how they had both predicted and unpredicted effects, and how other factors influenced the effects. What is needed is to extend mapping from a “value chain” to a full ”value ecology”? This is something Hearn et al. have called for. A value chain suggests a “single linear process with one stage leading to the next” (5). It ignores the environment and other external enablers and disregards a product’s relationship to other systems or products. In response they prefer a “value creating ecology” in which the “constellation of firms are [sic] dynamic and value flow is multi-directional and works through clusters of networks” (6). Whilst Hearn et al. emphasise “firms” or companies in their value creating ecology, a range of elements—government, arts organisations, artists, audiences, and the media as well as the aesthetic, social, and economic forces that influence them—needs to be mapped in the value creating ecology of the performing arts. Cherbo et al. provide a system of elements or components which, adapted for a local context like Brisbane or Queensland, can better form the basis of a value ecology approach to the way a specific performing arts community works, adapts, changes, breaks down, or breaks through over time. Figure 1 – Performing Arts Sector Map (adapted from Cherbo et. al. 14) Here, the performing arts sector is understood in terms of core artistic workers, companies, a constellation of generic and sector specific support systems, and wider social contexts (Cherbo et al. 15). Together, the shift from “value chain” to “value ecology” that Hearn et al. advocate, and the constellation of ecology elements that Cherbo et al. emphasise, bring a more detailed, dynamic range of relations into play. These include “upstream” production infrastructure (education, suppliers, sponsors), “downstream” distribution infrastructure (venues, outlets, agents), and overall public infrastructure. As a framework for mapping “value ecology” this model offers a more nuanced perspective on production, distribution, and consumption elements in an ecology. It allows for analysis of impact of interventions in dozens of different areas, from dozens of perspectives, and thus provides a more detailed picture of players, relationships, and results to support both practice and policy making around practice. An Aus-e-Stage Value Ecology To provide the more detailed, dynamic image of local theatre culture that a value ecology approach demands—to show players, relations between players, and context in all their complexity—we use the Aus-e-Stage Mapping Service, an online application that maps data about artists, arts organisations, and audiences across cityscapes/landscapes. We use Aus-e-Stage with data drawn from three sources: the AusStage database of over 50,000 entries on Australian performing arts venues, productions, artists, and reviews; the Australian Bureau of Statistics (ABS) data on population; and the Local Government Area (LGA) maps the ABS uses to cluster populations. Figure 2 – Using AusStage Interface Figure 3 – AusStage data on theatre venues laid over ABS Local Government Area Map Figure 4 – Using Aus-e-Stage / AusStage to zoom in on Australia, Queensland, Brisbane and La Boite Theatre Company, and generate a list of productions, dates and details Aus-e-Stage produces not just single maps, but a sequential series of snapshots of production ecologies, which visually track who does what when, where, with whom, and for whom. Its sequences can show: The way artists, companies, venues, and audiences relate to each other;The way artists’ relationship to companies, venues, and audiences changes over time;The way “external stressors” changes such as policy, industrial, or population changes affect the elements, roles, and relationships in the ecology from that point forward. Though it can be used in combination with other data sources such as interviews, the advantage of AusStage data is that maps of moving ecologies of practice are based not on descriptions coloured by memory but clear, accurate program, preview, and review data. This allows it to show how factors in the environment—population, policy, infrastructure, or program shifts—effect the ecology, effect players in the ecology, and prompt players to adapt their type, level, or intensity of practice. It extends Baylis’s value chain into a full value ecology that shows the detail on how an ecology works, going beyond demands that government plug perceived gaps and moving towards data- and history- based decisions, ideas and innovation based on what works in Brisbane’s performing arts ecology. Our Aus-e-Stage mapping shows this approach can do a number of useful things. It can create sequences showing breaks, blockages, and absences in an individual or company’s effort to move from emerging to established (e.g. in a sudden burst of activity followed by nothing). It can create sequences showing an individual or company’s moves to other parts of Australia (e.g. to tour or to pursue more permanent work). It can show surprising spaces, relations, and sources of support artists use to further their career (e.g. use of an amateur theatre outside the city such as Brisbane Arts Theatre). It can capture data about venues, programs, or co-production networks that are more or less effective in opening up new opportunities for artists (e.g. moving small-scale experiments in Metro Arts’ “Independents” program to full scale independent productions in La Boite’s “Indie” program, its mainstage program, other mainstage programs, and beyond). It can link to program information, documentation, or commentary to compare anticipated and actual effects. It can lay the map dates and movements across significant policy, infrastructure, or production climate shifts. In the example below, for instance, Aus-e-Stage represents the tour of La Boite’s popular production of a new Australian work Zig Zag Street, based on the Brisbane-focused novel by Nick Earls about a single, twentysomething man’s struggles with life, love, and work. Figure 5 – Zig Zag Street Tour Map In the example below, Aus-e-Stage represents the movements not of a play but of a performer—in this case Christopher Sommers—who has been able to balance employment with new work incubator Metro Arts, mainstage and indie producer La Boite, and stage theatre company QTC