This is part of the Abstract and Introduction I wrote for a paper for the DHS on PIINs, a concept of my own. I am writing a much lengthier essay/paper (perhaps even a small book) on the same subject which will include information on how to form PIINs of various kinds and in different industries using the same basic techniques and procedures and networks.
I use these same principles in the development of all of my PIINs regardless or industry or purpose. Although each PIIN is modified to service the particular requirements of how it is constructed and what exact purpose it serves.
Although this is a little out of order for my publishing schedule I offer this post up as my Business of Business post this week.
First of all, let me summarize the nature of the PIIN. The Personal (or Private) Intelligence and Investigative Network, like all networks is almost entirely dependent upon a series of established contact points. This is both the strength of the PIIN and the inherent weakness thereof. Therefore it is imperative that high-quality and functionally useful, as well as accurate and practical contact points be created, assessed and reassessed, and maintained over time. This is true whether the contact point is physical, biological, communicative, informational, electronic, technological, or computational. Every asset is a tool and the quality and functionality of those tools are the essential elements in the creation, maintenance, and performance of your PIIN. The Value of any Network is circumscribed by the acute and chronic qualities of those components, which within themselves compose the actual circumference, and separate elements of that real network. If the components of the network are of inferior grade, if the contacts are defectively impositional or of little practical use, or if the contact points are weak or insecure then the entire network is suspect and prone to failure at any and every point of transmission. The PIIN therefore should avoid both obvious and subtle deficits at all times by being practically and pragmatically useful, flexible, adaptable, in a state of constant positive growth and change, accessible, composed of superior components and contact points, secure, and most of all accurate and reliable.
Each and every network is therefore dependent upon the depth and breadth of the human contacts established interior to and exterior to that particular network and subject to the limitations of accuracy and the quality and quantity of valuable information that network can generate. The first real action needed to establish any PIIN and to make it fully functional is the recruitment, development, and maintenance of quality contacts. Contacts are always of the most absolute importance in the establishment of any PIIN. In addition the nature and quality of those contacts should be viewed as central and formative to the capabilities of every other contact point in the configuration and to the network as a whole. After an initial establishment of contacts those contacts should be immediately vetted and/or tested for accuracy and quality. This process of discrimination should be both an immediate tactical and testable undertaking and a long-term strategic process of recurring verification and reverification. Do not expect any particular source to be always accurate, but do not allow any particular source to function in an important role unless it has proven itself capable of both consistent reliability and trustworthiness.
After establishing a few reliable and trustworthy contact points the network must grow in order to gain new sources of information and intelligence as well as to develop and generate new capabilities. Therefore always view already established contacts and contact points as generators of new contacts, informants, intelligence and perhaps even secondary and tertiary networks, or sub-networks. Consider as well every potentially useful new contact or acquaintance as a possible future contact point in your greater network. Contact points should also be capable of redundancy and potential verification of information and intelligence gathered from other points along the nexus and for information gathered from sources outside the network. This is to say that contact points are more than simple sources of information; they will also function as multi-capable nodes along the operational structure of the entire network. I will expound upon the importance of and briefly discuss some of the details regarding contact points later in this paper. For now it is important to remember that contacts and sources provide information and possibly intelligence, but contact points can potentially serve many varied functions, such as; information retrieval, intelligence gathering, analysis, communications, coding, encryption, decoding/decryption, collation, research, as reliable and secure relay points, as information nodes, computational capabilities, disinformation and misinformation dissemination, and even serve as a sort of network disguise, and misdirectional cover or front.
Constantly look for, search out and develop new contacts, contact points, information and intelligence sources, and informants in order to successfully grow your network. Your network’s ultimate effectiveness will depend upon both the quality and quantity of your contacts, contact points, and your contact’s network. In the initial stages of building and developing your network concentrate on the quality of your contacts and contact points, but in the larger and long term concentrate upon both the quality and quantity of those contacts and contact points which comprise the elements of your network. Always develop and maintain quality to the greatest degree possible within all elements of your network, but also always grow and encourage quantity in the most consistent manner possible throughout all aspects of your network. This will assure that your network has both great depth and breadth and that it is capable of the widest and most valuable range of flexible and functional capacities possible.
