2013-06-19

A Change and military Organization


John P. Kotter: ”People change what they do less because they are given analysis that shifts their thinking, than because they are shown a truth that influences their feelings.”

Some experiences on leading the change in military environment


This is not a way to fight – let´s go over this little marsh!”1

For a human being, a change is always grossing the boundaries of one´s comfort zone. Going over the edge is an individual experience. There are persons, who feel the edge is a challenge and others to whom it is a blockade. The leader of change must acknowledge this difference. The leader should give right direction to those willing to start the journey and offer the others a firm hand of support over the abyss of fear and uncertainty.

Since feeling is always individual and right, leader of change must walk the talk. All leaders should walk amongst their troops, tell narratives of better future, listen to fears of their subordinates and help them to manage their threats. Leaders are to tell about change with stories from troops reality, create feelings with facts and urge to change their behaviour.

I dare not – I haven´t had any training for that!”2

The end state may be either improving the current tactics or introducing new weapon systems, but individual and organizational skill and competence are always cornerstones in capturing new capability. Human competence does not develop linearly but in a spiral. The new concept needs experience gained by practice and understanding with feelings to get to the level of competence. After individual and collective acceptance, the new way of doing things will change professional behaviour. Sometimes existing proficiency may be sufficient, but individual feels, that there is a need for training, certification, and authorization, before talks turn to deeds.

Organisational competence includes culture, guides, and operational procedures. A change of those requires, that members of the organisation understand the deeper structures of their unit, create an aligned interpretation of new rules and change their behaviour, interaction, and values in synchrony. The change of organisational competence requires most members to adopt new behaviour and pull others with them. This calls leader to award any positive change visibly, and without hesitation rotate all those sub-leaders that are not capable of changing their unit.

Company – Attention! Right – turn! Forward – March!”

Change is continuous within every organisation – either planned and executed or unnoticed but gradually accepted. When an organisation is producing its value in monopoly without competition or increased demands, it tends to get fat. Everyone wants to do meaningful work, functions and roles do get narrower by time, nobody wants to give up legacy tasks, and new jobs require additional personnel. Typical public-sector organisation builds up extra controls and excessive bureaucracy. A lot more administration is needed to avoid mistakes, to utilise public funding according to paragraphs and to do things right but not necessarily right things.

Public sector organisations should improve their cost-efficiency about 5-7% annually to be able to compensate increasing expenses and fixed budgets. Organisations in open markets, or otherwise in a competitive environment, should continuously improve their cost-efficiency and be ready to make disruptive changes as needed to have annual 10% return on investment.


Go on – I am supporting! (And having a smoke behind this boulder).”3

When an organisation is utilising relations with other organisations for adding value, a change in one part of the value chain will project need of a move to other parts. Even other entities within the same space of operation may have to change because one intertwined stakeholder amongst them is changing. The fluent interaction between organisations requires trust in all relations. A change must take care the confidence of relations, the value of one´s brand and be aware, that adversaries are not able to utilise capability caps opening during disruptive changes. 

Armed Forces usually operates in the following field of interrelations:

  1. Defence is a projection of the state´s values and culture
  2. Defence is always in relation to adversaries’ military force and willingness to utilise it
  3. Defence is always in conjunction with states politics, structure, economy and operation network.

A need for change may appear from all these directions, and a change coming from one direction may affect the other relations as well. A Change of Military Organisation must maintain a balance between these directions of interaction. Otherwise, Military may be regarded as alien, not fulfilling its duty or as unnecessary cost.



Let´s change organization to gain savings!”4

The organisational structure is a tool to arrange tasks and assets so that results may be produced with optimal cost-efficiency. A change should start from assets, tasks or results and then the new production is organised with optimised way taking into consideration the space of operation, interfaces with other stakeholders and intentions of the adversary. A form of organisation and basis of procedures do affect how people feel the change.

Matrix organisation, driven either by process or project, is easy to rearrange when assets, tasks, results or environment are changing. When specialised teams in a matrix remain almost untouched, goals and interrelations may be altered quickly. Higher the matrix maturity, faster the change of organisation.

Functional line-staff -organisation faces challenges in changing its rigid power structure, siloed functions, and non-existent inter-relations. In the worst case, one may only enlarge existing functional organisation or cut off its main parts. Iterative improvement is often blocked by almost autonomous administrative functions, which have seceded from core operations a long time ago. Rigid administrative processes may eat over half of productive time and create a mass of culture in which change is the most challenging.