with his role with independent theatre company 23rd Productions to create something more protean, more portfolio-based or boundary-less than a traditional linear career trajectory. Figure 6 – Christopher Sommers Network Map and Travel Map This value of this approach, and this technology, is clear. Which independents participate in La Boite Indie (or QTC’s “Studio” or “Greenroom” new work programs, or Metro’s emerging work programs, or others)? What benefits does it bring for artists, for independent companies, or for mainstage companies like La Boite? Is this a launching pad leading to ongoing, sustainable production practices? What do artists, audiences or others say about these launching pads in previews, programs, or reviews? Using Aus-e-Stage as part of a value ecology approach answers these questions. It provides a more detailed picture of what happens, what effect it has on local theatre ecology, and exactly which influences enabled this effect: precisely the data needed to generate informed debate, ideas, and decision making. Conclusion Our ecological approach provides images of a local performing arts ecology in action, drawing out filtered data on different players, relationships, and influencing factors, and thus extending examination of Brisbane’s and Queensland’s performing arts sector into useful new areas. It offers three main advances—first, it adopts a value ecology approach (Hearn et al.), second, it adapts this value ecology approach to include not just companies by all up- and down- stream players, supporters and infrastructure (Cherbo et. al.), and, thirdly, it uses the wealth of data available via Aus-e-Stage maps to fill out and filter images of local theatre ecology. It allows us to develop detailed, meaningful data to support discussion, debate, and development of ideas that is less likely to get bogged down in old, outdated, or inaccurate assumptions about how the sector works. Indeed, our data lends itself to additional analysis in a number of ways, from economic analysis of how shifts in policy influence productivity to sociological analysis of the way practitioners or practices acquire status and cultural capital (Bourdieu) in the field. Whilst descriptions offered here demonstrate the potential of this approach, this is by no means a finished exercise. Indeed, because this approach is about analysing how elements, roles, and relationships in an ecology shift over time, it is an ever-unfinished exercise. As Fortin and Dale argue, ecological studies of this sort are necessarily iterative, with each iteration providing new insights and raising further questions into processes and patterns (3). Given the number of local performing arts producers who have changed their practices significantly since Baylis’s Mapping Queensland Theatre report, and the fact that Baylis is producing a follow-up report, the next step will be to use this approach and the Aus-e-Stage technology that supports it to trace how ongoing shifts impact on Brisbane’s ambitions to become a cultural capital. This process is underway, and promises to open still more new perspectives by understanding anxieties about local theatre culture in terms of ecologies and exploring them cartographically. References Arts Queensland. Queensland Arts & Cultural Sector Plan 2010-2013. Brisbane: Arts Queensland, 2010. Australian Bureau of Statistics. “Population Projections, Australia, 2006 to 2101.” Canberra: ABS (2008). 20 June 2011 ‹http://www.abs.gov.au/AUSSTATS/abs@.nsf/Lookup/3222.0Main+Features12006%20to%202101?OpenDocument›. ——-. “Regional Population Growth, Australia, 2008-2009: Queensland.” Canberra: ABS (2010). 20 June 2011 ‹http://www.abs.gov.au/ausstats/abs@.nsf/Latestproducts/3218.0Main%20Features62008-09?opendocument&tabname=Summary&prodno=3218.0&issue=2008-09&num=&view=›. Baylis, John. Mapping Queensland Theatre. Brisbane: Arts Queensland, 2009. Bourdieu, Pierre. “The Forms of Capital.” Handbook of Theory and Research for the Sociology of Education. Ed. John G. Richardson. New York: Greenwood, 1986.241-58. Cherbo, Joni M., Harold Vogel, and Margaret Jane Wyszomirski. “Towards an Arts and Creative Sector.” Understanding the Arts and Creative Sector in the United States. Ed. Joni M. Cherbo, Ruth A. Stewart and Margaret J. Wyszomirski. New Brunswick: Rutgers University Press, 2008. 32-60. Costanza, Robert. “Toward an Operational Definition of Ecosystem Health”. Ecosystem Health: New Goals for Environmental Management. Eds. Robert Costanza, Bryan G. Norton and Benjamin D. Haskell. Washington: Island Press, 1992. 239-56. Cunningham, Stuart. “Keeping Artistic Tempers Balanced.” The Courier Mail, 4 August (2010). 20 June 2012 ‹http://www.couriermail.com.au/news/opinion/keeping-artistic-tempers-balanced/story-e6frerc6-1225901295328›. Gallasch, Keith. “The ABC and the Arts: The Arts Ecologically.” RealTime 61 (2004). 20 June 2011 ‹http://www.realtimearts.net/article/61/7436›. Gill, Raymond. “Is Brisbane Australia’s New Cultural Capital?” Sydney Morning Herald, 16 October (2010). 20 June 2011 ‹http://www.smh.com.au/entertainment/art-and-design/is-brisbane-australias-new-cultural-capital-20101015-16np5.html›. Fortin, Marie-Josée and Dale, Mark R.T. Spatial Analysis: A Guide for Ecologists. Cambridge: Cambridge University Press, 2005. Foy, Kate. “Is There Anything Right with the Theatre?” Groundling. 10 January (2010). 20 June 2011 ‹http://katefoy.com/2010/01/is-there-anything-right-with-the-theatre/›. Hearn, Gregory N., Simon C. Roodhouse, and Julie M. Blakey. ‘From Value Chain to Value Creating Ecology: Implications for Creative Industries Development Policy.’ International Journal of Cultural Policy 13 (2007). 20 June 2011 ‹http://eprints.qut.edu.au/15026/›. Hunt, Cathy and Phyllida Shaw. A Sustainable Arts Sector: What Will It Take? Strawberry Hills: Currency House, 2007. Knell, John. Theatre’s New Rules of Evolution. Available from Intelligence Agency, 2008. Office of Economic and Statistical Research. “Information Brief: Australian Demographic Statistics June Quarter 2009.” Canberra: OESR (2010). 20 June 2012 ‹http://www.oesr.qld.gov.au/queensland-by-theme/demography/briefs/aust-demographic-stats/aust-demographic-stats-200906.pdf›.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "United States. Central Intelligence Agency. Office of Support Services"

