Eclipse Authors: Pat Romanski, Elizabeth White, Liz McMillan, David H Deans, JP Morgenthal

Blog Feed Post

Sudo Apt-Get Install Army: Should Army Analyst Have The Power To Mod Their Analytical Tools?


ELEC_Army_Computer_Simulation_lgArmy officers and writers Crispin Burke, Niel Smith, and James King have a fascinating piece on the DCGS-A (Distributed Common Ground System-Army) contretemps. It rightly goes beyond blame and finger-pointing. Let me lay my own bias out front — Palantir is a fantastic company, there also many amazing and hard-working military tech people, and Rep. Duncan Hunter’s frustrations are also (as Burke et al explains) understandable. I see no villains here.

There are systemic reasons for why Army users struggle with Army systems: lack of interoperability/commonality, and the overall mismatch between Army IT development practices and the Valley way. It’s a great piece, and I encourage readers to mosey over to Small Wars Journal to see how endless hours of Burke complaining about AKO (the reflector belt of Army IT) finally became productive.

In particular, I would like to highlight one Burke-Smith-King bullet of interest:

Code the software using open concepts, and design the software for user modding.   Army software is often locked into proprietary specifications of the vendors.  However, the commercial software and gaming industry often encourages add-ins and “mods” to their software that enhance the user experience.  In many cases, these mods are incorporated into later versions of the programs.  The Army should leverage the ingenuity of its tech-savvy soldiers to constantly improve and refine the systems they operate.

A major part of DCGSC-A is now open source. But I’d like to expand a bit on the quoted bullet.

One of the major problems the Army users quoted in this somewhat inflammatory The New Republic article talk about is their difficulty fitting components of DCGS-A to user requirements. Though much of this has to do with the more generalized problems Burke and others talk about, one could also plausibly see problems that issue from unique operational requirements.

Tom Ricks famously said that different geographical regions of Iraq felt like entirely separate wars. In Afghanistan, then-Major General Michael T. Flynn wrote about the need for atmospheric and specific intelligence on local conditions. No one software program has everything or can do everything well, and the military and intelligence community that is increasingly asked to do (in breadth and depth) more than ever. So what to do?

In the computational social science community, we deal with this issue by generating new packages that serve a local and specific need. I use the programming language Python for my coursework, and Python has an active user community that contributes, standardizes, and validates packages. If I want to do something with statistical algorithms, I import the pandas package into my interpreter. If I want to use network analysis, I import networkx (a package that former intelligence analyst and current private sector data scientist Drew Conway has said stands up to some of the best social network software in the defense community). You can do statistics without pandas, but your own improvisational solution might not be as good as something as tested and popular as the pandas package.

It is because of this flexibility and tight user community that the statistical programming language R is quickly threatening closed-source industry leaders in popularity among all manner of data science career areas. In my own whimsy as an academic egghead PhD student, I wondered–following Burke’s modding suggestion–if something close to my own experience with Python could be replicated. Operating in a particularly rough part of the world and your mission software needs some extra functionality? An package could be designed to solve the particular problem.

Most importantly open-source programming languages and software can at least theoretically interface with the proprietary products often used in the federal space. The software giant ESRI has built a Python interface  for its popular ArcGIS geographic information system program. And one can also use open-source software in development environments that go easy on users without much programming experience. Though I personally prefer the Spyder Python development environment and iPython Notebook, some of my classmates use Enthought’s proprietary Canopy development environment. I am a little (though not by much) more used to importing packages from the command line and navigating repositories. So I feel more comfortable installing my necessary packages from my Linux virtual machine’s terminal, not Canopy’s easy-to-use package manager.

I don’t know if it would be possible to replicate the freewheeling community of users seen in the open-source community within the military. In fact, when I posed this question to a group of military IT insiders in a email chain, they (rightly) told me that it was fantastic a vision as the Iraq and Afghan war strategies. There were many trenchant observations, many of which focusing on uneven/outdated IT knowledge. But two in particular struck me as particularly telling.

Even though Python has a “benevolent dictator for life” it also depends on a vast, freewheeling community of users. A closed-source version of Github would not benefit from this, and thus there would be less advantage for a soldier or intelligence community analyst to work on their own time (unless specifically incentivized by their boss) to develop, say, a Helmand or Nuristan package. Even if we could get something like that, the security requirements, organizational stovepiping, and bureaucratic politics that characterizes the military-industrial complex might act as a limiting factor on the size and viability of a military modding community.

Lastly, software is iteratively improved in the open-source due to a large group of people attacking bugs and improving on the original design. Without a sufficiently large and diverse community, a military/intelligence community mod group would not really be as effective. And if I download a package that hasn’t been sufficiently worked over, the worst that might happen is that my class model would run more slowly or output spurious results. A military package that doesn’t work correctly could have much more serious consequences.

That said, I don’t think the vision I lay out is completely improbable. The aforementioned networkx package was developed by the government-run Los Alamos National Laboratory, demonstrating that a federal ecosystem could also be a player in open-source development (little known fact: TOR also grew out of a federal project). And the community of practice fostered by Small Wars JournalDisruptive Thinkers (and its DEF spinoff), the Warlord Loop, CompanyCommander, and other informal groups suggests precedent for some precedent for a military/IC modding-like system. As a civilian on the outside, I would also be curious to see what the intelligence community’s experience with similar forums on closed networks like Intelink, SIPR, JWICS, or the Open Source Center have been (for example, the much-heralded Intellipedia).

Burke, Smith, and King are bright young officers, and I hope their crusade for better Army IT meets with success. And even if an military officer  or government civilian probably won’t be able to just type my Ubuntu terminal command and get a package from a repository, the vision of modding Burke and his friends suggest would help IT be more responsive to government and military needs. That said, I can reliably predict that AKO will torment Burke even after he eventually leaves the Army. :)

Read the original blog entry...

More Stories By Bob Gourley

Bob Gourley writes on enterprise IT. He is a founder of Crucial Point and publisher of CTOvision.com

IoT & Smart Cities Stories
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Early Bird Registration Discount Expires on August 31, 2018 Conference Registration Link ▸ HERE. Pick from all 200 sessions in all 10 tracks, plus 22 Keynotes & General Sessions! Lunch is served two days. EXPIRES AUGUST 31, 2018. Ticket prices: ($1,295-Aug 31) ($1,495-Oct 31) ($1,995-Nov 12) ($2,500-Walk-in)
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
IoT is rapidly becoming mainstream as more and more investments are made into the platforms and technology. As this movement continues to expand and gain momentum it creates a massive wall of noise that can be difficult to sift through. Unfortunately, this inevitably makes IoT less approachable for people to get started with and can hamper efforts to integrate this key technology into your own portfolio. There are so many connected products already in place today with many hundreds more on the h...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He has been a regular contributor to both InformationWeek and CIO Insight...
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management company where he learned about Bitcoin and eventually Ethereal. Andrew's role at ConsenSys Enterprise is a mul...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...