Different units within same force may not be equally prepared for change. Some of the units may be in a state of “paralysis,” where all energy is spent in defending achieved status. Some may be in a state of “boiling” when the unit has lots of energy to change, but there is no unanimity of direction or method of change. Some units are in a state of “friction,” where vision and mission are clear, but natural energy or courage is lacking because of previous bad experiences. Best among the units are in a state of “mission command,” where the unit is prepared to change, and personnel is willing to accomplish as soon as the new mission is communicated.


Could you find this document? Yes, Where it may be? Most probably in Archives of War Museum!”5

The organisation consists, besides people, material, and facilities, also immaterial assets of production. These assets include documents, contracts, royalties, brands, traditions, and trust. If the organisation is focusing mainly on changing of structure, it will lose the organisational memory, when documents are sent to Archives and trusted relations between people, when people are being rotated to new tasks. Also, information and understanding are valued assets, in some cases even multipliers to other assets. Thus they must be managed throughout the change.


Everything will be better after the change!”6

When the change is almost over, quick-wins have been achieved; the new organisation is manned, new tools are available, leaders of change are being rotated, then people began drifting back to old habits, to old interactions, to old familiar culture. The change has not been cemented into competency and roles of people, procedures of organisation or culture of cooperation. End state must be bind to every level of structure and interfaces between units. The best method to stick change is to introduce new metrics, that will reward continuously new behaviour and makes it meaningful even to improve it. Control of change must extend beyond first sight of chance. Existing personnel should continue to be trained and certified to a new way of working; recruitment should support new procedures and skills, bases of old culture (key advocates, triggers of old habits) are recognised and removed. Leaders must walk persistently amongst subordinates to promote new methods and listen to people’s fears and other feelings. Social pressure must keep last opponents at bay and on track of change. Achieved peers should be brought amongst troops to tell stories of success with a new concept.


Narratives of change


Because our post-modern society still learns from stories, there is the following story of three little Organisations and their big Change.

Once upon a time in the far far land, three little Organisations were living in their big house in peace and complacency. Surely there were times of tightness, but on average, everything was going smoothly. Then one day the Patron of three little Organisations said that from now on, there is not going to be an annual increase in their allowance, but the same amount must suffice for next five years. Life went on with three little Organisations although their big house got more crowded every year because every member sub-optimised their work and many good members were recruited. The something happened in surrounding environment. Everybody wanted more, prices increased, the weather was colder, firewood was scarce, and aliens invaded parts of their house. After tedious complaints and pleads, the Patron of three little Organisations consented a temporary rise to their allowance but required all three to change each to the smaller house within next three years. Each little Organisation made grand plans for change utilising their sharpest members and most expensive consultants. However, no implementation was accomplished, when their Patron came to them one day and declared change to commence. However, there were all preparations to be done, members to be gathered, change the route to be reconnoitre and transportation to be ordered. The Patron was adamant and on top of all said that their allowance is to decrease within next four years of total 10% and after changing their compensation would be 10% smaller annually than today. The three little Organisations were paralysed with fear. The patron gave them three routes to be used for their change to a new house: 

  1. short route through plains, but very very windy. 
  2. direct route, but many floating rivers on the way. 
  3. long, dark and winding but without wind or rain.

The Change of Organisation

The First of the three little Organisations established a bright project crew to plan very precisely how all members of little Organisation should walk along short but windy road to the new house. Every member had time to start the journey and timetable to proceed by milestone and to reach the goal. Along the route, The First Little Organisation arranged guards to control change and keep everybody strictly on planned time. It happened that just in time members of the First Little Organisation marched in line over the starting point, run over the windy road to first control and the second, until they reached the new house. The wind was strong and some members weak, so they were blown off and lost. However, the change was executed precisely according to plan as it was measured with precision. The First Little Organisation settled in their new tiny house, which felt already quite tight. Members returned to their old routines and tried to substitute those who were lost on the way. Then came the day than Patron cut the allowance by 10%. There was not money enough for firewood, so the First Little Organisation ripped his new house of all burning ingredients gradually. One day it happened that big bad Adversary walked by the house, noticed ripped building and the Little Organisation within. Big bad Adversary blew the house down, and the First Little Organisation runs away.