It does not matter what the major focus of your network is, what it is most well designed to do, what it in actuality best does, or what the functional intent(s) or objective(s) may be, this introductory advice applies equally well to any possible network you might desire to establish in any field of activity or enterprise. The PIIN is a potentially invaluable tool for both the amateur and professional alike, for both citizen and official agent, and no matter the function or objective, the real capabilities of any established PIIN will be determined by the inventiveness, innovation, flexibility, enterprise, imagination and quality of the component parts of the network. And those component parts are composed and arranged by the originator of the network, that individual who is responsible for first establishing the nature and parameters of the own individual PIIN. The originator therefore will establish the genesis of the network and how well it grows and develops in the initial stages, but as the network grows it will develop capabilities never earlier imagined by the originator and will eventually become functional in an almost independent sense, as long as quality contacts and sources are developed and as long as those contacts and sources continue to grow and establish new capabilities and contacts of their own. A PIIN begins therefore as an idea and individual construct but over time develops into an almost biological organization of vast complexity and capacity. Drawing upon the collective skills and capabilities of the PIIN for whatever is desired or needed makes the PIIN a worthwhile and profitable venture for all individuals associated with that network, and because of the potential for continued and even exponential growth the PIIN is an extremely advantageous system of achieving complex objectives rapidly and of multiplying capabilities well beyond the individual level.
Because of the limitations of space regarding this essay I cannot describe all of the potential advantages that would possibly be gained by the formation of individual PIINs, either those advantages that would be enjoyed by agents or officers in the service of some official organization, or those advantages that would be enjoyed by citizens who have formed and are employing their own personal PIIN. But the potential advantages would be numerous, and such networks could beneficially overlap, inform, and service each other in times of national emergency or crisis. More importantly, if such networks were allowed to “cluster” and interact/interface in an efficient, secure, and positive manner then they would serve as invaluable intelligence gathering and investigative tools for the anticipation of disaster and the effective prevention and thwarting of many forms of malicious harm intended by the enemies of the United States.
As just one small example of how PIINs would make highly effective and useful tools for the benefit of both the citizenry and the government let me outline this scenario. A hostile entity decides upon a coordinated and simultaneous cyber-attack against both the American civil government and the Pentagon. These attacks overwhelm official servers who are the obvious targets of offensive action. During such periods of particular and isolated cyber attack against governmental and/or military networks, or even during periods of general and on-going netcentric engagement or warfare the PIIN can act as an emergency secondary or redundancy system of information and communications exchange, intelligence gathering, an investigative force as to who is attacking, why, from where, and how, and for coordinating a necessary and effective counteraction or response. While main systems are under attack, disabled, or malfunctioning PIINs can serve as ancillary and even secretive means of continuing vital operations or responding to attack. It is relatively easy to attack and at least temporarily paralyze large-scale and centralized networks efficiently given the proper time, coordination, planning, resources, incentives, and information on system vulnerabilities, but it would be nearly impossible to simultaneously disable all small-scale private and personal networks. PIINs are the private enterprise of innovative intelligence and investigative networks.
Other examples of the potential usefulness of the PIIN are easy enough to construct, such as creating and fostering “bridging links” between individual citizens, law enforcement agencies, governmental entities, and the military. PIINs can also be used as investigative networks and resources, as research hubs, as communication nodes, as a pool of expertise (both amateur and professional), as an emergency system of collective and clustered capability, as a functional and ever growing database of information, as an ancillary or auxiliary analytical network, and as an exchange for valuable contacts, sources, and useful informants. Perhaps just as important to the overall value-added aspect of the usefulness of the PIIN is the fact that most PIINs can be constructed at little to no cost using already available personal, technological, and organizational resources. It is simply a matter of redirecting already available resources to the construction and maintenance of the PIIN, or of simply reformatting the way in which contemporary networks are thought of and how they currently operate, or fail to operate, effectively.
The next administration would do very well to consider encouraging the development of Private and Personal Intelligence and Investigative Networks throughout our society, and to encouraging the exploitation of such networks for the benefit of all the citizens of the United States of America.