1

Todd, Maurice L. "Rhetoric or reality : US counterinsurgency policy reconsidered". Thesis, University of St Andrews, 2015. http://hdl.handle.net/10023/6431.

Pełny tekst źródła
Streszczenie:
This study explores the foundations of US counterinsurgency policy and doctrine in order to better understand the main historical influences on that policy and doctrine and how those influences have informed the current US approach to counterinsurgency. The results of this study indicate the US experience in counterinsurgency during the Greek Civil War and the Huk Rebellion in the Philippines had a significant influence on the development of US counterinsurgency policy and doctrine following World War II through the Kennedy presidency. In addition, despite a major diversion from the lessons of Greece and the Philippines during the Vietnam War, the lessons were re-institutionalized in US counterinsurgency policy and doctrine following the war and continue to have significant influence today, though in a highly sanitized and, therefore, misleading form. As a result, a major disconnect has developed between the “rhetoric and reality” of US counterinsurgency policy. This disconnect has resulted from the fact that many references that provide a more complete and accurate picture of the actual policies and actions taken to successfully defeat the insurgencies have remained out of the reach of non-government researchers and the general public. Accordingly, many subsequent studies of counterinsurgency overlook, or only provide a cursory treatment of, aspects that may have had a critical impact on the success of past US counterinsurgency operations. One such aspect is the role of US direct intervention in the internal affairs of a supported country. Another is the role of covert action operations in support of counterinsurgency operations. As a result, the counterinsurgency policies and doctrines that have been developed over the years are largely based on false assumptions, a flawed understanding of the facts, and a misunderstanding of the contexts concerning the cases because of misleading, or at least seriously incomplete, portrayals of the counterinsurgency operations.
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "United States. Central Intelligence Agency. Office of Support Services"