The Change Organisation

The Second Little Organisation took the mission with diligence. A coalition of change was created along the advice by Kotter. Managers and leaders walked amongst members to explain the mission ahead. Nevertheless, members were not willing to change. They were better as is, the new place was told to be in dangerous condition, and furthermore, there is the rainy season, so they should wait for more information and better time to change. The Second Little Organisation was desperate. The patron did not yield up but threatened to lower the allowance even more. This made the Second Little Organisation angry. The change will be executed even it kills him. The Second Little Organisation organised change programs, change portfolios, change projects and change sub-projects in best practice way. Planning and plans filled the house, but members were informed only of decisions. Even the old Neighbours were invited to help in planning, but members were told to keep on living old way. There was nothing to worry because management will take care of things and tell members at the due time what is expected from them during the change. 

Because almost all time was spent in planning, there was not much time left for an actual change. With help from old Neighbours, the Second Little Organisation rotated leaders, left behind fattest or most reluctant members and started to march. Many were the obstacles on the way, a number of members were swept from the road by floats and even more turned back because of frustration and fear. Finally, the Second Little Organisation reached the new house, and a celebration was arranged. The New house was tiny, but since Organisation was smaller, everyone had room inside. It just happened that old “Doorkeepers” were not able to survive the change so nobody did know, how to close the new door and new neighbours were too busy to help. One day the Big bad Adversary happened to arrive in the area, noticed a tiny house with an open door and the Second Little Organisation inside. The Big bad Adversary blew the house down, and the Second Little Organisation runs away.


The Change

The Third Little Organisation did analyse the route, hardships on the way, size and position of the new house. The route was long and dark. The new house was tiny and allowance 10% smaller. The mission seemed unachievable. Reconnoitre patrol was sent to collect the experience of the route and new premises, members were categorised to those needed, those strong, those weak and those not needed. Patrol returned with some new neighbours. After analysing information, talking with new neighbours and planning with all members, The Third Little Organisation decided how to accomplish the change. The strong and fit members could start march as soon as possible. Those not needed but strong should also begin their journey, but with new neighbours, who promised to take them in their houses. Those needed but unfit started training to gain strength and lose weight. Both first units made the journey to a new village and began to create relations, learn new ways and settled into the new house. This was celebrated in both ends, and those remained in training got new motivation. Gradually, the Third Little Organisation sends units on the way as they become fit for the journey and the new tiny house. Finally, only those not needed and those unable to get fit remained in the old house. These members little Organisation left with his old neighbours supplied with gold coins. 

Finally, the Third Little Organisation was in a tiny new house surrounded by good new neighbours.  All members were busy doing new tasks, and they appear trained and united with their new neighbours. Even when Patron did cut down allowance, third little Organisation was able to loan some money to new neighbours for their house repairs. One day, the big bad Adversary happened to arrive in the area. Third Little Organisation noticed it, called neighbours to join and chased the big bad Adversary away. 


Main sources for this paper were:
John P. Kotter & Dan S. Cohen: The Heart of Change. Harvard Business School Press 2002
Pauli Juuti & Petri Virtanen: Organisaatiomuutos. Otava 2009 (only in Finnish)
Peter F. Drucker: Management Challenges for 21st Century. 1999

This is a translation (19.06.2013) of the paper Juha Mattila prepared late 2011.

Remarks:
1 Detached from the movie: Unknown Soldier – Tuntematon sotilas by Edwin Laine
2 Heard from many functional experts that are shy to start behaving differently.
3 Heard and seen in infantry assault exercise
4 Primary goal and object of change in last three major changes of Finnish Defence Forces
5 Heard in aisles of one new organization after a change with non-existent immaterial management
6 Often heard in the talks of change managers, who have not succeed to create real change narratives

2013-06-10

National security, cyber espionage and privacy


Current situation in the cyber space


There is more malevolent behaviour in the cyber space, we call Internet, than ever before:

  • During so called Arab spring national telecommunications authorities did disconnect their citizens many times from international Internet and telecommunications services
  • Kapersky Lab indicated 2012 that Russian systems are being attacked with “Red October” virus. President Putin ordered 15th of January 2013 FSB to create a system that finds, prevents and destroys effects of cyber attacks directed towards Russian Federation.
  • Internet service providers have just seen most the powerful distributed denial of service (DDoS) attack ordered by unorthodox service provider1
  • Mandiant report is claiming that China is very actively probing western networks and servers.2
  • U.S. has started an information operation to have China to be labelled as most malevolent country in Internet
  • U.S homeland is arguing over National Security Agency having access to citizens private information in Internet and major service providers customer information.3
  • U.S. President has ordered to utilize existing and new cyber capabilities for Offensive Cyber Effects Operation (OCEO) in order to: “advance U.S. National objectives around the world with little or no warning to the adversary or target and with potential effects ranging from subtle to severely damaging”.4
  • Check Point Software is reporting that 71 % of the malevolent sofware is coming from USA, 58% of botnet commands are coming from USA and most vulnerable products are coming from Apple, Microsoft and Mozilla.

