Query Result Set
Skip Navigation Links
   ActiveUsers:746Hits:19987022Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
INTERNATIONAL JOURNAL OF INTELLIGENCE AND COUNTER INTELLIGENCE VOL: 29 NO 3 (9) answer(s).
 
SrlItem
1
ID:   145318


African regional intelligence cooperation: problems and prospects / Cline, Lawrence E   Article
Cline, Lawrence E Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Considerable attention has been paid in recent years to improved intelligence sharing among Western countries in an effort to face common threats.1 Most studies have focused on efforts by the United States with other states or among such coalitions as the North Atlantic Treaty Organization (NATO) or International Security Assistance Force (ISAF) in Afghanistan. Considerably less attention has been devoted to intelligence sharing efforts in other parts of the world. Africa in particular represents a good area for examining regional approaches to intelligence sharing.
        Export Export
2
ID:   145323


Contemporary utility of 1930s counterintelligence prosecution under the United States espionage act / Setzekorn, Eric   Article
Setzekorn, Eric Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Although post-2006 executive branch efforts to discourage unauthorized disclosures have been politically contentious, historical cases illustrate that the Espionage Act of 1917 has broad utility in prosecuting unauthorized information transfer, also known as “leaking.” Multiple United States federal courts, including the Supreme Court, have consistently upheld the Espionage Act and worked to clarify the statute through judicial interpretation. Late 1930s and early 1940s decisions, including the only Supreme Court hearing on the Espionage Act of 1917, re-affirmed the logic and legality of the Act. The 1941 Supreme Court decision, Gorin v. United States (1941), formed the primary legal precedent for the case of Rosen v. United States (2006), which began the recent U.S. government legal campaign to prosecute the unauthorized release of sensitive defense related information. Specifically, the 1930s cases established that the intent of the government employee, the “sensitivity” of the material transferred, or the status of the recipient were not mitigating factors.
        Export Export
3
ID:   145320


Engaging public support and awareness in intelligence: the demands and challenges to developing an intelligence culture / Chiru, Irena   Article
Chiru, Irena Article
0 Rating(s) & 0 Review(s)
Summary/Abstract In democracies the efficiency of a national security institution depends significantly on the way its role and mission are perceived by the intelligentsia and the general public. “Social capital,” an asset for all institutions, conditions their efficient functioning in the limits of the law. Consequently, the intelligence culture, understood as a set of explicit and implicit attitudes and behaviors related to intelligence which influence social perceptions, is fundamental for allowing the public to trust and support their country's intelligence services, given that trust is directly correlated with the efficiency of national security institutions. Political as well as security community legitimacy is acquired, preserved, validated, or eroded through actions, just as their public image is built through adequate communication policies.
        Export Export
4
ID:   145322


I got algorithm: can there be a nate silver in intelligence? / Spielmann, Karl   Article
Spielmann, Karl Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Nate Silver is a prominent statistician/statistical probability analyst who, among other achievements, may be best known for making a very accurate prediction of President Barack Obama's victory and its dimensions in the 2012 election.1 In doing so, he probably redeemed (at least partially) the reputation of sophisticated mathematical modeling that was badly tarnished by its association with the poor investment decisions that brought the financial debacle of 2008.2 Does Silver have a potential counterpart in the intelligence business, where predicting the nature and likelihood of threats is a central concern, and what would that person have to do to rise to the occasion?
        Export Export
5
ID:   145324


MI5's strategy during the first world war / Northcott, Chris   Article
Northcott, Chris Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Three hitherto neglected MI5 documents have been released to The National Archives (TNA): “Notes on the General Organization of a Counter-Espionage Bureau” that MI5 sent to officials in the Colonies in 1915 (KV1/16, Appendix B); notes on “Preventive Intelligence Duties in War” produced by MI5 in 1918 (KV1/37, Appendix O); and, a section on “Detective Intelligence Work” within the G Branch Report (KV1/39, pp. 1–17). These documents make possible a closer look at MI5's activities and principles in the early 20th century.
Key Words First World War  MI5's Strategy 
        Export Export
6
ID:   145325


