Query Result Set
Skip Navigation Links
   ActiveUsers:1463Hits:19804082Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
HUMINT (8) answer(s).
 
SrlItem
1
ID:   156561


art of meddling: a theoretical, strategic and historical analysis of non-official covers for clandestine Humint / Musco, Stefano   Journal Article
Musco, Stefano Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The building of reliable covers has always been of the utmost importance for clandestine Humint. Using both primary and secondary sources, this study seeks to examine how classical authors and modern scholars have dealt with this topic, and which kind of covers have been the most used throughout history in different sociopolitical contexts, and what are the new perspectives for today’s challenges. Findings suggest that a careful reading of the political milieu in which intelligence officers are required to work, and a certain degree of creativity, are the essential premises for the construction of a plausible cover; that some apparently outdated disguises such as merchants, itinerant monks and philosophers should be understood more broadly today to include business people, humanitarian NGOs and academics; that undercover practices have been theoretically and historically recognized as necessary and convenient by a great number of societies, often with scant regard for ethical considerations.
        Export Export
2
ID:   097038


Countering nontraditional humint collection threats / Magee, Aden C   Journal Article
Magee, Aden C Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
Key Words Intelligence  HUMINT  Nontraditional Humint 
        Export Export
3
ID:   161529


Cyber operations and useful fools: the approach of Russian hybrid intelligence / Gioe, David V   Journal Article
Gioe, David V Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article argues that Russian intelligence has achieved recent success in influencing democratic elections and referenda by combining the traditional Human Intelligence (HUMINT) discipline of manipulating useful fools with cutting edge cyber tactics, including hacking, phishing, social engineering, and weaponizing purloined information. This essay further argues that this synthesis yields greater effects than the sum of its parts. Given its potency, democracies and NATO members should expect to confront this type of threat more often. The 2016 American presidential election is used as a case study to conceptualize Russian hybrid intelligence, a new term reminiscent of Soviet ‘complex active measures’ and updated for the twenty-first century.
        Export Export
4
ID:   074143


Defense HUMINT needs technology, too: trench coats have given way to optical collectors / Ackerman, Robert K   Journal Article
Ackerman, Robert K Journal Article
0 Rating(s) & 0 Review(s)
Publication 2006.
Key Words Intelligence  Human Intelligence  HUMINT 
        Export Export
5
ID:   099709


Evaluating humint: the role of foreign agents in US security / Johnson, Loch   Journal Article
Johnson, Loch Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
        Export Export
6
ID:   139513


HUMINT, OSINT, or something new? defining crowdsourced intelligence / Stottlemyre, Steven A   Article
Stottlemyre, Steven A Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Over the past six years, certain crowdsourcing efforts have begun to resemble, and perhaps augment, national security intelligence collection. As with any budding field, purveyors of intelligence crowdsourcing have been somewhat inconsistent in their attempts to develop new concepts to describe their actions, or to incorporate professional ethics into their activities. In this environment, where the line between traditional intelligence collection operations and public information collection efforts is increasingly blurred, steps must necessarily be taken to standardize proper intelligence crowdsourcing practices in order to avoid potential ethical quandaries even before they arise. As part of this effort, constructing a concise definition of crowdsourced intelligence becomes vital.
        Export Export
7
ID:   116171


Introducing Social Media Intelligence (SOCMINT) / Omand, David; Bartlett, Jamie; Miller, Carl   Journal Article
Miller, Carl Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
Summary/Abstract We introduce the latest member of the intelligence family. Joining IMINT, HUMINT, SIGINT and others is 'SOCMINT' - social media intelligence. In an age of ubiquitous social media it is the responsibility of the security community to admit SOCMINT into the national intelligence framework, but only when two important tests are passed. First, that it rests on solid methodological bedrock of collection, evidence, verification, understanding and application. Second, that the moral hazard it entails can be legitimately managed. This article offers a framework for how this can be done.
        Export Export
8
ID:   155212


Weighing the evidence: the BCISS Iraq HUMINT analytic matrix exercise / Davies, Philip H J; Gustafson, Kristian   Journal Article
Davies, Philip H J Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article examines the Brunel Iraq HUMINT Matrix exercise. The purpose of this approach to intelligence pedagogy is to get participants to think through and work out analytic methods, issues, and potential solutions from first principles and for themselves. Our strategy is to try and fuse training and education learning outcomes, so that students emerge with a technical competence in analytic methods, underpinned by a deeper understanding of the foundations and internal logic shaping those methods. The Iraq Matrix exercise seeks to unpack and examine the nuts and bolts of source evaluation, and to test alternative hypotheses with particular attention to the relationship between the quality of various sources and, the weight of judgements they can or cannot sustain. The ultimate goal is to encourage what is currently fashionably referred to as ‘reflexive practice’, whereby the practitioner reflects critically and self-critically upon how their task works and how they do it, then uses those insights to improve their workplace performance. But not all of our teaching is directed towards practitioners. For those whose aims are scholarly and academic, the aim is to give observers a more visceral understanding of the challenges of the intelligence task they intended to study. Here the intended reflexive practice goal is to encourage an empathy with the workaday challenges facing those in the business of intelligence analysis, and to discourage the observer’s temptation to make facile and simplistic judgements about processes or events.
Key Words Iraq  HUMINT  BCISS  Analytic Matrix Exercise 
        Export Export