You've likely seen it before, but I'll go ahead and note that DARPA is actually quite interested in this sort of thing. This was a crowdsourcing experiment/competition late last year to locate 10 red weather balloons at undisclosed locations all over the country. Basically, the day of the experiment was publicly released, and no other information.
I intend to assist with a DARPA project soon. I consider DARPA to be generally well ahead of the government, and sometimes well ahead of the military as well. Some of their projects are kinda kooky, and are less impressive than others. But a lot that is valuable stems from DARPA projects, and related sub-contracted University R&D projects.
I'm curious about this PIIN thing. Can you share a version of the paper explaining it? Formalizingg and utilizing the networks we have in place is intriguing. Barring illegal activity (of which is its own tangled mess of your network connections can bring you down), what all can be achieved with it?
Can I track down the guy who hit-n-run me?
Can I get a good deal on a Miter Saw?
Those are just 'small' minded uses. What less obvious but useful things can I do with it. It's not so much a matter of me exercising my creativity (I have a headache), as I'm curious to what Jack7 would use it for (a guy like Jack7, not specifically Jackl7 and his personal use)? What do you think is possible to achieve with a PIIN?
No Janx, I cannot post extracts from the paper itself, as I intend to publish it in a book of essays, and maybe as a supplement to the
Book of Intelligence Designs. I will share part of the original intro I wrote on it. It is a sort of skeletal synopsis of intent and usage. By the way, maybe you can't track down the guy who hit and run you, but if you make the right contacts, someone can. A PIIN by the way is also a
"favors network." Make friends with your contacts, and be as willing to help them with their needs, as you would like them to be in servicing your needs.
You can use your own personal PIIN to do or achieve anything you wish. What you choose to do is up to you. I have used my PIIN to gather Intel, to assist with investigations, as a business networking system, to secure editors, to submit papers and projects (and bid upon them), as a brokering network (I used to be a business broker), to contact people, to track down people, for academic and technical research, to contact professors, to keep in touch with old friends, to secure agents, to establish a network of missionaries I help escape from dangerous situations (on occasion), to assist with scientific research and to assist with experiments, to make political contacts, to help fund non-profit projects, to train, and to help generate seed money, to obtain little known or obscure information, etc. What you decide to do with yours is up to you really, depending upon how you structure it, the quality of your contacts, and what you want it to achieve. I would call no use of the PIIN small minded per se, if it assists you in being successful in whatever endeavor you are pursuing. Some goals may be smaller or larger than others, but the PIIN can theoretically assist with any objective. Practice establishing, maintaining, and using your networks will make you a better and more successful networked. And a good network will secure things for you that you will find impossible to secure entirely upon your own.
I used to keep different PIINs for different functions. Now I just keep one PIIN, broken into categories, and with contact information, area of expertise, and special notes. This is how I structure my current PIIN, the categories it is broken into, etc. It's based on my same basic categories for the Renaissance Gild as lately I have been redoing and collating my file and papers to make every subject and document "compatible" and of a similar format to every other subject and document. That way I can make my files and documents
universal, easy to search, and cross reference for related materials and ideas. Slowly I'm converting all of my documents, ideas, papers, files, etc. into a more information friendly format, that is easier to access, track, search, and utilize. Below is the basic structure of my current PIIN, followed by the original paper intro. I hope that answered your questions. I've been on vacation, so I wrote fast and I'm going to bed now. See ya later. Good luck to ya.
THE PIIN
PRIVATE (or PERSONAL) INTELLIGENCE AND INVESTIGATIVE NETWORK
ACADEMIC/SCHOLARLY
Name Contact (Method, Address, Type) Special Note
ARTISTIC
Name Contact (Method, Address, Type) Special Note
AVOCATIONS
Name Contact (Method, Address, Type) Special Note
BANKING/ECONOMICS/FINANCE
Name Contact (Method, Address, Type) Special Note
BUSINESS/INDUSTRY/SMALL BUSINESS
Name Contact (Method, Address, Type) Special Note
GENERAL
Name Contact (Method, Address, Type) Special Note
GOVERNMENT/PUBLIC SERVICE
Name Contact (Method, Address, Type) Special Note
LAW ENFORCEMENT/INTELLIGENCE
Name Contact (Method, Address, Type) Special Note
LEGAL
Name Contact (Method, Address, Type) Special Note
MILITARY/INTELLIGENCE
Name Contact (Method, Address, Type) Special Note
PERSONAL BUSINESS AGENT (PBA) or PERSONAL BUSINESS FACILITATOR (PBF)
Name Contact (Method, Address, Type) Special Note
RELIGIOUS
Name Contact (Method, Address, Type) Special Note
SCIENTIFIC
Name Contact (Method, Address, Type) Special Note
Introduction:
In the modern world the individual man and woman will often find themselves in need of a wide range of intelligence, information, and expertise for various purposes necessary to the accomplishment of whatever objectives they desire to pursue, obtain, and fulfill. To this end the establishment and development of a PIIN, or Personal Intelligence and Investigative Network may often prove crucial or even vital to the successful achievement of whatever those desired objectives might be. Because of this fact it is my intention herein to briefly outline the constituent elements of and some of the potential uses of the Personal Intelligence and Investigative Network.
