首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
ABSTRACT

Communication aimed at the public has been an almost absent topic in intelligence studies. This is despite a growing recognition of the importance of communicating towards the public in preventive security, counterterrorism, cyber security and organized crime prevention. This article attends to the practice of communicating intelligence to the public. It does so in order to show the diversity of communication practices in Western intelligence today. By investigating how the intelligence community communicates about ‘communication’ to the public, the article identifies three different concepts of communication, that each exposes different understandings of the public and democratic concerns.  相似文献   

2.
ABSTRACT

Images taken by civilians and shared online have become an important source of conflict intelligence. This article explores issues around how states and non-state actors appropriate civilians’ images to produce intelligence about conflict, critically scrutinizing a practice often called open source or social media intelligence. It argues that image appropriation for open-source intelligence production creates a new kind of visual security paradox in which civilians can be endangered by their everyday visual practices because their digital images can be appropriated by outside actors as conflict intelligence. The transformation of everyday images into conflict evidence relies on what Barthes termed the photographic paradox, the paradox that while a photograph is clearly not the reality it depicts, the photograph is casually interpreted as a copy of that reality. When images are appropriated as conflict intelligence this photographic paradox translates into a security paradox. A visual security argument can be made without the intention or knowledge of the image producer, who then comes to perform the role on an intelligence agent. Yet civilians in warzones can hardly refrain from producing any images when they need to call attention to their plight, and to stay in contact with friends and relatives. The paradox, then, is that such vital visual signs of life can rapidly become sources of danger for the civilian. This civilian visual security paradox, it is argued, demands that intelligence actors respect the protected status of civilians in their online collection practices. So far, however, there is little sign of such respect.  相似文献   

3.
ABSTRACT

This special issue is based on the observation that today’s intelligence services stand before a difficult task of, on the one hand, having to manage the uncertainties associated with new threats by inviting civil actors in to help, while also, on the other hand, having to uphold their own institutional authority and responsibility to act in the interest of the nation. In balancing this task, we show how today’s intelligence practices constantly contests the frontiers between normal politics and security politics and between civil society and the state. In this introduction we argue that these changes can be observed at three different levels. One is at the level of managerial practices of intelligence collection and communication; another is in the increased use of new forms of data, i.e. of social media information; and a third is the expansion of intelligence practices into new areas of concern, e.g. cybersecurity and the policing of (mis-) information.  相似文献   

4.
Abstract

We introduce the latest member of the intelligence family. Joining IMINT, HUMINT, SIGINT and others is ‘SOCMINT’ – social media intelligence. In an age of ubiquitous social media it is the responsibility of the security community to admit SOCMINT into the national intelligence framework, but only when two important tests are passed. First, that it rests on solid methodological bedrock of collection, evidence, verification, understanding and application. Second, that the moral hazard it entails can be legitimately managed. This article offers a framework for how this can be done.  相似文献   

5.
ABSTRACT

This article is discussing how the peace-building practices of the African Union have distinct ordering and space-making effects. Taking a socio-spatial perspective, it is argued that the peace and security projects through which the African Union, as a spatial entrepreneur, is addressing the scourge of ‘terrorism and violent extremism’ are geared towards (re-)establishing sovereignty that member states have lost in the past over their territories. While the African Union is favouring a spatial format that could be called ‘multiple networked regionalism’, the actual socio-spatial orders that are emerging around Africa’s transregional conflicts are far less clear cut.  相似文献   

6.
Abstract

After 9/11 the US Government tried to ‘fix’ intelligence by adopting the Intelligence Reform and Terrorism Prevention Act (IRTPA). Resources increased and, to varying degrees, performance improved – particularly in counterterrorism. This article, however, argues that the constellation of Intelligence Community authorities and organizations, either created or left in place by the IRTPA, coupled with the challenges of a complex security environment, leaves us ill-prepared to deal with the Country’s twenty-first century intelligence requirements. Should that critique prove accurate, and should future intelligence failure(s) be judged strategically and politically unacceptable, the second half of the article provides a framework for revising the IRTPA; the proposals substantially increase the authority of the head of the Intelligence Community, consolidate structures, and create centers of analytic critical mass necessary to meet the knowledge requirements for both regional and transnational security issues. Reflecting the Intelligence Community’s long standing tradition of questioning assumptions, the article is meant to foster reflection and debate about whether the Intelligence Community is postured to meet the needs of the Country, and if not, what needs to change.  相似文献   

7.
ABSTRACT

Strategic intelligence in national security enjoys an elevated status. Despite past failures and current challenges, its role in analysing the strategic environment is considered crucial for practising strategy. In the business world, competitive intelligence (CI) has evolved for a similar purpose: understanding the competitive environment, as a foundation for strategy. The current article focuses on the Israeli business world, where CI’s influence on corporate strategy is limited, reflecting the broader state of CI's immature academic and professional foundations. The article provides historical, organizational, conceptual, and cultural explanatory hypotheses for this minor impact of CI in Israel, a country where national intelligence is a highly influential institution. It thus broadens the scope of traditional intelligence studies and can contribute to CI scholarship.  相似文献   