Some media sources even say that these symptoms are a beginning of next confrontation like cold war between U.S.A and Soviet Union, but this time conflict is in the Internet5. Some organizations like Electronic Frontier Foundation (EFF) are telling that the freedom and private information of a citizen is in danger.6

Nothing new under the sun, but technology has been evolving


National security authorities have been spying their citizens while trying to identify foreign and domestic counter forces and criminals. Before Information and Telecommunications Technology break through, authorities in several countries were screening letters, censoring newspapers, restricting broadcasting licences and forbid public gatherings. Public opinion, information on events and images of events have been always targets of manipulation for both adversary and own authorities. Information is both an asset and vulnerability of national defence. When targeted information is stored or transmitted in analog or digital means, military espionage is called Signals Intelligence, SIGINT or Open Source Intelligence, OSINT, if executed by searching published information.

In USSR telephone network was being monitored constantly starting from Stalin´s era and academics were developing speech recognition applications to be able to identify speakers from distorted telephone discussions. ECHELON system was developed by USA first to monitor Soviet block countries telephone communications. With UKUSA agreement USA and UK authorities were able to bypass their existing legislation and spy each others citizens and trade information captured from calls. After “Cold War” era ECHELON was directed to monitor other communications, telefax and data connections. The system intercepted both satellite and land line communications. After the system was extended to Australia, New Zealand and Canada, it covered global communications hubs and was able to screen both civilian, governmental and military information that was transmitted without sufficient encryption.

As the volume of information increased, manual screening and content detection was replaced with automated information systems. Telefax, SMS and SMTP traffic specially was easy to tap with computers, categorised with key words and their combinations and further analysed using statistic tools. ECHELON and similar systems were improved with sophisticated technologies like datamining, speech recognition, business intelligence and automated translation. It is said that ECHELON system works by indiscriminately intercepting very large quantities of communications and then shiphoning out valuables using artificial intelligence aids to find key words.7 One of the most famous COTS products for this is MEMEX based Fusion Center IT provided by SAS. According to SAS it:

  • provides a single platform that eliminates double-entry,
  • provides a workflow from intake through vetting all the way to publishing intelligence products, while providing advanced search across all data sources.
  • creates easy summary statistics on “requests for service” and other work
  • is an end-to-end solution covering the entire intelligence lifecycle – from information collection to review, evaluation, development analysis and sharing
  • is recognized for its pioneering, advanced search capabilities.
  • has the strength of SAS predictive data analytics. 8

National Security Agency of USA (NSA) has created surveillance, capture and analyse system called PRISM. It is allegedly tapping directly on major US service operators (Microsoft, Yahoo, Google, Facebook, PalTalk, YouTube, Skype, AOL and Apple) information on users and their service utilization. This information is more than metadata including for example email, video and voice chat, videos, photos, VOIP-calls, chats, file transfers and social networking details. Number of obtained communications is said to be increased in 2012 by 248% for Skype, 131% increase in requests for Facebook data and 63% for Google.9

This amount of information requires professional capacity and algorithms to process data. NSA is said to have BOUNDLESS INFORMANT -intelligence system10 that is utilizing high volume storages and “big data technology to query in the cloud to produce near real-time business intelligence”. System allegedly11 can:

  • collect almost 3 billion pieces of intelligence from US computer networks over a 30-day period
  • collect 97 billion pieces of intelligence from computer networks worldwide
  • answers to questions like:
  • How many records are collected for an organizational unit or country?
  • Are there any visible trends?
  • What assets collect against a specific country? What type of collection?
  • What is the field of view for a specific site? What type of collection?
These presented questions are not telling much of the systems real capabilities since they are more oriented on management of analysing process than actual intelligence questions, but even with 2-dimensional datamodel and fast processor one can fuse data very quickly. The problem is that this kind of automation can only answer questions of relations that programmers have been able to code into system.

