Tag Archives: Technology

Google Ngram Viewer’s History of the Cold War

It turns out that the history of the Cold War is best told not in books, but in graphs about books.

Google has an obscure new feature called “Ngram Viewer,” which allows users to search for individual words, or “grams,” as they appear in over 5.2 million digitalized books stored in the Google database. Users have the option to search for words in more than a dozen languages, even discriminating between British and American English.

The search function also allows users to modify particular words to do things such as determine when certain forms of words fell into and out of popularity (such as when “tackle” was used as a noun instead of a verb). By adding wildcards or modifiers, users can search for things as diverse as the popularity of slacks versus dress pants to which Internet operating system was most prominent.

Ngram Viewer searches from books written from over 600 years ago to the present day. The x-axis represents years in chronological order; the y-axis represents the percentage of books that a particular word or phrase appears in during that given year.

In a search of books between 1840 and 2008 in the English language, entering the terms “communism” and “capitalism” reveals a telling graph. At first glance, these data plots appear to create two insignificant lines. But combined with our knowledge of 21st century events, it becomes a surprisingly accurate graphical depiction of one of the defining struggles of modern times.Ngram

Communism first appears to overtake capitalism in 1947, where the red and blue lines intersect. This point coincides precisely with the announcement of the Truman Doctrine, signaling the beginning of the “containment” strategy that would consume much of the next four decades.

Communism appears to reach its apex on the graph in 1963 during the Kennedy administration, just two years after construction began on the Berlin Wall. Also of significance during this time was the introduction of a hotline between Moscow and Washington, enabling direct communication between the two Cold War powers for the first time. After the president’s assassination, communism begins a fatal free-fall from which it will never recover. In 1964, Leonid Brezhnev succeeds Nikita Khrushchev as Chairman of the Communist Party of the Soviet Union.

Capitalism finally appears to regain the upper hand against communism in 1971, around the time of the death of Khrushchev. Significant during this time is President Nixon’s visit to China in 1972, the first time an American president had visited the communist nation.

Finally, in the early 1990s, the area between the two curves is the greatest, signaling the vanquishing of the Soviet Union. After the Malta Summit between Soviet Premier Mikhail Gorbachev and President George HW Bush in December 1989, perhaps the most symbolic sign of the fall of the Soviet Union was the opening of a McDonald’s in the heart of Moscow on January 31, 1990.

While compiling a graph of words found in books of a particular language and attempting to ascribe some geopolitical significance to them may constitute a form of lingual bias, the uncanny similarity between the types of books written during the Cold War and the actual events therein is remarkable. Google’s Ngram Viewer is an important tool for analyzing society and discovering who we really are as a people.

Can one book predict the fate of the world? Perhaps not. But can millions of authors from around the world over the course of dozens of years accurately portray the consciousness of a people? Deus ex machina.

Innovation Files: Automated Plan of the Day (autoPOD)

There’s been a big uproar lately about innovation in the Navy throughout message boards and the blogosphere – what is innovation, what it’s not, and what method Big Navy should be taking to jumpstart innovation among the fleet, if any at all.  LT Jon Paris and LT Ben Kohlmann, both of whom are very involved in the conversation, had a great discussion about the topic on CIMSEC’s Sea Control Podcast, hosted by LT Matt Hipple.  LT Paris followed up with an excellent blog post.  While there are some contrasting views, it seems like one thing that’s agreed upon is that the deckplate innovation already occurring in the fleet sometimes doesn’t make it “up and out” or isn’t as publicized as it should be.  In that capacity, LT Hipple, and some members from the CNO’s Rapid Innovation Cell, offered a challenge to start publishing examples of innovation in the fleet.  I’ve decided to take this up head on in a series of “Innovation Files”.

Nearly every command has a “Plan of the Day” (POD) – a widely distributed one-page agenda with at least the current and following days’ schedule of events.  Depending on the command, certain PODs are very long and many regularly contain dozens of events per day, some at overlapping times.  Early on, I noticed a couple glaring inefficiencies particular to my command.  First was the process – A yeoman would be specifically assigned to “do the POD” for the day, a duty rotated among the junior yeomen that nobody wanted.  This task started by opening the previous day’s POD, changing the date, piling through various e-mails and files on the shared drive, and then writing the new daily schedule by hand.  After an hour or two, it would get routed up to the ship secretary, personnel officer, admin officer, training officer, operations department, various department heads, command master chief (CMC), and some others before finally getting to the XO.  Every position in the chop chain had their own changes and events to add, and it required the yeoman to literally go around the ship looking for each of these people, and then going back and correcting the changes for each correction or addition.  It wasn’t uncommon to print in excess of 15 POD drafts before the final revision.  As you can imagine, POD duties were an all-day event, and since the POD needed to be finalized and signed by the next day, it kept everybody around well into the evening.