8.
ABSTRACT

As cyber-security incidents become increasingly prevalent, we are facing a major political and democratic challenge: who comprises “the public” in relation to such incidents? Based on a study of the controversies surrounding the WannaCry ransomware attack, this article unpacks issues facing the creation of publics in contemporary ICT-mediated security practices. It shows how cyber-security incidents, such as WannaCry, do not neatly align with traditional national security politics and democracy, and it demonstrates the need to attend to how security publics are created. This may paradoxically entail both political and democratic challenges and possibilities for security politics in the digital age.  相似文献   

9.
ABSTRACT

This article uses the lens of small state theory to assess New Zealand’s role in the Five Eyes Alliance and Wellington’s implementation of intelligence reforms in the last seven years that are intended to help the country deal with a transformed security environment. In this context, New Zealand decision-makers have become increasingly concerned about growing Chinese influence in the South Pacific region and in New Zealand itself. It is clear that the New Zealand’s response to these developments resembles that of a minor power rather than a classical small state.  相似文献   

10.
ABSTRACT

This article scrutinises everyday practices of French gendarmes who were sent as international police in UN and NATO missions in Bosnia and Kosovo. Drawing on qualitative material, it argues that their encounters on the ground largely shaped their practices. Rather than melting into the internationalised peacebuilding milieu, gendarmes endeavoured to serve and survey, that is, to establish relationships with civilian populations as a means to collect security-related intelligence for their national government. The sociology of peacebuilding encounters on the ground thus unveils Peaceland’s social divides and invites to take into account the historicity of the peacebuilders’ societies.  相似文献   

11.
ABSTRACT

Defining intelligence is not just a terminological but also a political question. Intelligence methods are spreading quickly in the contemporary security landscape, and defining intelligence gives us a clearer idea of what we are in fact spreading, and therefore also of the political and social consequences that this may entail. When using intelligence methods in, say, policing, public administration or immigration services, we import a specific adversarial logic and thereby transform the social relationships that these regulatory and administrative practices support and rest upon. In this paper, I shall propose a new definition of intelligence in order to analyse the social transformations that may be produced by the logical structure implicit in the concept of intelligence.  相似文献   

12.
ABSTRACT

This article is concerned the everyday practices of international humanitarian actors who deliver assistance in armed conflict zones. Drawing on original fieldwork conducted in South Sudan, it elucidates how humanitarian actors engage with the principle of distinction in international humanitarian law (IHL). The article considers how the desire to enforce distinction impacts humanitarian actors’ relationships with others, and introduces the concept of everyday distinction practices. These practices have an important performance component, designed to appease the “phantom local.” It is proposed that such practices may have adverse implications for the humanitarian–beneficiary encounter. By positioning war-affected populations as an audience for distinction, everyday distinction practices reconfigure the victims of war from being receivers of aid to perceivers of aid. By lumping beneficiaries together with armed actors as part of the “phantom local,” distinction practices also paint the victims of war as an object of mistrust, fear, and potential danger.  相似文献   

13.
Abstract

In the 1990s, judgments in the European Court of Human Rights concerning state surveillance forced many West European countries to introduce new parliamentary bodies and formal systems for accountability. Promising both greater transparency and lawful intelligence, these frameworks were then energetically rolled out to Central and Eastern Europe. Although officials boasted about their effectiveness, these formal accountability mechanisms have failed to identify serious abuses over the last decade. Moreover, the security regime in much of Central Europe still remains largely unreconstructed. The article argues that a robust culture of accountability cannot be conjured into existence merely by introducing new laws and regulations, or indeed by the increasing tide of media revelations about intelligence. However, it suggests that we are now seeing the rise of a more complex pattern of ‘ambient accountability’ which is at last challenging the secret state across Europe.  相似文献   

14.
Abstract

This paper focuses on how distinct organizations and functions interact in a symbiotic way to provide the governmental functions of security and intelligence, and the place of defence intelligence amongst them. Because the external environment in which security and intelligence provision must be managed is both uncertain and complex, the manner in which defence intelligence negotiates its role and priorities with other organizational entities is critical to overall levels of success. This paper uses a mix of primary and secondary sources, supported by qualitative interviews, to argue that the narrow focus of previous theoretical approaches has left them able to explain either good or poor cooperative working in the defence intelligence sphere, but not both. It contends that the more holistic theoretical paradigm offered by an adapted transactional costs model that captures the governance difficulties involved can better explain all possible outcomes.  相似文献   

15.
Abstract

The following article argues that defence intelligence in general, and Britain’s Defence Intelligence (DI) organization in particular, represents an area in intelligence studies that is significantly under-investigated. It makes the case that the significance of understanding defence intelligence and DI lies not only in a general lack of illumination but also because DI is subject to and prompts a range of difficulties and challenges that are either especially acute in the defence context or have ramifications for the wider intelligence community that remain to be fully appreciated. Particular attention is given to DI’s remit being divided between Ministry of Defence and national requirements, problems of fixed-sum resourcing an intelligence function with national responsibilities that is subordinate to Departmental spending structures and priorities, fraught positioning of defence intelligence in Departmental line management and, finally, a chronic lack of public or official interest or scrutiny. The article concludes that the UK’s experience has echoes elsewhere, notably in the US, and that wider international study of defence intelligence is both long overdue and may have implications for understanding of national and wider intelligence institutions and processes.  相似文献   

