Smart Agriculture, International Power and National Interest

Smart farming, the combination of agriculture, artificial intelligence (AI) and the internet of things (IoT), will help tackle the various challenges of food security, and usher the happenstance of a new world. It will also change what international food security means.

We present here some of the features of the new “international smart food security”. What follows is an open access extract from our premium article “Artificial Intelligence, the Internet of Things and the Future of Agriculture: Smart Agriculture Security?” part (1) and part (2).

Smart agriculture, new dangers

The U.S. Department of Homeland Security has foreseen the various dangers smart agriculture faces. Thus, it supported the publication of the report Threats to Precision Agriculture (2018 Public-Private Analytic Exchange Program, Oct 2018). Interestingly, the Office of the Director of National Intelligence (ODNI) – i.e. the top official body for the U.S. Intelligence Community(1) – also supported the report. This double involvement corresponds to two developments for the future.

Smart Agriculture, through its “smartness”, will face a whole new range of threats. The first type belongs to domestic security – hence the involvement of DHS. It is concerned with attacks that may be qualified of criminal, as well as with technological problems and unintentional fragilities. The second type of threats belongs to the world of international politics. Actually, we must also consider a third type of threats, as possibly resulting from climate change.

Practically, the three types of threats may converge. For example, international actors may use – or disguise as – domestic criminals for their design. Criminals and international adversaries – or enemies – may take advantage of the impact of climate change on smart agriculture. They may also seek to intensify such possible adverse effects.

On the front-line

Defence for smart agriculture

Feeding one’s people is a crucial part of the security that political authorities have to deliver. We explained in detail the corresponding security-related political processes and provided a political science bibliography in The Chronicles of Everstatenotably “Rising Discontent” and “Seeking Security“. The quality of the food delivered also impacts the “ruled”. Thus, both food and food production, henceforth agriculture, are crucial components of power in an international setting, and a stake for national interest.

Hence, food and agriculture may also, in case of war, become deliberately targeted by enemies. As a result, defence, as the U.S. very well understood when the ODNI supported the report Threats to Precision Agriculture, needs to fully incorporate smart agriculture. The smartness of the agriculture creates new vulnerabilities. It also has the potential to enhance power, as we shall see below. Thus, the very smartness of the agriculture increases the need to include smart farming within a proper defence policy and strategy. Conversely, attacks in case of war may also consider targeting smart agriculture.

Elements of international smart agriculture security

First and obviously, it will be crucial to ensure smart agriculture security while also thinking that foreign malevolent actors can carry out the attacks. Moreover, it will be necessary to make sure that components of smart agriculture bought abroad do not introduce vulnerabilities.

For example, considering the importance of communication for IoT, thus smart agriculture, the battle surrounding Huawei and the 5G becomes even more relevant. Indeed, agriculture and food security are so important that it is impossible to authorise threats to it, including because of sub-optimal technical standards (UK Cabinet Office and National security and intelligence, “Huawei cyber security evaluation centre oversight board: annual report 2019“; among others, Ellen Nakashima, “British spy agency delivers scathing assessment of security risks posed by Huawei to U.K. telecom networks“,The Washington Post).

Meanwhile, as also highlighted in the DHS report, we need to pay attention to possible “competitive” foreign actions. Indeed, these could impact relative power placement. We can imagine competitors obtaining farming data or crops data to take various types of market advantage. Worse, we may also imagine competitors taking aggressive actions to threaten the integrity of crops, again for international market advantage.

The smartness of agriculture as power

Furthermore, the very smartness of the agriculture will also become an element of competition and power. “Smartness” will be declined along all the drivers of artificial intelligence (AI), namely: algorithms, big data, computing power, quantum information science, sensors and actuators, and finally usages (seeArtificial Intelligence – Forces, Drivers and Stakes). For example, we can apply here what we explained for high power computing in more general terms, while giving examples for defence (see Artificial Intelligence, Computing Power and Geopolitics – 2).

Finally, those actors who will be best able to master with excellency each and every driver of AI within the smart agriculture domain will be at the top of the international relative power distribution for food security. Meanwhile, they will see their overall international power ranking enhanced in other domains, through AI capillarity.

Then, food is a crucial component of power. Thus, position in terms of international smart food security will impact the international ranking and influence of actors. It will affect their potential strength or, on the contrary, weakness.

As a result smart agriculture is many times vital to national interest. Mastery of and excellency in smart agriculture may well be crucial keys of the future international order.

In the premium article :

  • Read more about domestic threats and climate change induced dangers to smart agriculture.
  • Find out more about what is smart agriculture, how various companies include AI and which type of AI within it.
  • Discover what the case of smart agriculture suggests regarding those key actors for the future development of AI.

Notes

(1)“The Director of National Intelligence serves as the head of the U.S. Intelligence Community”. S/he oversees and directs “the implementation of the National Intelligence Program”. S/he acts “as the principal advisor to the President, the National Security Council, and the Homeland Security Council for intelligence matters related to national security”. (ODNI website – “Who we are“)

Featured image:  Marine Corps – 160218-M-BF136-001.jpg by: Jennifer Gonzalez [public Domain]

★ Sensor and Actuator for AI (3) – Artificial Intelligence, the Internet of Things and the Future of Agriculture: Smart Agriculture Security? (2)

One of the current focuses regarding Artificial Intelligence is on ethics. For example, on 8 April 2019 the European Commission published its Communication Building Trust in Human-Centric Artificial Intelligence. Google, despite set backs, also tries to implement an AI ethics board (Kelsey Piper, “Exclusive: Google cancels AI ethics board in response to outcry“, Vox, 4 April 2019).

However, ethics cannot be detached from the reality and practicality of AI. Both must feed into each other. Therefore, we need to look at the way AI is or will be very concretely used, beyond an ill-defined “black box AI”. We need to understand its drivers. We need to understand the stakes (Artificial Intelligence – Forces, Drivers and Stakes). And we need to assess the impacts AI will have on governance, management, security and international relations.

In this article, we focus upon the way various actors include AI in farming and thus envision and develop the future of agriculture, indeed what is called “smart agriculture”. We then assess major impacts and consequences. We look at the best way to develop and integrate AI into real life activities. Meanwhile, we assess the impact of smart agriculture not only on agriculture security, but also on governance and geopolitics.