After much thought, the XO, personnel officer, and I agreed on a plan to create a public calendar on Microsoft Outlook to streamline the POD process.  However, PODs have a very specific format, and Outlook can print nothing close to the format.  For example, asterisks had to be next to times if the event was to be announced on the 1MC, events had to be in bold lettering if the CO was attending, and everything had to fit on the page in two neat columns.  It wasn’t as simple as hand-copying every single event into the old POD format though; the daily schedule constantly changed throughout the day, and there was no process in place to ensure if any late additions or modifications in Outlook were included in the POD.  This, along with other human errors, severely complicated the process, and made it essentially as inefficient as the old method.  If only there was a better way!

autoPOD-1Introduce the automated POD (autoPOD).  We decided to devise a macro app on top of Microsoft Publisher, a computer publishing tool, to automatically translate events on Outlook into the same easy POD format everyone was used to seeing.  Macros are essentially programs, coded in easy-to-learn VBA (Visual Basic for Applications), that are built on top of application documents (in this case Publisher’s and Outlook’s) meant to automate tasks within these programs.  Because of this attribute, it gets around IT policy requirements, which prohibit the introduction of specific executable programs not pre-approved by SPAWAR.  Microsoft Publisher was chosen over Word because it’s specifically designed to manipulate documents with multiple dynamic text boxes.  Through an appropriate script reference, the app asks the user permission to reach out to any designated public Outlook calendar.  Then all the user has to do is click one button, and it automatically inserts the daily schedule into the POD publication – complete with dates, events, headers, etc.  The layout is easily manipulated by different codes inputted into the appointment screen on Outlook.  For example, for an event to appear “bold”, which indicates the CO is attending, an actual Outlook invitation for that appointment is sent to the CO, which is then designated on the user interface with a specific user name.

autoPOD-2

Along with events, the app supports all sorts of informational headers put in by different users through Outlook tags – for example, the operations officer puts in the appropriate command duty officers and duty sections, and the quartermasters put in sunrise and sunset times into Outlook.  The app supports time structures displayed as “All Day” or “TBD”, and all types of recurring events.  Different permissions (ie: read only, add, or modify/delete) can be granted to different users to modify the Outlook Calendar, and the program is set up for an administrator to view when and who is putting in the events, so it’s not possible to sneak a last minute evolution for the next day without the XO and CMC knowing.

AutoPOD was eventually customized for several other tasks.  By request, we built an automated Plan of the Week (POW) 10-day printable outlook on top of Microsoft Excel for the Planning Board for Training (PB4T), which mimics the POD format each day, for planning purposes.  Other ships had a weekly or monthly outlook summary with important events listed on the back of their POD, and autoPOD was customized for these commands as well, using the “priority” attribute to determine if the item should be displayed on a weekly summary.  We have continuously refined AutoPOD to accommodate every ships’ POD format, meaning there will be little, if any, visible change to the Sailor.  For example, there are options to autoPOD-3modify the font, size, and width for the time and subject columns.  Additionally, it’s designed to be plug-and-play – all contained in one publisher file – so it can be used immediately and without any complicated installation procedures.  Detailed documentation is provided on how to install the program and manipulate the schedule via Outlook.

It is worth noting that the initial concept of autoPOD was not received well in its early stages.  For example, the yeomen were used to a certain way of doing things, and didn’t want to move over from Word to Publisher.  Despite comprehensive training, some department heads and department lead chief petty officers continued to send e-mails to admin with their events, instead of deconflicting and scheduling it themselves in Outlook.  However, after much dedication and patience, everyone slowly acclimated.  The new system is now second nature, and it’s hard to think of how life even functioned in the past.

To date, autoPOD has been distributed to over a dozen ships, across several waterfronts.  It has undoubtedly made the POD process less frustrating, and has saved countless manhours and time, from the junior yeoman who can produce a POD in minutes, to the XO who no longer has to micromanage the process.  Unfortunately, we recently hit a bump in the road when asked to set up the app on a ship that finished an extensive shipwide IT refresh known as a Consolidated Afloat Networks and Enterprise Services (CANES) installation.  At the time, CANES strictly restricted ships from creating and using shared calendars, along with other security settings that prevented the app from working properly.  A workaround is in progress, but it illustrates a point that has been brought up in the recent discussions – many Navy policies and procedures are around for valid reasons, but often come at the expense of productivity and innovation.  It’s essential to collaborate between the fleet and appropriate project managers / designers / policymakers to figure out an optimal mix.

Zachary Howitt is a proud American, Naval Officer, and Tech Entrepreneur. He is a designated operations analysis subspecialist and has served in two warships forward-deployed to Yokosuka, Japan. His opinions and views expressed in this post are his alone and are presented in his personal capacity. They do not necessarily represent the views of U.S. Department of Defense, the U.S. Navy, or any command.