16.
This article examines how Great Britain helped create Pakistan’s Inter-Services Intelligence Directorate (ISI) with two goals: (1) establishing a Pakistani branch of a Commonwealth intelligence network; (2) ensuring information security within that network. Ultimately, this endeavor failed because of perceived deficiencies in Pakistan’s security institutions and Britain’s inability to address Pakistan’s security needs. By the mid-1950s ISI forged close ties with the United States which offered more and with fewer political strings attached. This article offers new insights on intelligence alliance formation during the cold war. It also provides a useful case study in the weaknesses of multilateral intelligence coalitions.  相似文献   

17.
Abstract

This article reexamines the conventional wisdom that characterizes Sino-Japanese energy relations as predominantly competitive, but views Sino-Japanese environmental relations as essentially cooperative. Using sociological theories of risk, it is argued that Sino-Japanese cooperation is more likely in both the energy and environmental areas when common risks are perceived and relative gains are minimized. Despite their many conflicting strategic, political, and economic interests, as energy importers who are vulnerable to supply interruptions in the Middle East and competitors for global energy supplies, China and Japan share common risks to their energy security. Consequently, there actually may be increasing opportunities for China and Japan to address their common concerns through bilateral and multilateral cooperative practices, such as common positions on pricing or energy conservation initiatives. Although one would expect China and Japan to highlight their mutual interests in tackling environmental problems such as air pollution, in fact relative gains often impede cooperation. Japan increasingly views China as an economic competitor and is reducing environmental aid, while China continues to set a priority on economic growth, which sets limits on the use of costlier Japanese green technologies. By examining a selection of scholarly articles, reports and newspaper articles by Chinese and Japanese analysts, as well as material from interviews in Beijing and Tokyo in May–June 2007, the paper shows how environmental and energy issues in Sino-Japanese relations may be framed as threats, requiring counter-measures, or common risks, which can be addressed through cooperative practices. Lastly, the paper discusses the possibility of the development of an energy security ‘risk community’ as cooperative practices develop between China and Japan. Nonetheless, conflicting political interests, strategies, and self-images, accentuating relative gains, may provide obstacles to their cooperation in both energy security and environmental protection.  相似文献   

18.
ABSTRACT

While gender-responsive Security Sector Reform (SSR) is increasingly recognised as being key to successful SSR programmes, women continue to be marginalised in post-conflict SSR programmes, particularly defence sector reform. By focussing on developments in Nepal, Sri Lanka, Kosovo and Colombia, this article explores the paradox of women’s marginalisation in defence sector reform and post-reform defence structures in places where women were active combatants during the preceding conflict. This article refers to examples of women’s engagement in combat to challenge some of the reasons given for women’s marginalisation, including reference to women’s skillset, aptitude and interests. The article adopts a feminist institutionalist approach to show how SSR helps security sector institutions construct and reconstruct gender power relations, reinforce gendered dynamics of exclusion, and determine gendered outcomes. It concludes by drawing attention to the transformational potential of SSR to alter gender power relations, and thereby enhance the security of women and the sustainability of peacebuilding efforts.  相似文献   

19.
ABSTRACT

This article explores the practice and political significance of politicians’ journeys to conflict zones. It focuses on the German example, looking at field trips to theatres of international intervention as a way of first-hand knowledge in policymaking. Paying tribute to Lisa Smirl and her work on humanitarian spaces, objects and imaginaries and on liminality in aid worker biographies, two connected arguments are developed. First, through the exploration of the routinized practices of politicians’ field trips the article shows how these journeys not only remain confined to the ‘auxiliary space’ of aid/intervention, but that it is furthermore a staged reality of this auxiliary space that most politicians experience on their journeys. The question is then asked, second, what politicians actually experience on their journeys and how their experiences relate to their policy knowledge about conflict and intervention. It is shown that political field trips enable sensory/affectual, liminoid and liminal experiences, which have functions such as authority accumulation, agenda setting, community building, and civilizing domestic politics, while at the same time reinforcing, in most cases, pre-existing conflict and intervention imaginaries.  相似文献   

20.
ABSTRACT

Afghanistan has come to be seen as emblematic of the security threats besetting peace and security operations, and in this article we consider the response to such threats via the ‘bunkering’ of international staff. Drawing on an in-depth qualitative survey with aid and peacebuilding officials in Kabul, we illustrate how seemingly mundane risk management procedures have negative consequences for intervening institutions; for the relation between interveners and national actors; and for the purpose of intervention itself. Bunkering, we argue, is deeply political – ‘imprisoning’ staff behind ramparts while generating an illusion of presence and control for ill-conceived modes of international intervention.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号