Continue reading “★ Sensor and Actuator for AI (3) – Artificial Intelligence, the Internet of Things and the Future of Agriculture: Smart Agriculture Security? (2)”

Creating Evertime

Time in strategic foresight and warning is a crucial problem, as underlined in “Time in Strategic Foresight and Risk Management” and pointed out in “Everstate’s characteristics“.

We shall still need much effort and research before to obtain detailed, proper and actionable timelines – and this without even considering timeliness.

For the Chronicles of Everstate, we looked for an interesting way to present time, considering our very imperfect knowledge and understanding of “historical time”.

One of the possible solutions was to locate the Chronicles in a very distant time. This was the first option we explored, to start our scenarios in an imaginary year 5230. However, considering the unconscious or conscious mental associations that readers could make for such a year, as well as the very real possible historical developments on planet Earth, this was unsatisfactory.

A second solution explored, was to use a less precise timeline such as the Near Future and the Far Future. This was also disappointing as we would then lose the benefit of a chronology, however imperfect, and of sequences when they crucial in terms of policies and responses.

The best solution* was to remain true to our methodology. As we had created an imaginary modern nation-state, we created the corresponding imaginary time, Evertime: a time that mirrors our own as if in a parallel dimension, yet with an imprecision of dates.

Using years mirroring more or less ours could also help us identifying with hindsight what can be improved and why. Thus methodology and analysis can benefit.

The Chronicles of Everstate thus started in 2211 EVT (EVT being the acronym for Evertime).

————

*This solution was found during a brainstorming with our art director, Jean-Dominique Lavoix-Carli, to whom I am truly indebted for helping this idea to emerge. This underlines, once more, the value of brainstorming involving people coming from very different and diverse backgrounds.

Everstate’s characteristics

The initial variables chosen to start building our scenario are the five most important variables of our model, according to Eigenvector centrality, as explained in the article “Revisiting influence analysis”.

We shall now choose values for each criterion.

Consistency is then checked, but only for the variables that are linked.

As we aim at finding a plausible and average, mild set of initial criteria, we shall start from the following set, which is also intuitively representative of the situation, real or perceived, in which many real world countries have found themselves for a couple of years.

Note that a complete set of scenarios depicting the whole range of possibles for the futures of the modern nation-state would need to cover all possible combinations of variables. We shall not address the way to handle this specific challenge of scenario-building here (we cover that in our on-site training courses).

We then verify that the chosen scenarios are consistent with the consistency matrix.

One of our aims is to obtain timelines that are as precise as possible for all our underlying processes and dynamics, as explained in Creating the model. However, most of the time, such a detailed scientific knowledge is still lacking (see also “Time in Strategic Foresight and Risk Management“. As a result, the timelines set are tentative. To underline this absence of certitude, we created a time that is specific to Everstate, Evertime. As explained in “Creating Evertime“, Evertime (in short EVT) mirrors our own time, but yet is also an ideal-type. It emphasises dynamics and sequences of events rather than specific dates for the onset of events and very precise durations.

However unsatisfactory this device when we want to depict our very real near future, this approach allows isolating the time component and focusing on sequences. As a result warning and steering of policies is eased. Each reader or user is free to adapt the temporal outline according to its convictions or methodology, waiting for better scientific knowledge.

We now have all the necessary material, as well as all the methodological background explanations to begin telling the story of Everstate, starting with setting the stage.

Everstate: Setting the stage (I)

Everstate is an ideal-type for our very real countries created to foresee the future of the modern nation-state. In the case of this specific scenario-building, we are setting the stage for Everstate, by attributing values to key influencing variable to be able to develop the scenarios. The explanations regarding the methodology used to develop the narrative is explained in “Constructing a foresight scenario’s narrative with Ego Networks.”

Geopolitical situation: Everstate, a middle-range power

As a medium state power located on the Eurasian land mass, Everstate had not seen its geopolitical position fundamentally altered since the end of the Cold War, and even since the end of World War II. However, recently, some tensions had begun building up and Everstate had to start contending with them as they could easily transform in very concrete new external military threats.

What had contributed to maintain its geopolitical position were different factors. The impact its ecological setting could have had on its geopolitical position was remote and long forgotten. Yet, it could still play a part. Similarly, the various actors of Everstate did not perceive anymore its continental climate, soften for the southeastern part of the country by the influence coming from the sea, as a factor influencing geopolitics. The harshness of the snowy and mountainous North had long been perceived as a bounty for tourism. The large river crossing the country from Northwest to Southeast was seen from the perspective of industry, trade and tourism and no longer as a possible way in for invaders. Finally, it had been centuries since the rich agricultural eastern plain had not attracted invaders or greedy neighbours looking for rich lands.

Everstate’s army was efficient, considering current military techniques, expertise and previous experience, even if its size had been reduced. The previous period of peace, as well as the evolution of society and the size of the population had led to this downsizing. The defence forces could thus carry out with success very specific and targeted missions, but not deploy extensively and exhaustively.

In Everstate, central order was relatively strong. The governance was quite efficient although some areas were starting to be less effectual. As a result, evidence of discontent, so far apparently limited to complaining and grumbling, had started being recorded, letting believe that the security of citizens was not anymore fully ensured. We were, however, apparently quite far from major domestic escalation of violence, and even further from civil war, which both could impact the geopolitical situation. Furthermore, as none of the latter events had occurred for the last century or so, they were deemed to be impossible: people were thought, rightly or not, to have become unable of such actions, because of the comfortable life they had enjoyed for so long.

At the beginning of this second decade of the 21st century EVTEverstate was well in line with the most common winning international norms. This gave the country international legitimacy and implied that it did not have to face any major normative war against the dominant order. Its society was modern; it believed in material well-being, constant improvement thereof and in the virtues of constant and rising economic growth; it obeyed the law of the market and of capitalism, economics being quite foremost.

Meanwhile, the old monotheist religions still existed but their institutional and political role was marginal, as most of society was mainly concerned with other matters, more materialistic than spiritual. Nevertheless, as in other countries, some tensions existed between small groups of one or the other monotheist religion and sometimes flared up.