Observations on successful espionage / Wipp, Joseph W   Article
Wipp, Joseph W Article
0 Rating(s) & 0 Review(s)
Summary/Abstract In early 2015 John Brennan, the Director of the Central Intelligence Agency (DCIA), announced a major reorganization of the CIA, presumably to conform more closely to what the U.S. political leadership now demands and will presumably continue to demand of its intelligence agency in the future. Brennan is certainly aware that the last 25 years have not been kind to the conduct of American espionage. The first decade of downsizing and neglect in the post-Soviet/post-Cold War 1990s was followed by years of focus on transnational interests like terrorism and on a few countries of then-priority interest, to the neglect of other current and future intelligence issues. While that first decade witnessed a decline in CIA resources and support for espionage, the period after the attacks on the World Trade Center and Pentagon of 11 September 2001 (9/11) witnessed an increase in both categories but remained concentrated in a few crisis areas.
        Export Export
7
ID:   145319


Poland's attempts to develop a democratic and effective intelligence system, phase 1: 1989–1999 / Lefebvre, Stéphane   Article
Lefebvre, Stéphane Article
0 Rating(s) & 0 Review(s)
Summary/Abstract As Poland emerged from decades of Communist rule, its political course was uncertain. The expectations among advanced democratic countries that Poland would evolve into a full-fledged democratic polity were certainly high, despite serious political and socio-economic challenges. After all, Poland lacked a democratic tradition and respect for the rule of law, and its political culture was long at ease with strong leaders and authoritarian institutions. Its economy was weak, its legal culture and judicial system were in need of rebuilding, and it suffered from political fragmentation.1 More importantly, without strong political institutions, a new and effective legal framework, and in-depth socio-economic reforms, a serious concern developed among would-be Polish reformers and astute foreign observers that the country's intelligence services could pose an obstacle to its democratic development, and endanger the political, social, economic, and human rights of its citizens. Ultimately, the intelligence services were indeed sources of controversy, political infighting, and alleged abuses, but not to the extent of preventing Poland from moving ahead as a recognized democracy within the polity of nations.
        Export Export
8
ID:   145321


Should congress provide safe harbor to intelligence whistleblowers? / Fleitz, Frederick H   Article
Fleitz, Frederick H Article
0 Rating(s) & 0 Review(s)
Summary/Abstract In September 2015, news reports surfaced that more than 50 U.S. intelligence analysts working with the U.S. Central Command (CENTCOM) had filed complaints with the Pentagon's inspector general alleging that their analysis was manipulated by senior officials to downplay the threat from ISIS and the al-Nusra Front (the al-Qaeda branch in Syria).1 The journalists reported that management had altered the analysts' assessments to bolster the Obama administration's claim that the U.S. was making progress in defeating the Islamist terrorist groups.
        Export Export
9
ID:   145317


Sneaking under cover: assessing the relevance of passports for intelligence operations / Musco, Stefano; Coralluzzo, Valter   Article
Musco, Stefano Article
0 Rating(s) & 0 Review(s)
Summary/Abstract In wartime, border controls on the movements of individuals increase tremendously, because national authorities become additionally concerned that spies from an enemy state might seek to enter the country to gather information or conduct other covert operations. Historically, the need to identify potential enemies has led states to adopt instruments by which to associate a certain name with a place of origin. The best known of these tools is the passport. That a rudimentary form of passport was introduced as early as during the French Revolution to prevent counter-revolutionary agents from mingling with other travelers in order to safely cross borders is no coincidence. A similar control method was put in place during the Napoleonic Wars.1 Interestingly, serious passport control almost fell into disuse all throughout the 19th century, when economic prosperity and overall political stability positively encouraged free movement of individuals as a driving force for further development, only to be resumed as late as during the First World War, remaining permanent since then.2 In conflict zones, such controls are more stringent than in areas of the world where two or more states have created strong political and economic bonds. Europe's Schengen area, giving almost unlimited access across borders, is the most obvious example of discrepancy in the mobility of European and non-European citizens.
        Export Export