Query Result Set
Skip Navigation Links
   ActiveUsers:4158Hits:24601195Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
INTERNATIONAL JOURNAL OF INTELLIGENCE AND COUNTER INTELLIGENCE VOL: 28 NO 4 (10) answer(s).
 
SrlItem
1
ID:   140995


Assessing reform of the Japanese intelligence community / Kobayashi, Yoshiki   Article
Kobayashi, Yoshiki Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Since the early 2000s, the Government of Japan has undertaken intensive efforts to reform its Intelligence Community (IC) in response to recent rapid changes of the national security environment surrounding Japan, such as increasing threats of terrorism, and North Korea's missile and nuclear programs, among others. The major objectives have been: (1) establishing an effective institutional mechanism connecting policymakers and the IC and (2) improving intelligence collection capabilities.
        Export Export
2
ID:   140993


But my hands are clean: the ethics of intelligence sharing and the problem of complicity / Manjikian, Mary   Article
Manjikian, Mary Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Post-11 September 2001 (9/11) intelligence sharing has become more important than ever. Sharing arrangements have proliferated, involving additional types of organizations on all levels (local, state, national, and international), and more participants, including those from non-democratic regimes. The fight against terror has brought many new players together for the first time, united in combat against a common enemy. But since intelligence sharing arrangements are often informal and ad hoc, clear guidelines or common ground are seldom available in determining the rules governing such arrangements in the absence of shared norms and values on issues, including human rights, accountability, and transparency. That new controversies have arisen in the area of intelligence sharing is thus not surprising. Three specific ethical dilemmas involving intelligence sharing, have developed, among others, in recent years:
        Export Export
3
ID:   140994


Counterterrorism in Brazil: with an eye on the upcoming olympics / Condeixa, Fábio M S P   Article
Condeixa, Fábio M S P Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Brazil has never been a primary target for terrorist attack by fundamentalist Islamic organizations, and bears good relations with both Arab and Islamic countries. Consequently, Islamic terrorism has not been considered an actual menace to the country. Nevertheless, the 2016 Olympics in Brazil and the rise of Islamic-oriented terrorism promoted by organizations such as the Islamic State in Iraq and al-Sham (ISIS) considerably increase the risk of a terrorist attack on Brazilian soil.
        Export Export
4
ID:   140996


Formal risk-effectiveness analysis proposal for the compartmentalized intelligence security structure / Javorsek, Daniel II   Article
Daniel Javorsek II Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Information security has quietly played a significant role in the development of the contemporary U.S. hegemony in world affairs. In addition to safeguarding its most vital technological advancements, information security has preserved its tactical advantage by protecting the “ways and means” of intelligence collection and served as the foundation for U.S. military dominance.1 In part due to these efforts, U.S. weapon systems have dominated the conventional battlefield since the end of the Cold War, but recent trends indicate this margin may be shrinking. Using defense related spending as a proxy for future military dominance; a recent study suggests that by 2035, U.S. spending could be eclipsed by a resurgent China that, at 2.3 million strong, already has the world's largest active military force.2
        Export Export
5
ID:   140999


Funeral for a spy / Chapman, Robert D   Article
Chapman, Robert D Article
0 Rating(s) & 0 Review(s)
Summary/Abstract I spit-shined my shoes, put on a white shirt, dark suit, and tie; I was going to a funeral. My old friend and fellow spook, Alphonse Sorrells, had died. He was still young and had retired only a year or so ago. I figured the life of a spook had done him in. Too many cigarettes, too much cheap booze from the commissary, and too many late or sleepless nights with the girls eventually got him. Many guys, seeing themselves as Hollywood spies, lived and acted that way. Certainly, Al did.
Key Words Japan  Funeral - Spy 
        Export Export
6
ID:   140990


Has the odni improved U.S. intelligence analysis? / Gentry, John A   Article
Gentry, John A Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA) created a Director of National Intelligence (DNI) and ordered him and his Office of the Director of National Intelligence (ODNI) to improve intelligence analysis in the wake of two major perceived U.S. intelligence failures: al-Qaeda's attacks of 11 September 2001 (9/11) and the National Intelligence Estimate (NIE) on Iraqi weapons of mass destruction (WMD) of September 2002.1 Observers’ initial assessments of the IRTPA were generally that the DNI and his office would be weak and have little effect on the U.S. Intelligence Community (IC) other than adding a wasteful layer of bureaucracy.
        Export Export
7
ID:   140998