Better level of analyse is easily achieved by utilizing modern business intelligence tools like IBM´s GOGNOS12, which can analyse a structured datawarehouse or unstructured data with good metadata providing:

  • Answers to business questions fast with guided report analysis, dashboards and navigable reports.
  • Ability to track business developments.
  • Reorganizing, reshaping and recalculating data enabling to identify the optimal solutions to business problems.
  • Uncovering patterns in business and apply algorithms to business intelligence data to predict outcomes.
Virtual database and easy structuring of information is giving everyone ability to create understanding from large quantities of data without long programming or super computers.

3rd generation web-technology is providing even more effective tools for intelligence. Semantic web allows to retrieve information from web and other systems overriding current problems of system and data model boundaries. Semantic structuring of data13 is giving authorities ability to create knowledge models for special needs and depict new relations and trends from existing public and private information. Semantic web, resource description framework (RDF) and advanced ontologies are being utilized today in retail business and intelligence agencies globally. All information, structured or unstructured, from Internet or Intranets, public or private sectors, content or communications header data may be categorised, attached with metadata and fused with different knowledge models to answer questions like:
  • What has been subjects social network past 10 years and nature of each contact?
  • What is current the cyber threat level of our state and what is the forecast for next weeks? Which groups are most hostile in their wording?
  • When society is reaching a degree of unrest that uprising of crowd is to be happening?
  • What is the possibility that subject will in future be manipulated to act against ones current society?


How national security is utilizing public and system information in cyber space

Screening citizens and their information has been normal task for national security authorities. The legislation of each nation is defining different procedures to be able to focus surveillance to a certain individual or society. Normally in Europe and U.S. there is first need to have a court order (i.e. proof of illegal activities is strong) and then communications operators are obliqued to give metadata of communications to authorities. This may be extended to recording actual content of communications.

In USA president Bush signed a U.S. Surveillance law in the aftermath of 911 event. That law allows NSA to target any customers of participating firms, who live outside the US, those Americans ,whose communications include people outside the US and it opens also a possibility to collect communications made entirely within the US. As it seems to be, NSA and US general attorney have been guided to collect information, when there is a reasonable suspicion that one of the parties was outside the country at the time of recording.

Sweden approved 2009 the law that Armed Foces signal intelligence (SIGINT) unit, Försvarets Radioanstalt (FRA), is authorised to monitor real-time all voice and data transmissions going over Swedish borders without any special orders by court. So all tele- and datacommunications coming, leaving or going through Swedish borders is being monitored.14

Russian part of Internet, Runet, has 70 million active Internet users – Internet use penetration is 57% in Russia. Social media has especially won clients from government controlled broadcasting companies. Thus Duma, Russian Parliament passed a law 2011, that established a single registry of domain names, sites and web pages that contain objectionable material. The Federal Service for the Protection of Consumers` Rights and Human Welfare, the Federal Drug control Service and the Federal Surveillance Service for Mass Media and Communications were empowered to blacklist sites without a court order.15

Russian SIGINT agency, FAPSI was established 1993 around parts of former KGB body. FAPSI is responsible for communications security and signals intelligence. FAPSI operates under the 1996 Law on Foreign Intelligence and collects information pertaining to "political, economic, military, science and technology through use of electronic means." FAPSI has both the authority and capability to penetrate all government and private information services in Russia. It also has reportedly been successful in collecting intelligence on foreign business ventures, including confidential bank transactions. According to FAPSI General Director Colonel General Aleksandr Starovoytov, FAPSI is very valuable intelligence source:
"We are engaged in global electronic intelligence ... The main feature distinguishing our reports from those that come via the covert agent network of other special services is that ours is documented. We have access to a vast number of sources. We have a round-the-clock flow of decoded information which can produce fundamentally diverse viewpoints. "

With 500 million Internet users China is biggest network domain, greatest market with over CNY 900 Billion annual revenue and hosting worlds largest online community QQ with 583 million active accounts. China Telecom was the first Internet Service Provider and still has a monopoly of “local loop provider”. First legislation authorizing monitoring and filtering Internet was established on 2000. China build up the “Great Fire Wall” around 2009 to filter out overseas Internet services and monitor all datatransmission over Chinese borders. The Government is able to monitor websites, e-mail and keywords. Certain search words are blocked, e-mail with banned words is trashed and certain websites are blocked (for example western social media sites). Besides filtering action Chinese government is applying tens of thousands agents, who are patrolling on the Chinese Internet network. They scan communications and websites and order illegal sites to be shut down. They raid Internet cafes, monitor identified dissidents and infiltrate suspected activist groups.16

