Lecturer in Systems Engineering and Computer Science | Systems Engineering
Los Angeles, CA, UNITED STATES, Doolan 200
Frank R. Seaver College of Science and Engineering
Master of Science, System Science
Bachelor of Science, Aerospace Engineering
Ph.D, Policy Analysis
Paul, C., Clarke, C., Triezenberg, B., Manheim, D., Wilson, B.
The IE is often an afterthought and not given significant attention for the purposes of C2, situational awareness, and intelligence collection
1. Information and information-related capabilities play a critical role across the full spectrum of military operations.
2. When the IE is considered in military planning, it is in the context of campaigns to influence noncombatant populations rather than operations targeting adversaries and adversary leaders.
3. There are major shortfalls in how IE activities are visualized and communicated to commanders and the extent to which the IE is considered in operational planning and organization.
There are opportunities to improve C2 and situational awareness and place a greater emphasis on the IE
1. Existing doctrine and processes could easily accommodate a greater focus on the IE.
2. Current practice for C2 and situational awareness has resulted in significant seams when it comes to the IE — areas that either overlap with or fail to cover the roles and responsibilities of those tasked with these operations.
3. Situational awareness solutions for the IE are not one-size-fits-all. Different commands have different mission priorities and operating contexts.
4. Situational awareness is subject to human limitations and information overload. Possible solutions include automated processes and machine learning.
Weinbaum, C., Triezenberg, B., Meza, E., Luckey, D.
The literature provides examples of the types of benefits, measures, and cost savings that organizations may consider and plan for when designing a telework program.
1. For employees, telework benefits may include greater flexibility in their schedules and reduced commuting time, but telework risks isolating employees from the team environment that an office may provide.
2. For employers, benefits may include increased productivity from employees and higher job satisfaction, although telework may cause decreased team cohesion.
3. The most-significant monetary costs for employers may result from providing computing equipment or other infrastructure to employees working remotely, but there may also be some cost savings from decreasing the square footage of office space.
Successful agency telework programs are compliant with federal and organizational policies, provide certain technological accommodations for employees who telework, and demonstrate return on investment.
1. Some of these lessons are the adaptation of performance management tools, network accommodations, and personnel training.
If outer space becomes an active theater of war, the impact to daily life on earth would be substantial. Unintended consequences of attacks in space are hard to contain and are not always readily reversible — debris or radiation generating attacks render specific orbits unusable, not just for the duration of the war, but for the foreseeable future. With the loss of those orbits, our lives would be very different — accurate weather maps, overhead imagery, access to breaking international news, and navigation services that guide our cars, airplanes, and ships would all disappear. Even in the absence of catastrophic attacks, war in space would have a chilling effect on commercial uses. Deploying new capability in space is risky, and war would make it infinitely more so. Space entrepreneurship would grind to a halt, denying mankind capabilities we have yet to dream of.
In this dissertation, I use a game theoretic model of space war to examine how sentiments in multiple dimensions impact state decisions regarding whether to expand a ground war into the space domain. Key innovations of this model are a) the use of prospect theory in lieu of rational choice and b) the assumption of non-unitary actors with independent sentiments regarding different dimensions of national interests. I offer a new way to visualize and think about how sentiment impacts the ability to tailor a deterrence strategy to specific circumstances. These innovations enable a rich exploration of how space war might play out across a wide range of futures. Based on that exploration, I recommend specific steps spacefaring nations should take to robustly deter the expansion of wars into the space domain. My recommendations are applicable across a wide range of opponent capabilities and sentiments under both rational choice and prospect theory
Schnaubelt, C., Cohen, R., Dunigan, M., Gentile, G., Hastings, J., Klimas, J., Marquis, j., Gereben Schaefer, A., Triezenberg, B., Zigler, M.
The Transformation of the RCs During the Iraq and Afghanistan Wars Provides Several Valuable Lessons.
1. The RCs became an operational force before they were labeled as such.
2. Two types of policies emerged to support RC use as an operational force — protecting from overuse and increasing readiness.
3. The Iraq and Afghanistan wars reshaped the way the RCs were trained and equipped and also promoted an expeditionary mind set within the RCs.