Everstate’s governance starts displaying a creeping loss of performance

Governance was thence still quite efficient, with, nevertheless, a slow, creeping loss of performance.

The state was organised according to a formal and rational-legal bureaucracy, upheld by a legal apparatus. It was subdivided administratively according to both geography and major domains of interest (defence, foreign affairs, homeland security, agriculture, trade and industry, tourism, finance, etc.) related to the security of Everstate, as identified throughout the previous ruling periods.

Everstate was governed under a democratic parliamentary regime. As a result, Parliament was involved in political decision-making, would it be only through the restraining power it exerted over the Executive. The political game that was played within Everstate’s ruling elite was classical. It involved obviously the search for power of the nation’s elected representative. Yet, another power struggle, unseen and forgotten was also at play: the nation, this imagined body of citizens (Anderson, 1991), also tried protect its power.

As part of the international society and obeying its norms, Everstate was a full member of the various international institutions that upheld those norms, from the United Nations, to the organisations of the Washington Consensus (IMF, World Bank) and to the World Trade Organization (WTO) (Watson, 1992).

Everstate, as many other states in the world, was also a member of a regional institution, a Regional Union of independent and sovereign democratic states, it had joined freely in the decades following World War II. The Regional Union is neither a Federation, as the United States, Canada, India or Germany, for example, nor a Confederation, but something different, in the making. Its mission, shape, organisation, membership, areas of exclusive or only shared competence and consultative responsibility are being continually reworked and redesigned through various treaties and pacts. It adds one more layer of complexity to the overall governance of Everstate.

In Everstate, the power of the ruler (the nation and its representatives) was neither weak nor strong. However, as, by comparison, the power of various elite groups was relatively strong, then, some appropriation of public power was taking place. Because the separation between the public and private domains had been achieved for some time, this appropriation of public power was either hidden as rampant corruption and nepotism, or taking new forms that were still difficult to unmask and name. The appropriation of public power by these elite groups had direct consequences on governance. Indeed, it lowered its efficiency and perverted its objectives.

The nation-state’s income had been slowly but steadily growing over the past decades. However, it had to be seen in the light of the necessary expenses that seemed to grow uncontrollably faster.

Indeed, as society had lived at peace and developed over the last 60 years, it had grown more complex. Conditions had changed, from the way to live and relate to each other with urbanization and digital and communication technology, to food availability and quality, to health behaviour. Meanwhile new threats had emerged. This led to a more complex situation in terms of governance. While governing implied more tasks and more complex ones, it became more costly. Hence, a few decades ago, the various resources extracted for governance and for ensuring the security of the citizens had started to be insufficient. This phenomenon was accentuated by the appropriation of public good and power by elite groups.

The legitimate monopoly of violence of the state was still there. Nonetheless, it was nevertheless weakening, as the reduction of overall available resources had started taking their toll. Even if such events were thought to be improbable by most, any evolution involving rising grievances up until an escalation towards civil war would be affected by this weakening monopoly of violence. In turn, if such an unlikely and unfortunate spiral started, it would further impact the army’s performance, the monopoly of violence and governance.

The legitimacy of Evertstate’s political system, inherited from past dynamics, was still strong and its impact was thus positive. As a result, despite a security to the ruled – or the citizens – that was starting to be less than perfect, no risk of strong rising discontent and polarisation was thought to be possible.

To be continued


Notes and References

The first version of this article was published on 2 January 2012.

* We do not here detail the nodes (variables) containing s4. Indeed s4 concerns the future and will be developed later on.

Anderson, Benedict, Imagined communities: reflections on the origin and spread of nationalism, (New York: Verso 1991).

Ertman, Thomas, Birth of the Leviathan: Building States and Regimes in Medieval and Early Modern Europe, (Cambridge, Cambridge University Press, 1997).

Taylor, Robert The State in Burma, (London: Christopher Hurst, 1987) – notably for the separation between public and private domain, see p.66.

WatsonAdamThe Evolution of International Society: a Comparative Analysis, (London: Routledge, 1992).

Zellman, Ariel, “Birth of the Leviathan by Thomas Ertman” Blog post.

How to Read a Large Amount of Information and Fight against Fake News

The incredible and growing amount of information available nowadays presents us with specific challenges we need to overcome.

Meanwhile, the rediscovery of propaganda and the power of rumours spread on social networks, now labelled “fake news”, only make more acute the need to find our way through the mass of information available.

This is even more important if, as students, professionals or citizens, our aim is to be able to understand, foresee, warn about, and finally adequately answer accumulating dangers, threats, risks or more broadly changes and uncertainties.

Our information age is characterised by what Martin Hilbert called the “global information explosion” (“Digital Technology & Social Change” University of California Course, 2015), when we constantly face “information overload” (among many others, Bertram Gross, The Managing of Organizations, 1964; Alvin Toffler, Future Shock, 1970; also Stanley Milgram, “The experience of living in cities“, Science, 167, 1461-1468, 1970).

Google estimated in 2010 that 129,864,880 books had then been published (Leonid Taycher, “Books of the world, stand up and be counted! All 129,864,880 of you.” 5 Aug 2010). Wikipedia estimates that “approximately 2,200,000” books were published each year across the world. Meanwhile, it is almost frightening to look live at the constantly growing number of internet website: 1,080,387,230+ on 15 Sept 2016; 1,675,967,895 on 28 March 2019; i.e. an augmentation of more than 595 million website, or 55% in a bit more than two years and six months (internet live stats). 

Those are general figures, but they are also representative of what we must face when we work on a specific topic, because we have to deal with all the relevant knowledge and understanding accumulated. 

To this we must, most of the time, add current unfolding events and facts. For example, if one wants to start working on an issue related to Libya, a simple google search on the word Libya returns 224,000,000 results in September 2016 and 299,000,000 in March 2019. A larger theme, such as energy, returned 1,340,000,000 results in September 2016 and  2,900,000,000  in March 2019.

Let us take another example with already filtered information, such as the bibliography of a PhD thesis. Even though information has been sorted out, we could get a 14 pages list of scholarly books and articles (approximately 336 texts) or more, and 49 pages of references to archival material. In that case, archival references may correspond to 4 to 5 large storage boxes of documents and 12 CD-Rom of digitalized text documents (example taken from my PhD).

Another example of pre-sorted information is a “simple” reading list for one topic for a Master or PhD course. Such reading lists used to cover at least ten pages (e.g. Princeton, International Relations 2007, approx. 200 books and articles).

In all cases, this is a lot to read, most often in an always too short amount of time. And we are only focusing here on written media, when time must now also be made for other media such as videos, audio media, and social network exchanges.

reading, information overload, read, strategic foresight, risk management, geopolitical risk, geopolitics, warning

How can we thus face this challenge?

In the meantime, how can we make sure we do not fall prey to “fake news”? To the “fake news” problem, I would also add how can we avoid losing time reading low quality pieces? The use of other media, besides written texts, complicates the problem and present also technical challenges. They are outside the scope of this article.

At the heart of these two issues we have a major question. How can we read efficiently and usefully for our purpose, and more generally for analysis and understanding of political, geopolitical, and international relations’ issues*?

The remaining part of the article will provide practical advice to learn to read efficiently and usefully, while avoiding as much as possible, to fall prey to “fake news”.

We shall first stress that the aim is understanding and that accumulation of knowledge is only a means to this end. Second, we shall focus on purposeful reading of classically written academic and scientific texts (including articles, books, reports, monographs etc.), and see why and how their structure are both crucial and helpful, stressing very practical ways to read. We shall then turn to other types of written texts, namely newspaper articles and primary materials (speeches, official documents, etc.) and finally stress a hard way to sort through useful or not documents.**

The aim is quality understanding not accumulation of quantity of knowledge

In our field – and in many related others – the first and absolutely crucial idea to keep in mind is that, initially, what we seek to achieve is NOT to accumulate a large quantity of knowledge, but to develop a proper understanding of a topic, question or issue, however loosely defined it may be before you start reading anything.

Knowledge is, of course, fundamental, but it is a means to an end. Knowledge will thus be a building block for the construction of your understanding.

reading, information overload, read, strategic foresight, risk management, geopolitical risk, geopolitics, warning

Keeping this idea in mind will help you overcoming – at least partly – anxiety about what you do not know. What must matter to you is to know enough to develop a good understanding of the topic you are studying, as well as, in the case of anticipation, to allow you thinking out of the box.

We are not trying to hoard knowledge, nor do we aim at showing off how knowledgable we are. We read to understand at best something (and hopefully, also, meanwhile, we enjoy it).

Even if you were working in tactical intelligence to prevent terrorist attacks, for example, where at one stage you would need to know, ideally, everything to make sure not to miss an attack that is being prepared, before to reach this step – which fundamentally belongs to the monitoring and surveillance phases (see Helene Lavoix, “Horizon Scanning and Monitoring For Anticipation: Definition and Practice“, RTAS, 4 March 2019) – you would first need to develop an understanding of the terrorists’ strategies, their beliefs, their motivations, previous modes of operations, etc.

It is this initial fundamental phase related to understanding that is our primary concern here.

Moreover, even during the monitoring and surveillance phase, you would also need to focus your reading on these useful pieces of information relevant to your task, i.e. preventing a terrorist attack.

Thus, even in that case, quality understanding of information primes over blind quantity accumulation. Meanwhile, reading still matters.

Reading classically scholarly written documents

This may come as a surprise to you, but, to read usefully and efficiently, we only relatively rarely read documents, be it books, reports, articles, memos or even short briefs, from A to Z.

Most of the time, the pleasure of reading all the words of a written document is only reserved for leisure and novels, poetry, etc. In a work environment, reading every word is impossible – and potentially not very useful either. This may not be very nice for the author, who has spent months and sometimes years researching and writing, but this is the way it is, and the only way forward considering the breadth of accumulated knowledge. And, do not worry, most authors also do the same; they skim through texts for their own purpose.

reading, information overload, read, strategic foresight, risk management, geopolitical risk, geopolitics, warning

However, purposeful reading is only possible because we can rely on a normative typical structure for scholarly written work, which reflects millennia of scholarly work and grounds the quality of written documents. It is this classical structure or more exactly what we assume is implied by that classical structure and contained within it that allows speeding reading. What I mean here by “speeding reading” is that we take in the gist of a book or article, or we focus on very specific points contained in the text, which may be of particular interest to the specific issue or problem we try to understand.

Should this structure not be respected, or not entail what we assume is behind it, purposeful reading and speeding reading would become much more difficult, or slower, if not impossible.

As a result, we shall read texts with different origins and structures in a different way, as we shall see very practically below.

What is this typical classical scholarly structure?

Classically, all academic and scientific literature, be it books or articles should be more or less constructed following the same outline (among many others, University of Canterbury, “Academic Essays: form and function“; Publication Manual of the American Psychological Association, Sixth Edition):

  • an abstract, i.e. what this article or book is about, which is often a very brief summary of the introduction and conclusion;
  • an introduction, itself composed of
    • a hook, i.e. what makes the document relevant and thus interesting for the reader;
    • a definition of the terms of the question or issue, which is addressed in the rest of the document. In the case of scientific books, this is where you will find, typically a literature review of the state of knowledge on the research problem, furthermore often highlighting existing debates. It leads to:
    • the specific question or issue or research problem that will be addressed (what is called in French the “problématique“) with its scope. In the case of books you will also find here the methodology and the type of material (interviews, archives, news articles, speeches, etc. ) that will be used;
    • a presentation of the outline of the document;
  • the body of the document presented according to the outline;
  • the conclusion, which fundamentally answers the introduction. It usually includes:
    • a reminder of the research problem, issue or question;
    • a brief summary of the findings as developed in the body of the document;
    • an opening on further research, new ideas that follow from the findings, etc.
  • a bibliography, which is a list of all the documents used in the text.

Furthermore, all the text is accompanied by footnotes, which are nothing else than references to the various types of evidence used and ideas developed previously by scientists and authors (e.g. standardisation according to APA Style).

It is vital to understand that footnotes or similar references are a crucial building block of our world. They underlay the whole system of copyrights for example, scientific progress, as well as the difference between facts and objective analysis (presence of footnotes or similar types of references) on the one hand, hearsay, propaganda and opinion (absence of footnotes or similar type of references), on the other. This is thanks to footnotes and references that you will get a key weapon to fight against fake news.