States belonging to European Union have signed human rights agreement and its 8 chapter allows individual privacy to be lowered in protecting national security only if policy is stated in national legislation, it is public and process is well defined. European Parliament has recommended that every member state should establish a parliamentary board to supervise its national intelligence agencies. On the other hand European Parliament is recognizing, that SIGNÌNT is being executed globally beyond any national legislation or control and thus recommending corporates and individuals to encrypt all important and sensitive information transmitted through telecommunications or Internet.17

Google reports that government requests for user data has risen 70 % since 2009. During 2012 most frequent requesters have been USA, India, France and Brazil. In USA about 68% of requests were under the Electronic Communications Privacy Act since they don´t typically involve judges.18



What does this mean to privacy


There is no global integrity for privacy of individuals or corporates within Internet or telecommunications services. Therefore everyone should understand that sending e-mail to known receiver, chatting with your friend or speaking on phone with definite individual is as public as sending same content on postcard with international postal service or post it into one´s blog.

Every search from web is being stored by search engine operator in order to be able to focus advertisements better to meet your needs. Every page you visit in Internet is being identified (at least country of origin, type of browser and operating system) and recorded by advertising or statistics operators. Every tweet, like or status update you make in social media is being stored in your profile. Your friends, ex-friends, relatives, total strangers, employers, sport clubs, church and community publish information related to you and your closest into Web. You don´t even have right to that material, since it is the property of some stranger, who had Google glasses and took photos of you in an awkward situation.

Today, this information is being utilized by SIGINT authorities, retail chains, news agencies, advertising companies and communities. They are able to use your basic information like name, age, hobby, address, telephone number, property or partnerships in companies and fuse these with all other data mined from Internet to create a personal profile. With this profile they are able to foretell things you may buy, deeds that you may fall into, day you may die in heart attack or just to fulfil the curiousness of some of their employees.

This information gathering is not only online in Internet, but is happening in real world and public places. A good example of this was Boston Marathon 2013 incident and authorities ability to scan through vast quantity of video material and to identify possible suspects within a couple of days.

References:

1 Prolexic Quarterly Global DDoS attack report, Q1 2013
2 Mandiant APT1: Exposing one of China´s Cyber Espionage Units
3 Guardian 8.6.2013: Barack Obama and Xi Jinping meet as cyber-scandals swirl http://www.guardian.co.uk/world/2013/jun/08/obama-xi-jinping-meet-cyberscandals
4 guardian.co.uk, Friday 7 June 2013 20.07: Obama tells intelligence chiefs to draw up cyber target list – full document text. http://www.guardian.co.uk/world/interactive/2013/jun/07/obama-cyber-directive-full-text
5 Russia Today 25.2.2013: http://www.youtube.com/watch?v=TxHUM-vPvHs
6 EFF: NSA spying on Americans. https://www.eff.org/nsa-spying
7 A non-authorized source: http://whatreallyhappened.com/RANCHO/POLITICS/ECHELON/echelon.html
8 SAS MEMEX home page, http://www.memex.com/industry/fusion-center
9 Guardian Friday 7 June 2013: NSA Prism program taps in to user data of Apple, Google and others by Glenn Greenwald and Ewen MacAskill. http://www.guardian.co.uk/world/2013/jun/06/us-tech-giants-nsa-data
10 Guardian Saturday 8 June 2013: Boundless Informant NSA data-mining tool – four key slides. http://www.guardian.co.uk/world/interactive/2013/jun/08/nsa-boundless-informant-data-mining-slides
11 Guardian Sunday 9 June 2013: Boundless Informant: the NSA´s secret tool to track global surveillance data. By Glenn Greenwald and Ewen MacAskill. http://www.guardian.co.uk/world/2013/jun/08/nsa-boundless-informant-global-datamining
12 IBM home page, GOGNOS sotfware. http://www-01.ibm.com/software/analytics/cognos/solutions.html
13 Semantic Web home pages: http://semanticweb.org/wiki/Main_Page
14 FRA home page: http://www.fra.se/
15 Potomac Institute for Policy Studies: Squeezing internet freedom in the name of safety. 2012
16 Robin Garabedian: Internet in China: The Great Digital Wall 2010. http://www.slideshare.net/Robin.G/internet-in-china-the-great-digital-wall
17 European Parliament report on the existence of a global system for the interception of private and commercial communications 11 July 2001. http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//TEXT+REPORT+A5-2001-0264+0+DOC+XML+V0//en

18 Google Transparency Report. http://www.google.com/transparencyreport/userdatarequests/?hl=en_US