Query Result Set
Skip Navigation Links
   ActiveUsers:2412Hits:21356693Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
INTELLIGENCE AND NATIONAL SECURITY VOL: 35 NO 6 (8) answer(s).
 
SrlItem
1
ID:   174212


Adding value to the intelligence community: what role for expert external advice? / Dover, Robert   Journal Article
Dover, Robert Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Reviews of intelligence failures have recommended greater use of external expertise in challenging intelligence community assessments. External contributions were expected to augment covert collection and to provide open-source challenge to analysts, rather than to directly contribute to decision support. The structural limitations of the scope and machinery of intelligence have limited the value agencies can extract from external experts. Creating an Open-Source Intelligence Agency of commensurate size to primary intelligence organisations would enable decision support to be provided to all government departments. It would widen the pool of sources and experts, providing for greater extraction of value from experts who are only partially included in this government activity.
        Export Export
2
ID:   174211


Beauty is the troubled water that brings disasters: the making of the seductress-spy in Republican China (1911–1949) / Zhang, Amanda   Journal Article
Zhang, Amanda Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article examines the origins of the Chinese seductress-spy to further existing literature on women and war, female archetypes and espionage in China. The diffusion of knowledge about women such as Mata Hari from the West to Republican China (1911–1949) developed a new female archetype that was neither Chinese nor Western, but both Chinese and Western. Instead of seeing Chinese seductress-spies as equivalent to their Western counterparts, we should see them as a uniquely gendered nationalist construct that had roots in the Japanese, English, as well as Chinese understanding of the role of women during wartime situations.
        Export Export
3
ID:   174214


Can United States intelligence community analysts telework? / Gioe, David V; Hatfield, Joseph M; Stout, Mark   Journal Article
Hatfield, Joseph M Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article argues that United States Intelligence Community analysts can and should periodically telework as routine professional development and as a research supplement to traditional all-source intelligence analysis. We offer four key benefits to tapping into this reservoir of unclassified information that would improve the quality of the intelligence product, enable better liaison and academic exchange, and steward the profession. We conclude that an overdue rebalancing of classified and publicly available sources could be aided by telework, but only once analysts break free from ‘the cult of the SCIF’ will publicly available information receive the analytical attention that it deserves.
        Export Export
4
ID:   174208


CIA-MI6 psychological warfare and the subversion of communist Albania in the early Cold War / Long, Stephen   Journal Article
Long, Stephen Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The west’s prototype covert action of the Cold War against Albania, codenamed BGFIEND/Valuable, is often characterized as a failure of the rollback policy against the Soviet bloc. This article argues that, from late 1949, the CIA and MI6 did not attempt to overthrow Enver Hoxha’s communist regime as historians have assumed, but to subvert and harass it primarily through psychological – not paramilitary – warfare. On one hand, western intelligence enjoyed some modest propaganda achievements, and valuable organizational and tradecraft experience was acquired for future operations. Nevertheless, BGFIEND/Valuable also faced innumerable challenges and setbacks, illustrating the difficulty of waging subversive psychological warfare against a hostile authoritarian state in the early Cold War.
        Export Export
5
ID:   174207


Intelligence collection in Arabia: Britain’s roaming information-gatherers in the Trucial States, 1956-1971 / Yates, Athol; Rossiter, Ash   Journal Article
Rossiter, Ash Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Imperial powers, facing considerable information challenges in far-flung territories, adapted intelligence practices and machinery to fit local conditions. In contrast to the attention placed on British intelligence activities in territories considered within the ‘formal empire’ (i.e. where Britain was in direct control), we know very little about intelligence arrangements in ‘informal empire,’ where external powers exerted influence and protected their interests by working through local elites. Exploiting declassified documents and drawing upon interviews with retired intelligence officials, this article reveals Britain’s unique intelligence system in a remote corner of empire – the Trucial States (today’s United Arab Emirates) – which was built around a group of roaming officers tasked with collecting full-spectrum intelligence.
        Export Export
6
ID:   174210


Layering and the foundations of the modern American surveillance state, 1970-2020 / McMahon, Adam M   Journal Article
McMahon, Adam M Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The U.S. Congress established the foundation of today’s surveillance state nearly a half century ago as it sought to regulate and prevent criminal activity: the Banking Secrecy Act to target tax evasion by individuals and the Foreign Intelligence Surveillance Act to create oversight of wiretapping activities by law enforcement. Over time, additional functions were layered onto the existing institutional infrastructure, such as combating illicit drugs. September 11th, 2001 served as a critical juncture, reorienting the regime yet again to support the counter terror mission, despite persistent inefficiency and simultaneous risks to the civil liberties of Americans.
        Export Export
7
ID:   174209


Oversight mechanisms, regime security, and intelligence service autonomy in South Sudan / Adeba, Brian   Journal Article
Adeba, Brian Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Statutory oversight mechanisms for South Sudan’s intelligence service are weak and ineffective. The weakness of these mechanisms is directly related to the sense of security that the regime experiences. Internal threats facing the regime after South Sudan’s independence have resulted in an increase in the autonomy and influence of the National Security Service to counter opposition. Democratic principles, such as independent legislative oversight and respect for human rights have become subordinate to the political survival of the regime and its leaders.
Key Words Security  Intelligence Service  South Sudan 
        Export Export
8
ID:   174213


Red Brigades and communist Czechoslovakia: a troubling legacy full of ambiguities / Petlák, Jakub; Mareš, Miroslav   Journal Article
Mareš, Miroslav Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article examines alleged Czechoslovak assistance to the Italian extreme-left terrorist organisation, the Red Brigades, and how the case has been investigated in Czechoslovakia and the Czech Republic. The authors present the sources of information on the issue and analyse the course of the investigation undertaken by the Office for the Documentation and Investigation of the Crimes of Communism. In the absence of a complete archival record, given that important documents were shredded, the full truth about the fact and nature of any Czechoslovak assistance may never be known. Yet there are some grounds for speculation that assistance was granted by elements within the Czechoslovak secret services, and that these elements failed to inform the Communist Party leadership about their actions. However, it is not possible to confirm this on the basis of available documents.
        Export Export