Using classical text structure to read purposefully

Now you know this structure, you most probably already envision how it can help purposefully with speeding your reading and your understanding.

Follow the next steps… unashamedly:

  1. Read the abstract. If this is interesting and relevant for your purpose, continue, if not discard, and move to the next document.
  2. Read the introduction. Abandon if you find out it is not relevant to your current purpose.
  3. Read the conclusion.
  4. According to your own purpose, read chapters, pages or even paragraphs that are relevant but only those. These can – and must – be read in detail. It may here be useful – or helpful – to take notes, and jot down the thoughts that reading generate in you, if this can enhance your understanding. This is even truer for the texts that are the most difficult to understand, because we are not used anymore to such complexity of thinking. I am thinking here about, for example, some past philosophers, whose works remain crucial.
  5. For very specific research – for example references to a specific fighting group in Syria, or Libya or elsewhere, or to a faction, or to an event, etc. – use the index of the book if available.
  6. Thanks to electronic format, do not hesitate to use the search engine. You have a search function for PDF, word-processor documents and also in browsers. Enter your keyword, and the places in your text where your keyword is mentioned will be emphasised. You thus know which paragraphs you need to read. This may sometimes lead you to read a bit more to be able to understand what the author meant – always be careful never to misinterpret what is written –  but you will have spared the time to skim through the book or article, which you would have needed to do without a search function.

That’s it, you have extracted from the article, or book (or report, monograph etc.) all you need to know for your specific current work.

Don’t worry, you will remember actually much more than what you think, and, if ever, for another purpose you were to need this book or article again, your memory will send you a warning message suggesting you go back to this book.

This somehow unconscious memory is one of the reasons why reading is – so far – superior to entrusting this function to an artificial intelligence. If you are not the one reading, then this “unconscious memory” cannot function. You may think you spare time, but, on the long run, you lose time by depriving you of fundamental information.

Finally, be flexible with the principles explained above. Always use your good sense, remain practical, and also follow your instinct. Sometimes, it is crucial to read a bit more or more in-depth, as this is in this unexpected area that a solution to one nagging problem will be found.

As explained, earlier, it is important to emphasise again that it is because we are certain that, if needed, we can go to the body of the book or article, where the research and the arguments are explained that we can fully trustfully skip them. We know that if needed we can go there and find the details necessary, as well as the right evidence.

It is, also, of course, because we trust science and the related architecture of understanding that we can skip the research and arguments. Indeed, we assume that the research and the demonstrations are correct. As a result, if the standard of research and of scientific reasoning and thinking were to be lowered, then we would not be able to skip the argument, even if, formally nothing has changed.

If ever the scientific thinking and architecture of understanding were shaken, then confusion would ensue. As a result, the spread of fake news would be favoured, while reading would immediately be slowed, as everything would have to be checked.

Unfortunately, the ego of untrained individual, who think they know best and spread absurdity is a perfect way to start destroying scientific thinking outside scientific circles. Unfortunately, this is increasingly widespread nowadays. A whole article would deserve to be written on this very topic.

Let us, despite these worrying trends, consider we remain in the case where the scientific understanding and structure are standing. Once you have read your first text as explained above, you can now move to the next document.

Using at best the literature review available in an introduction

The state of the art or literature review in an introduction, when it is well done, is an incredible tool to read efficiently, usefully and quickly. Thus, use it as such.

Whatever the topic, issue or problem upon which you are working and that you are trying to understand, try first to find a (good) book addressing the same issue. Then, read with attention the literature review. The latter will give you all the authors, books and articles dealing with your topic and that must be read. Even more interesting, it will provide a first summary of these other documents’ content, and explain where they are wanting. This first summary will allow you to decide if you must add this or that text to what you need to read to understand. At worst, you will still be able to incorporate in your understanding the summary or specific points the literature review will have underlined.

As a trick, the best documents to find proper literature reviews are PhDs and classically written good scientific/academic books. Master theses may also be of great interest because many of them are actually a literature review.

Using bibliographies and footnotes

Any serious article, post, book, report, monograph, etc. uses footnotes and/or bibliographies, as underlined previously. In the case of web-publication, what you must look for are proper references, most of the time with hyperlinks.

Those will be gold mines for you as they will, in a way similar to the literature review, point you in the direction of the next works you must read.

Newspaper articles (facts and evidence)

Mainly use newspaper articles for facts and evidence, making sure they are properly sourced.

reading, information overload, read, strategic foresight, risk management, geopolitical risk, geopolitics, warning

Newspaper articles are also useful to help you identifying which primary material, such as a speech by an official or member of government (see below), you MUST read. In this latter case, you cannot be satisfied, most of the time, only by what the journalist chose to report. Indeed, most newspapers have a specific editorial line and are partisan. Hence, you must read the original text and if the newspaper refers to a news conference, then, if possible, find transcripts of these.

Most of the time, the title of the article is enough to let you know if you need to skim through the news article, read it in detail, or just move to another one.

In some instances – unfortunately increasingly rarer – when a newspaper article includes in-depth interview(s), then read the whole article. Currently many newspaper articles relay only opinions – which is different from analyses – and, save in cases when they are contextualised and characterised properly, opinions are of no interest to us. Of course, if our purpose is to work with beliefs and ways to understand the world, then opinions become very important, because they are our primary material (analyses also may in that case be handled in a similar way). Nonetheless, opinions are not analyses and must be handled as opinions, not as analyses.

Primary sources: speeches, reports, official documents, interviews, etc.

Reading material from primary sources

reading, information overload, read, strategic foresight, risk management, geopolitical risk, geopolitics, warning
Screenshot of the timetable for available Daily Press Briefings of the U.S. Department of State on the web.

When you deal with primary material – material which originates directly from an actor that is relevant to your topic, e.g. a President, a spokesman, a member of the armed forces, a ministry or service within an agency, a company, groups and movements, people (in a representative way according to your topic) etc. – then, most of the time, you must

  1. Skim through it, to make sure it is relevant to your focus: for example, if you are working on energy, then a statement by the President of the U.S. or of Russia on, say, education policies for children below six years old, is most probably irrelevant. When you skim through documents though, be careful not to miss second and third order related topics.
  2. For those materials that are relevant – or for the part of the document that is relevant – read each and every single work of it, as nuances and specific words used matter.

Evaluating the reliability of the source and of the information

In general, primary information must always be evaluated for its reliability. The best way is to use what was created by the intelligence services. An information is evaluated according to the source (who gave the information in the first place) and to the piece of information itself (e.g. Department of the U.S., Army, Headquarters, “Appendix B, Source and Information Reliability Matrix”,  Field Manual No. 2-22.3 (34-52), 2006 – download Appendix-B).

If we take the example of tweets, for example, which are sometimes our only source of information on some unfolding events – this was, for instance, very often the case for Libya – then you should contrast people who only state things, from those who make the effort to give evidence that will back their statements by any means, including photos, and videos. Once you have evaluated that a person on twitter is serious, then, even though s/he may sometimes post statements without evidences, you can attribute a higher quality to the information because of the reliability of the source you estimated.

However, especially with the spread of artificial intelligence means, remain extra careful.

Knowing how to evaluate the reliability of information is absolutely crucial to fight against fake news. Practicing systematically the evaluation of the reliability is, of course, even more important.

If this may appear as cumbersome initially, you will get used to do it and thus benefit from the learning curve.

Actually considering the lowering overall standard of publication, and the rising confusion (read among others the excellent article Max Read, “How Much of the Internet Is Fake? Turns Out, a Lot of It, Actually.” Intelligencer, 26 Dec 2018), it is a very good idea to apply your evaluation to all information, including to what should be good analysis, not only to primary sources anymore. This is very unfortunate and painful to write, but … better be safe than sorry.

Sorting through documents the hard way

The classical structure of a scientific and academic text and its significance, as well as the importance to evaluate the reliability of information, allows you to sort through the mass of documents you should read to understand an issue.

It also allows you to discard those that are of sub-optimal quality.

If a text does not contain references, i.e. no footnotes in the case of a paper document, eventually no proper sources in case the author is not acquainted with the footnote system, and/or no properly referenced hyperlinks in the case of a text published on the world-wide-web, then it becomes a collection of opinions, and hearsay. At worst, these types of texts are one of the places where you will find the crudest fake news.

Such a text has no value and you can just discard it, i.e. not read it.

Of course, this does not concern reasoning and demonstrations, which belong fully to the author and which are of value. However, it is very rare in matters of national and international security that a whole text will be about reasoning and demonstrations, which belong only to the author. Most of the time, references and facts are needed, which must thus be properly referenced, or the author will refer to others’ reasoning and demonstrations, which similarly must be referenced.

Even if it is unfortunately a growing trend on the web not to use references and sourcing – even from well-known think tanks, do not lose your time reading these articles. Because we do not know who said what, and where the author found this or that idea or fact, we just cannot consider the text as more than mere hearsay and opinion (to say nothing of plagiarism). Nothing can be checked, the assumed quality and reliability we mentioned earlier are not there, thus it is better using your precious time to read something else.

When only facts are concerned, similarly, if a text does not use sources, then it means that you cannot check the origin of the idea or fact. This means that the reliability of the information delivered is possibly dubious, and in any case that we shall never know. Thus again, do not lose your time with this text, even though it comes from a prestigious publisher (think tank, risk management company, famous person, high level official, etc.).

The only way to consider such texts would then be as primary material, but you must then apply to it the rules explained above about the quality of information.


If you apply all these ways to read, and if you use your good sense and your logic – including sometimes to go against the principles explained here, as there are always exceptions – then you will not only have greatly reduced the amount to read, but also improved the way you read. Meanwhile you will have contributed to fight against fake news and sub-optimal content.

Furthermore, by accepting it is impossible to read every word ever written on a topic, by abandoning any dream of omniscience, you will not only lower your anxiety, which will enhance all your cognitive processes, but also develop a kind of “confident humility”, which then will be an incredible asset in mitigating biases and thus in improving the quality of your analyses (see Geopolitical Risk and Crisis Anticipation online course 1, module 3).

You are now ready to read efficiently and usefully any document.

Reducing further the number of documents to read, which we have started to see here briefly, is also absolutely crucial, but belongs to analytical methodology (e.g. see Geopolitical Risk and Crisis Anticipation online course 1). As you now master useful reading, you are fully ready for this next step.


Notes

* We shall not address here technologically-based supports (besides simple searches), which are in themselves an entire topic and most of the time, anyway, demand some amount of reading to be properly implemented. Furthermore analysts want, like and need to keep a mastery of their subject matter, thus knowing how to read remains a crucial skill.

**The skills transmitted in this article were first taught to me by my lecturers at university and then resulted from more than twenty years of practice in research as well as analysis.


Featured image: PublicDomainPictures, Public Domain, Pixabay

★ Sensor and Actuator for AI (2) – Artificial Intelligence, the Internet of Things and the Future of Agriculture: Smart Agriculture Security? (1)

This article explores the way artificial intelligence (AI) is inserted within its environment through the Internet of Things in a particular domain, agriculture. As a result, “smart agriculture”, a whole new way to produce food, is born. We look at the way various actors include AI in farming and thus envision and develop the future of agriculture. We then evaluate consequences on the best way to develop and integrate AI into real life activities. Meanwhile, we assess the impact of smart agriculture not only on agriculture security, but also on governance and geopolitics.

This is the second article of the series exploring the interface between artificial intelligence and its environment, as well as related impacts on society, politics and geopolitics.

This twin interface is composed of sensor and actuator. A sensor is what senses the world around the AI, be it digital or real, to input it into the AI-agent. The actuator is the end of the AI process. It allows outputting the results found by the AI-agent in the world, again, be it digital or material, in a way that is understandable to human beings.

This twin interface is a disruptive driver for AI. Indeed, success in handling and developing sensor and actuator, or on the contrary, failure to do so, could favour the boost or burst of the current AI development phase for actors. Furthermore, the key importance of this interface implies it is a stake in the current race to AI-power, besides the other drivers of AI.