4. The increased reliance on the RCs was largely due to demand rather than their improved readiness.
5. The RCs' readiness improved during the Iraq and Afghanistan wars.
6. The RCs' readiness benefited from forewarning, fewer logistical constraints, and relatively less complex missions.
7. Sustaining readiness post–Iraq and Afghanistan wars is only partially a policy question: it is also largely a resource issue.
Balkovich, E., Prosnitz, D., Isley, S., Boustead, A., Triezenberg, B.L.
Consumer devices that automatically and unobtrusively collect data about their users, including cell phones and other mobile devices, are spreading. While these devices gather much data that is potentially helpful to law enforcement, they also complicate the interpretation of surveillance law and raise questions about privacy. Moreover, facilitating law enforcement understanding of and access to metadata may help law enforcement adjust practices as increased use of encryption decreases the availability of content information, even with appropriate legal permission. This report documents a prototype tool called MIKE (the Mobile Information and Knowledge Ecosystem) created to help interested stakeholders — law enforcement, commercial enterprises, regulators, legislators, and the public (including advocacy groups) — better understand the mobile app ecosystem and the relationships among the data, its sources, and applicable legal constraints. This volume describes the prototype, explains how it was developed, provides a manual for those who are interested in using it, and discusses how the prototype might be updated and extended.view more
Graf, M., Hlavka, J.O., Triezenberg, B.L.
A growing number of individuals, companies and regulators are concerned about who has access to data stored on the cloud and where exactly that cloud is. Actions taken in response to those concerns take the form of lawsuits, restrictive contracts, and government regulation of cloud computing. This trend toward restricting information storage to specific geographic boundaries is called "data localization" and leads to growing uncertainty about the future of digital commerce and communication that is the economic engine of the information age. This paper offers an overview of recent regulatory trends in cloud computing around the world, assesses key regional differences and problems, and draws on expert interviews in charting the way forward for the industry. We show that while more restrictions and greater data localization are likely to characterize the internet of the future, new business opportunities will emerge for providers of cloud computing technology and services who succeed in developing products that satisfy differential regulation and consumer preferences.view more
Triezenberg, B., Bartels, E., Saum-Manning. L., Torrington, G., Marler, T., Langeland, K., Pita, J.
Access to and protection of the commons of outer space is essential to global stability and prosperity. We rely on space for communication, navigation and imagery, including monitoring of arms agreements. These peaceful uses may be curtailed or destroyed entirely if terrestrial conflict were to extend to attacks against space assets. In the past 20 years, the U.S. has demonstrated a highly asymmetric reliance on space to project military power into theaters of war across the globe. In 2007, China successfully destroyed a satellite using an anti-satellite missile and Russia has conducted numerous anti-satellite missile tests recently. The actions of both China and Russia have reminded us the space environment is exceptionally difficult to defend, with the advantage going to the attacker. In fact, the potential for war in outer space has all of the attributes of a classic security dilemma. Almost any action taken in space can be misconstrued defensive preparations, or even just normal use and exploration, can be easily mistaken as offensive preparations, destabilizing the status quo.
In considering the above characteristics of space conflict, analysts have concluded that war in outer space is “inevitable.” Their conclusions are largely based on analyses that use a game-theoretic model of conflict vs. cooperation and assume that states are unitary, rational decision-makers seeking to maximize their expected utility. We built a game theoretic model of space war to explore these conclusions. However, we changed two aspects of the traditional game-theoretic model. First, we substituted prospect theory in place of purely rational decision-making. Prospect theory argues that people tend to avoid risk when they are satisfied with the status quo, and tend to be risk acceptant or even risk seeking when they are dissatisfied with the status quo. Second, we applied prospect theory separately to multiple dimensions of state power, making our actors less “unitary.” Initial results suggest that prospect theory has a significant effect on results, and game play that drives players towards more symmetric sentiments (i.e., both satisfied with the status quo) reduces the intensity of conflict. Using prospect theory, our games result in deterrence of war over a wider range of asymmetries in the balance of power and in the offensive-defensive balance than a purely rational model would predict. This may present feasible options for establishment of a deterrence regime.