In the shadow of the Gestapo: German secret police intelligence in East Asia, 1939–1945 / Chen, Chern   Article
Chen, Chern Article
0 Rating(s) & 0 Review(s)
Summary/Abstract In the 1930s, Germany developed a close, cooperative relationship with Nationalist China, led by Chiang Kai-shek. At the time, China and Germany were tied closely by trade agreements and the presence in China of German military advisers. From the end of 1936, Germany was also politically bound with militarist Japan via the Anti-Comintern Pact. After Japan's invasion of the Chinese mainland in 1937, however, Germany faced the dilemma of maintaining friendly relations with both Japan and China in order to reap the greatest possible political benefits. But Adolf Hitler felt compelled to support Japan, and was consequently determined to withdraw the German military advisory group from China in mid-1938.
Key Words Japan  East Asia  China  Gestapo  German Secret Police Intelligence  1939–1945 
        Export Export
8
ID:   140991


Intelligence analysis: is it as good as it gets? / Lowenthal, Mark M   Article
Lowenthal, Mark M Article
0 Rating(s) & 0 Review(s)
Summary/Abstract One of the more charming and frustrating aspects of American life is the endless pursuit of perfection. Americans tend to believe, as a people, that things can always be improved. For many aspects of life—science, medicine, transportation safety, etc.—this is a worthwhile approach. But for other aspects of life this pursuit is really a chimera, an illusory, unattainable goal. Indeed, in some areas pursuing it may be even more costly than not pursuing it.
Key Words CIA  Intelligence Community  Intelligence Analysis  ODNI 
        Export Export
9
ID:   140992


Undercover under threat: cover identity, clandestine activity, and covert action in the digital age / Lord, Jonathan   Article
Lord, Jonathan Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Almost every human activity now creates, or is in some way informed or affected by, digital information. The methods by which commerce, communication, socialization, and learning are conducted have all been digitized. The world's second-oldest profession—espionage—is no exception. Digital information's ubiquity has had a profound and indelible impact on intelligence collection methods. The last century has witnessed both the emergence of intelligence collection disciplines rooted in technology and the impact of technological change upon the original discipline of human intelligence. A visit to Washington, DC's National Spy Museum will reveal the hundreds of devices designed and used to both support and thwart U.S. intelligence operations. While, previously, technological innovation had an incremental impact on intelligence, today's emerging digital environment has the potential to wholly transform the foundation upon which intelligence rests: secrecy.
        Export Export
10
ID:   140997


Yom Kippur war: the successes of Israeli intelligence / Sindawi, Khalid   Article
Sindawi, Khalid Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Most of the literature related to Israeli intelligence on the eve of the 1973 Yom Kippur War refers to its failure, mainly because it did not provide an early warning. The flawed intelligence assessment rendered in October 1973 has been studied intensively and remains the subject of much public and professional debate. More than a decade ago, Israeli scholar Uri Bar-Joseph studied the most recently released evidence and came to the conclusion that the deficient deployment of the Israeli army, the Israel Defense Force (IDF), was the result of the absence of a sufficient intelligence warning, which was at the root of the Israeli failure at the start of the war.1 In his book, The Watchman Fell Asleep, Bar-Joseph tried to shed light on the circumstances and causes of the Yom Kippur attack by Egyptian and Syrian forces on Israeli positions at the Suez Canal and the Golan Heights on 6 October 1973. The evidence suggests that an important circumstance accounts for the surprise effect of these actions, despite ample warning signs thereof, is traceable to a significant need for cognitive closure among major figures in the Israeli intelligence establishment. Such a need may have prompted leading intelligence analysts to “freeze” on the conventional wisdom that an attack was unlikely, and to become impervious to information suggesting that it was imminent. The discussion here considers the psychological forces affecting intelligence operations in predicting the initiation of hostile enemy activities, and describes possible avenues of dealing with psychological impediments to open-mindedness that may pervasively characterize such circumstances.
        Export Export