SC Episode 3: RealClear Podcast (Revised)

defense_logo_home(Edited: Volume Corrected) Dustin Walker, founder and head editor of RealClearDefense, joins us for our third podcast. We talk about Tom Clancy and his legacy, the Government Shutdown our upcoming sacred cows week, African security issues, Iran’s nuclear weapons program, and a bit about technology and innovation. SC Episode 3: RealClear Podcast

Low Tech – High Tech: The Dichotomy of Piracy Tactics and Threat Mitigation

Maritime security, specifically counter-piracy, has undergone an evolution. Spikes in piracy and changes in contemporary threat perception first introduced the ‘Generation One’ maritime security paradigm: the presence of armed guards and kinetic means to protect vessels, goods, and people at sea. Pushes by various groups and governments for increased regulation in this sector, however, quickly ushered ‘Generation Two’ onto the scene, marked by decreases in armed personnel along with rapid acquisition and deployment of high-tech equipment.

Increased reliance on technology increases vulnerabilities. The more components that exist in a system, the more chances the system has to break down or fail. Evaluating radio and satellite communications, vital for ship-to-shore and ship-to-ship communication creates a weak-link even in the most basic technology. Mostly unencrypted, these virtually open frequencies are susceptible to interception by hostile parties. Pirates, for example, can and do listen-in on radio communications, using gathered intelligence to plot ship courses and plan their attacks. They can wreak further havoc by interfering with communications, jamming signals, or even feeding misinformation. Thus, commercial maritime security has morphed from physical protection of assets to incorporate elements of signals intelligence, electronic, and cyber warfare.

More disturbing perhaps are reports of pirates, leveraging not only conventional communications, but Automatic Identification System (AIS) data to plan attacks. AIS, used for monitoring vessel movements, has now become an intelligence tool for pirates to locate and select targets. Unlike radar monitoring which requires sophisticated hardware and skill, AIS data is readily available online by a variety of commercial Geographic Information System (GIS) providers. Pirate planners, with standard computer and internet connection, or even just a smartphone, can view and monitor AIS connected vessels worldwide. They can then selectively evaluate potential targets, track their movements, and use gathered information to coordinate attacks. This exemplifies the double-edged sword that technology is: on one hand aiding safety and security, allowing precise positioning and geomapping of vessels to aid operators in their daily business and guide search-and-rescue teams should anything go wrong at sea. On the other hand, improvements in technology also open vulnerabilities that multiply risk, proliferating cheap hardware and valuable information to potential perpetrators.

AIS Data
AIS data indicating real-time vessel locations

 

Interestingly, pirates, just like terrorists, drug-runners, and other criminals, are simultaneously employing low-tech, low-fi solutions to overcome or circumvent high-tech defenses. They are enhancing the performance of engines and hulls; are insulating outboard motors in (mostly unsuccessful) attempts to hide from thermal-imaging cameras; and, are even observed wearing ear-muffs to mitigate effects of Long Range Acoustic Devices (better known as LRADs or Sound-cannons). Such synthesis of simple, yet outside-the-box creative tactics and low-tech equipment, which together are capable of overcoming expensive and sophisticated systems is today’s ‘Generation Three’ piracy/counter-piracy paradigm. It’s exemplified by the continuation of asymmetric threats in the maritime domain, the widening of the technological divide between attacker and defender, and the carry-over of the debate about technology’s ability to reduce risk at sea.

Although shiny kits and gizmos undoubtedly ease processes and enhance operators’ technical situation, experts must evaluate if employment of such sophisticated hardware, whether on a ship, offshore installation, or even in ports will genuinely reduce risk while operationally remaining within legal constraints. They must consider how technology can enhance security, how it can fail, how it can be defeated, and moreover how it can be exploited by potential assailants.

Maritime security planners must not only seek to develop innovative products and procedures to enhance safety in this ‘Generation Three’ paradigm, but must also apply ingenuity in fusing high and low-tech solutions to counter asymmetric maritime threats. They must consider borrowing successful land based tactics from counter-terrorism, counter-insurgency, and other low intensity conflict operations and find applications for their use in the maritime environment. On land, this blend of hardening assets in conventional ways, maintaining an innovative yet ‘low-tech-low-fi’ profile, and preempting perpetrators actions through better understanding the rules and tactics of their own game has proven triumphant. Replicating this strategy at sea will be a crucial key to piracy threat reduction.

Simon O. Williams is a maritime security analyst specializing in offshore installation and port security, Arctic maritime challenges, naval capabilities, and multinational cooperation. He previously worked in the American and European private sector and US government, but now contributes independent analysis to industry, media, and policymakers while pursuing an LL.M. in Law of the Sea from University of Tromsø, Norway.