We started exploring in detail this twin interface in the first article of the series, “Inserting Artificial Intelligence in Reality“. Using those examples, we found that we could best understand and handle AI if we conceptualised the interface as a sequence between worlds: the world intelligible to humans and the world intelligible to AI-agents. Finally, we started looking at the way AI-agents could be integrated according to different realities: digital-digital and digital-material.

Content – Published in two parts (see here for the second part). The table of contents becomes interactive only for members.
  1. The IoT, an ideal ecosystem for AI-agents
    1. A brief history of the IoT, or the development of an ideal ecosystem for AI
    2. The IoT and its domains of applications
  2. AI and IoT in action – Smart Agriculture
    1. Facing the challenges of food security
    2. Smart agriculture as an answer to food security
    3. Corporate actors – The road beyond sensors and digital-digital output only
  3. Impacts and consequences
    1. Surprise, Surprise! Those key actors for the spread of AI …
    2. Knowledge is power
    3. Smart agriculture security?

This article, published in 2 parts, dives deeper into the twin interface that allows integrating AI in human reality. It notably looks for actuators.

In the first part, we look at the Internet of Things (IoT). Indeed, it is a first type of ecosystem within which AI-agents may find and use sensors and actuators, and thus be fully operational and thrive. Thus, we explain what is the IoT and why it is a favorable ecosystem for AI-agents.

Then, we focus as case study on “smart agriculture” aka the Internet of Food. We explain first what is smart agriculture. Meanwhile, we highlight how it is an answer to the challenges of current and future food security.

In the second part, we look at how companies whether giant ones, start-ups or projects, insert AI-agents in the real world. We notably feature “John Deere FarmForward 2.0 – Revolutionizing agriculture, one plant at a time”, which goes way beyond what the usual giant actors of the digital world, such as the U.S. GAFAM, promote.

John Deere’s video and others’ endeavours help us imagine how smart farming will look like. Their effort at creating not only sensors, but also actuators is crucial.

Finally, we turn to the impacts and consequences of smart farming. We find first that, considering the stage of development of AI, those actors that are currently crucial to see a further implementation of AI are not the giant digital companies, but those offering a real operationalisation of AI in the physical world. We then highlight how new beholders of data and thus related knowledge could impact the power of traditional actors. Third, we look at the new security needs of agriculture and how this potentially impacts international relations and geopolitics.

This is a premium article. To access this article, you must become one of our members. Log in if you are a member. A pdf version of the article is available for members with the second part of the text.

FULL ARTICLE 6353 WORDS – pdf 23 pages – plus bibliography


Featured image: Herney via Pixabay, Public Domain.


*Note that, as with previous estimates, this trend does not include the devastating impacts of climate change. Likewise, other disasters a large population could foster are not considered.. Among others, we already pointed out this possibility in 2008, see also, for example David Talbot, “U.N. Predicts New Global Population Boom“, MIT Technology Review, 2014.

Bibliography and References

Ackerman, Jennifer, “Food: How Altered?“, National Geographic, nd.

American Institute of Physics, “Autonomous weed control via smart robots“, Science Codex, 27 March 2019.

Ashton, K. (22 June 2009). “That ‘Internet of Things’ Thing”.

Beecham Research,”Machine to Machine (M2M) – IoT”.

EESC European Economic and Social Committee, Internet of Things — An action plan for Europe“, COM(2009) 278 final; OJ C 255, 22.09.2010, p. 116-120.

European Union’s Horizon 2020 research and innovation programme, Internet of Food & Farm 2020 (IoF2020),

Fourtané, Susan, “IoT and Smart Agriculture Are Building Our Future Cities Today“, Interesting Engineering, 7 October 2018.

Gagliordi, Natalie, “How self-driving tractors, AI, and precision agriculture will save us from the impending food crisis“, TechRepublic, 12 December 2018.

Graham, Luke, “UN raises world population forecast to 9.8 billion people by 2050 due to rapid growth in Africa“, CNBC, 22 June 2017

IEEE – Institute of Electrical and Electronics Engineers – Project Standard for an Architectural Framework for the Internet of Things (IoT), Shenzhen, China, January 2019

ITU-T Rec. Y.2060 (06/2012) Overview of the Internet of things.

Magrassi, P. and Berg, T (12 August 2002). “A World of Smart Objects”Gartner research report R-17-2243.

Mattern, Friedemann; Floerkemeier, Christian (2010). “From the Internet of Computer to the Internet of Things” (PDF). Informatik-Spektrum33 (2): 107–121.  doi:10.1007/s00287-010-0417-7

McLellan, Charles, “Smart farming: How IoT, robotics, and AI are tackling one of the biggest problems of the century“, TechRepublic, 12 December 2018.

Nafeez, Ahmed, “Dramatic decline in industrial agriculture could herald ‘peak food’“, The Guardian, 19 December 2013

Newell, Heather, Hendrik Viljoen, “Stability analysis of a thin film on a rotating cylinder with low airflow“, Physics of Fluids, 2019; 31 (3): 034106 DOI: 10.1063/1.5080443

Raiwani, Y.P., “Internet of Things: A New Paradigm“, International Journal of Scientific and Research Publications, Volume 3, Issue 4, April 2013.

Shubo Liu, Liqing Guo, Heather Webb, Xiao Yao, Xiao Chang “Internet of Things Monitoring System of Modern Eco-agriculture Based on Cloud Computing“, 2169-3536 (c) 2018 IEEE, DOI 10.1109/ACCESS.2019.2903720, IEEE Access.

Talbot, David, “U.N. Predicts New Global Population Boom“, MIT Technology Review, 2014.

Valantin, Jean-Michel Valantin, “Understanding (or not) the Nature of Climate Change as a Planetary Threat“, The Red (Team) Analysis Society, 10 December 2018

Walter, Achim, Robert Finger, Robert Huber, and Nina Buchmann, “Opinion: Smart farming is key to developing sustainable agriculture“, PNAS,  June 13, 2017 114 (24) 6148 6150; https://doi.org/10.1073/pnas.1707462114

Weiser, Mark (1991). The Computer for the 21st Century (PDF). Scientific American265 (3): 94–104.  doi:10.1038/scientificamerican0991-94.

Scenarios: Improving the Impact of Foresight thanks to Biases

Foreseeing the future, whatever the name given to the endeavour, includes two major tasks.

The first one is, of course, the analysis, the process according to which the foresight, forecast, warning, or, more broadly, anticipation is obtained.

The second one is less obvious, or rather so evident that it may be overlooked. It is, however, no less vital than analysis. We need to deliver the output of the analytical process to those who need the foresight, the decision-makers or policy-makers. Ideally, the recipients must understand that output, because they will act on it. They need to integrate the new knowledge received in the decisions they will take.*

A huge challenge runs across these tasks: biases.

We must overcome the various natural and constructed biases – systematic mental errors – that limit human understanding. This article will present first the classical way we deal with biases: we consider them – quite rightly – as “enemies” and we devote much effort to mitigate them. Then, considering the specificity of the delivery stage, this article suggests that another strategy is necessary. We need to turn our usual strategy on its head and befriend biases. In that case, scenarios become a tool of choice for an enhanced delivery of our foresight to decision-makers […]

The remaining part of this article is for our members and those who purchased special access plans. Make sure you get real analysis and not opinion, or, worse, fake news. Log in and access this article.

The Chronicles of Everstate: the Actors

The Everstatans: the citizens (including companies), the people, the Nation

Everstate’s central governing bodies or political authorities: the government, Parliament, the national representatives, the civil servants constituting the formal and rational modern bureaucracy.

Everstate’s regional and local governing bodies: elected representatives at town, department (or county) and region level.

Everstate’s political parties: Two major parties (loosely associated with social democrats on the one hand and conservative on the other). Other parties are insignificant in terms of national representation.

International Special fund for Sustainable Innovation and Green Energy (ISSIGE) [Scenario 2 – Panglossy]: A special fund into which the new Everstatan government decides that Everstate must participate. This fund will help polities harnessing the ecological evolution and the increasing complexity of resources, and transform those into opportunities. A specific instrument will be organised around the Regional Union and should “fund pan-Regional infrastructure projects.”

International meeting group for the resilience of the financial system (IRESFIS) [Scenario 2 – Panglossy]: Spearheaded by Everstate and its newly elected government, IRASFIS is linked to the G-20, and involves the major financial private institutions. It must bring back trust to markets and allow for a return to a proper flow of liquidity.

The International Society of States: all states actors in the world (using Hedley Bull, The Anarchical Society, idea and concept).

The Regional Union: “Everstate, as many other states in the world, was also a member of a regional institution, a Regional Union of independent and sovereign democratic states, it had joined freely in the decades following World War II. The Regional Union is neither a Federation, as the United States, Canada, India or Germany, for example, nor a Confederation, but something different, in the making. Its mission, shape, organisation, membership, areas of exclusive or only shared competence and consultative responsibility are being continually reworked and redesigned through various treaties and pacts.”

The International Governmental Organisations: UN and agencies, WTO, WB, IMF etc.

The lenders’ nexus: the largest banks and financial funds and more generally any organisation lending money and operating on the financial market. Includes the shadow banking system.

Novstate: “the powerful Everstatan Company… specialised in strategy and technology consulting. Year after year, Novstate is awarded the same contracts, which end up being seen as almost proprietary, and wins new ones… Even the direct security apparatus of Everstate is not anymore fully public, as a few private companies, Everstatan and international, play there an increasingly crucial role, from multi-involvement in the army, which is challenged by its reduced size, to various security functions such as logistics or the screening done at airports.”

Novstate’s CEO: Has created Novstate at the end of the 2180s. He has become an acclaimed business expert and governance counselor.

Novstate’s network of Friends Companies: “.. Novstate does not only advise governance bodies but also supplies governance services, often in areas where there are also advisors, as it unites in its network of “friends’ companies” – a new business concept derived from social networking – small security firms, quasi armies, high-tech start-ups, biotech laboratories, etc.”

Evernet: a very performing high-tech Everstatan company.

Everstate’s universities and scientists: “…Very good quality universities… Those last 60 years they have provided increasingly recognised scientific knowledge and understanding, notably in the areas of main normative concern, such as economics, business and technology. They … also play the role of think tank.

The Modern University of Everstate (MUEVT): The largest university of Everstate. It was created at the end of the nineteenth century and fundamentally reorganised after World War II.

The Everstatan School of Liberal Politics: An influential and rich department within MUEVT that at is at the forefront of research and publications in topics related to economics, monetary and fiscal policies, electoral politics, international regimes, peace studies, etc.

Occupy Everstate Movement: It is part of the global Occupy/Indignados Movement. It was formed in early 2211 EVT.

Anonymous: a global novel political force.

Lessons Learned Comment:
When taking examples for an ideal-type, there is interest in naming examples in a way that will be evocative for readers at the moment of delivery. However, with time, these very names may become a drawback as they may push clients to focus on a specific case rather than on the essence of what that example meant. Conclusion, it would be better to use truly imagined names, and to add in a note specific examples to help the client with fathoming what is meant.

Novcybio International: A foreign company that develops new biotechnologies. It headquarters are located abroad, outside the Regional Union.

Novcybio Everstate: A wealthy Everstatan entrepreneur bought farmland in the impoverished Southeast at a very low price. Offering to use it to test Novcybio’s products, he could create and develop Nocybio Everstate.

Saudi Arabia and the Chinese Belt and Road: the Great Convergence

In February 2019, during the Saudi Arabia-China economic forum, the two countries signed for more than 28 billion dollars deals (“Saudi-Chinese Investment Forum Signs 35 Deals During Crown Prince’s Beijing Visit”, Ashark Al Awsat, 22 February, 2019). These gigantic deals are part of the growing Saudi-China relationship. They are the economic and political continuation of the six weeks tour in Asia King Salman of Saudi Arabia made in March 2017. This tour ended with a state visit in China and a meeting with Chinese President Xi Jinping. The visit included the opportunity to start the negotiations about the integration of Saudi Arabia to the Chinese Belt and Road Initiative (BRI), actually a grand strategy (Michael Tanchum, “Saudi Arabia the next stop on China’s maritime silk road”, East Asia Forum, 22 March 2017).

This article explores how the specificities of the Chinese BRI and of the Saudi grand strategy create and deepen the existence of converging strategies for the two countries.

Continue reading “Saudi Arabia and the Chinese Belt and Road: the Great Convergence”
EN