First of all, let me summarize the nature of the PIIN. The Personal Intelligence and Investigative Network, like all networks is almost entirely dependent upon a series of established contact points. This is both the strength of the PIIN and the inherent weakness thereof. Therefore it is imperative that high-quality and functionally useful, as well as accurate and practical contact points be created, assessed and reassessed, and maintained over time. This is true whether the contact point is physical, biological, communicative, informational, electronic, or computational. Every asset is a tool and the quality and functionality of those tools are the essential elements in the creation, maintenance, and performance of your PIIN. The Value of any Network is circumscribed by the acute and chronic qualities of those components which within themselves compose the actual circumference and separate elements of that real network. If the components of the network are of inferior grade, if the contacts are defectively impositional or of little practical use, or if the contact points are weak or insecure then the entire network is suspect and prone to failure at any and every point of transmission. The PIIN therefore should avoid both obvious and subtle deficits at all times by being practically and pragmatically useful, flexible, adaptable, in a state of constant positive growth and change, accessible, composed of superior components and contact points, secure, and most of all accurate and reliable.
Each and every network is therefore dependent upon the depth and breadth of the human contacts established interior to and exterior to that particular network and subject to the limitations of accuracy and the quality and quantity of valuable information that network can generate. The first real action needed to establish any PIIN and to make it fully functional is the recruitment, development, and maintenance of quality contacts. Contacts are always of the most absolute importance in the establishment of any PIIN. In addition the nature and quality of those contacts should be viewed as central and formative to the capabilities of every other contact point in the configuration and to the network as a whole. After an initial establishment of contacts those contacts should be immediately vetted and/or tested for accuracy and quality. This process of discrimination should be both an immediate tactical and testable undertaking and a long-term strategic process of recurring verification and reverification. Do not expect any particular source to be always accurate, but do not allow any particular source to function in an important role unless it has proven itself capable of both consistent reliability and trustworthiness.
After establishing a few reliable and trustworthy contact points the network must grow in order to gain new sources of information and intelligence as well as to develop and generate new capabilities. Therefore always view already established contacts and contact points as generators of new contacts, informants, intelligence and perhaps even secondary and tertiary networks, or sub-networks. Consider as well every potentially useful new contact or acquaintance as a possible future contact point in your greater network. Contact points should also be capable of redundancy and potential verification of information and intelligence gathered from other points along the nexus and for information gathered from sources outside the network. This is to say that contact points are more than simple sources of information; they will also function as multi-capable nodes along the operational structure of the entire network. I will expound upon the importance of and discuss the details regarding contact points later in this paper. For now it is important to remember that contacts and sources provide information and possibly intelligence, but contact points can potentially serve many varied functions, such as; information, intelligence, analysis, communications, coding, encryption, decoding/decryption, collation, research, as reliable and secure relay points, as information nodes, computational capabilities, disinformation and misinformation, and even serve as a sort of network disguise and misdirectional cover or front.
Constantly look for, search out and develop new contacts, contact points, information and intelligence sources, and informants in order to successfully grow your network. Your network’s ultimate effectiveness will depend upon both the quality and quantity of your contacts, contact points, and your contact’s network. In the initial stages of building and developing your network concentrate on the quality of your contacts and contact points, but in the larger and long term concentrate upon both the quality and quantity of those contacts and contact points which comprise the elements of your network. Always develop and maintain quality to the greatest degree possible within all elements of your network, but also always grow and encourage quantity in the most consistent manner possible throughout all aspects of your network. This will assure that your network has both great depth and breadth and that it is capable of the widest and most valuable range of flexible and functional capacities possible.
It does not matter what the major focus of your network is, what it is most well designed to do, what it in actuality best does, or what the functional intent(s) or objective(s) may be, this introductory advice applies equally well to any possible network you might desire to establish in any field of activity or enterprise. The PIIN is a potentially invaluable tool for both the amateur and professional alike, and no matter the function or objective, the real capabilities of any established PIIN will be determined by the inventiveness, innovation, flexibility, enterprise, imagination and quality of the component parts of the network. And those component parts are composed and arranged by the originator of the network, that individual who is responsible for first establishing the nature and parameters of the own individual PIIN. The originator therefore will establish the genesis of the network and how well it grows and develops in the initial stages, but as the network grows it will develop capabilities never originally imagined by the originator and will eventually become functional in an almost independent sense, as long as quality contacts and sources are developed and as long as those contacts and sources continue to grow and establish new capabilities and contacts of their own. A PIIN begins therefore as an idea and individual construct but over time develops into an almost biological organization of vast capacity. Drawing upon the collective skills and capabilities of the PIIN for whatever is desired or needed makes the PIIN a worthwhile and profitable venture for all individuals associated with that network and because of the potential for continued and even exponential growth the PIIN is an extremely advantageous system of achieving complex objectives rapidly and of multiplying capabilities well beyond the individual level.
End Introduction.
P.S.: Some of the above didn't format properly, but I hope it was still readable.
P.P.S.: By the way, I'm starting to integrate some of my internet accounts into the same basic format structure as my PIIN, so that things like Facebook will become part of my PIIN. It multiplies PIIN capabilities even further in that way.
P.P.P.S.: I've also built in-game PIINs. And encourage all of my players to do so as well. If you've got a good DM this can give you good, imaginative practice on how you might build up a useful PIIN in real life. Innovation and imagination are useful in building up good PIINs. Now I really gotta go to bed. See ya.