1

United States. Central Intelligence Agency. Office of Support Services. Apostolē "Periklēs": Ta episēma archeia tou Grapheiou Stratēgikōn Hypēresiōn (OSS) tōn ĒPA stēn katechomenē Hellada (Maios-Oktōvrios 1944). Athēna: Ekdoseis Kastaniōtēs, 2016.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Liptak, Eugene. Office of Strategic Services, 1942-45: The World War II origins of the CIA. Oxford: Osprey, 2009.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Kronenwetter, Michael. Covert action. New York: Franklin Watts, 1991.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Soley, Lawrence C. Radio warfare: OSS and CIA subversive propaganda. New York: Praeger, 1989.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Second to none: US intelligence activities in Northern Europe 1943-1946. Dordrecht: Republic of Letters Publishing BV, 2011.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Smith, Richard Harris. Oss: The Secret History of America's First Central Intelligence Agency. Globe Pequot Press, The, 2005.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Smith, Richard Harris. OSS: The Secret History of America's First Central Intelligence Agency. Lyons Press, 2005.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Smith, Richard Harris. OSS: The Secret History of America's First Central Intelligence Agency. The Lyons Press, 2005.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Maior, George Cristian. America's First Spy: The Tragic Heroism of Frank Wisner. Elsevier Science & Technology Books, 2018.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Maior, George Cristian. America's First Spy: The Tragic Heroism of Frank Wisner. Academica Press, 2018.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "United States. Central Intelligence Agency. Office of Support Services"

1

Gaddis, John Lewis. "Intelligence, Espionage, and Cold War History". W The United States and the End Of the Cold War, 87–104. Oxford University PressNew York, NY, 1992. http://dx.doi.org/10.1093/oso/9780195052015.003.0005.

Pełny tekst źródła
Streszczenie:
Abstract We have learned a great deal over the past two decades about the impact of the “intelligence revolution” on World War II strategy.’ That knowledge has led, in turn, to a reassessment of the role of intelligence in earlier periods, and to the emergence of intelligence “studies” as a distinct sub-discipline, complete with its own newsletters, journals, organizations, scholarly meetings, and university courses. But this proliferation of scholarship thins out with the conclusion of the war. It is as if the possibilities for serious research on intelligence end with September, 1945, in a manner almost as decisive as President Harry S. Truman’s when in that same month he abolished with the stroke of a pen the first full-scale intelligence organization the United States had ever had, the Office of Strategic Services. The two phenomena are not, of course, unrelated: the very fact that OSS did not survive into the postwar era has made possible the declassification of most of its records. There is little reason to expect comparable openness anytime soon for the records of the Central Intelligence Group, which Truman created only four months after dismantling OSS, or for those of its more famous successor, the Central Intelligence Agency, whose official existence dates from July, 1947.4 Nor does documentation on code breaking activity in Great Britain and the United States-documentation that for the wartime years has largely sparked scholarly interest in intelligence matters-seem likely to be made available soon for the early postwar era.
Style APA, Harvard, Vancouver, ISO itp.
2

Neumann, Franz, Herbert Marcuse, Otto Kircheimer i Raymond Geuss. "Introduction". W Secret Reports on Nazi Germany, redaktor Raffaele Laudani. Princeton University Press, 2013. http://dx.doi.org/10.23943/princeton/9780691134130.003.0001.

Pełny tekst źródła
Streszczenie:
This introduction discusses the Frankfurt School's contribution to the United States' World War II effort. In particular, it examines the role played by three German scholars and prominent members of the Frankfurt School: Franz Neumann, Herbert Marcuse, and Otto Kirchheimer. As political analysts at the Research and Analysis Branch of the Office of Strategic Services (OSS), the first American intelligence agency, Neumann, Marcuse, and Kirchheimer prepared intelligence reports on Nazi Germany. The chapter considers how, by adapting Critical Theory to the American cultural and bureaucratic machine, the Frankfurt group was rapidly able to impose their own “intellectual guidance” on the Central European Section, a Research and Analysis Branch subdivision charged with analyzing and studying Nazi Germany (as well as Austria and the other Central European countries).
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii