首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Theoretical work involves explanation and prediction, but thus far there has been little scholarly work explaining and predicting the role of intelligence analysts in support of foreign and national security policies. Without a theory of intelligence, it becomes difficult to decide what the appropriate substantive analytical responsibilities of the intelligence community should be. Accordingly, a theory of foreign intelligence analysis is necessary. This paper presents a theoretical framework developed during the immediate post-Cold War timeframe to explain why there was such a wide variety of perspectives regarding the future need for intelligence, embeds these ideas within the existing intelligence theory literature, applies this framework more generally in a way that can be used to explain variations in the substantive coverage of intelligence analysis in the past and predict possible variations in the future, and then tests the theory's ability to explain the analytical focus of domestic intelligence organizations.  相似文献   

2.
ABSTRACT

Communication aimed at the public has been an almost absent topic in intelligence studies. This is despite a growing recognition of the importance of communicating towards the public in preventive security, counterterrorism, cyber security and organized crime prevention. This article attends to the practice of communicating intelligence to the public. It does so in order to show the diversity of communication practices in Western intelligence today. By investigating how the intelligence community communicates about ‘communication’ to the public, the article identifies three different concepts of communication, that each exposes different understandings of the public and democratic concerns.  相似文献   

3.
Intelligence products have a degree of uncertainty associated with them. This is typically expressed using linguistic probabilities (e.g., ‘likely’), and some organizations have adopted standardized lexicons for communicating uncertainty. This paper empirically shows that intelligence analysts use a wide heterogeneity of language to communicate uncertainty. This does not include all of the phrases in standardized lexicons used by the intelligence community. In addition, analysts may use some phrases differently to that advocated. Miscommunication of uncertainty can have deleterious effects on decision-making, and so standardization of uncertainty communication should be evidence-based. This paper discusses ways in which such evidence can be generated.  相似文献   

4.
Looking at trends of professionalization of intelligence analysis within the United States Air Force as a subset of the broader US Intelligence Community, this paper calls for a re-evaluation of the professionalization of intelligence analysis away from a bureaucratic ‘corporateness’ approach examining the traits of a profession. Instead, reform of intelligence analysis should focus on the unique expertise and responsibility that define the profession. It identifies the analyst's unique expertise as managing adversary information to reduce a decision maker's uncertainty, and the responsibility in striving to improve capabilities within the profession while ensuring both the strengths and limitations of intelligence analysis are understood by intelligence customers. By focusing on corporateness, the community jeopardizes reform efforts by moving professionalization toward ‘getting the right answer’ and away from a broader understanding of the strengths and limitations inherent in the field of intelligence, where getting the right answer isn't often attainable.  相似文献   

5.
The article deals with the role and benefit added by the use of horizon scanning in intelligence analysis in the UK. It asserts that horizon scanning as a technique, while not entirely akin to the tradecraft of intelligence analysis, has much to contribute to its success. Specifically, is asserts that a horizon scanning function in the JIO and the Cabinet Office should be made permanent, as bureaucratic tumult in the wake of the 2010 SDSR have left the capability un-staffed, though still established. Within the UK intelligence community, such an organization may have positive roles to play in the processes of challenge, the setting of collection priorities, and overall long-term UK intelligence assessment at the national level.  相似文献   

6.
A July 1990 cable from the US Embassy in Moscow that anticipated the collapse of the Soviet Union is a case study for an analysis in this article that seeks to make three points: 1) major failures in intelligence analysis are more likely to result when all elements of the intelligence community speak with one voice than when they disagree; 2) embassy reporting can play an essential role independent of that of the intelligence community in shaping Washington thinking about international events, but a variety of developments have made this increasingly difficult; 3) probability analysis plays too great a role in intelligence products and risk management too little.  相似文献   

7.
Effective communication of information is essential to intelligence work. This paper identifies the main obstacles to good communication: policy-related challenges; cognitive impediments; resource limitations; cultural and structural issues within intelligence communities; and technical information. To illustrate, it examines four cases when poor communication contributed to intelligence shortcomings. Via questionnaire and document survey, the study identifies the current state of practice in UK intelligence communities. The survey of visualization documents currently in use revealed errors against established principles of Information Design. Thus, to ensure better handling and dissemination of intelligence, there is a distinct need to apply Information Design principles.  相似文献   

8.
In 2009, a review of the New Zealand intelligence community, the Murdoch Report, recommended increased coordination and reform to the operation of agencies. Since then, the experience of increasing coordination in New Zealand has been more constructive than in other capitals. Reorganizing the intelligence community revolves around relocating multiple agencies within Pipitea House and the creation of a ‘one community, many agencies’ dynamic. The creation of the Intelligence Coordination Group and an expanded role for the National Assessments Committee plays a vital role in aligning agency priorities. Agencies have also begun to slowdown the assessment process and are introducing new procedures for the analysis and discussion of intelligence products.  相似文献   

9.
As part of the infrastructure for monitoring the movements of Private Security Companies (PSCs) in Iraq, a unique intelligence interface has been constructed to enhance cooperation between the military and PSCs. Using a wide range of existing intelligence-sharing agreements and guidelines for handling classified information, PSC contractors working with the US military have been able to provide unclassified intelligence products to the wider PSC community. Using lessons learned in Iraq as a contractor building this interface, the author explains how institutional difficulties were overcome and argues that the US military should be better prepared to share intelligence with the wide range of organizations it can expect to work with in future unconventional warfare or nation-building operations. Some of the lessons learned in Iraq can also be applied to the US Department of Homeland Security's Regional Fusion Centers, where many of the same difficulties with intelligence-sharing and integration with commercial organizations are being encountered.  相似文献   

10.
This article introduces, places in historical context and publishes selected extracts from chapter one of the Report on Colonial Security, which deals specifically with intelligence organisation both in London and overseas. Written by General Sir Gerald Templer in 1955, the report (particularly the intelligence aspects) is significant for the following reasons: it highlights the centralized and colonial intelligence failures in a particularly frank and candid manner; it details channels of communication and liaison between London and the colonies which remain classified elsewhere; and it had a substantial impact on the subsequent reorganisation and reform of intelligence in Whitehall and across the British Empire.  相似文献   

11.
Accusations of failure by elements of the US intelligence community (IC) have followed in the wake of nearly every war and terrorist bombing since Japan's successful strike on Pearl Harbor in 1941. This article will illustrate how some problems that exist inside the ‘intelligence-policy nexus’ are beyond the control of the IC. By investigating the dynamics and tensions that exist between producers of intelligence (the IC) and the consumers of those products (policy-makers), we review three different types of alleged failure. First, by revisiting the Chinese intervention in Korea, we show that a rarely listed case in the literature is in fact a classic example of producer-based failure generated from within the IC. However, in our study of the Tet Offensive during the Vietnam War (1968), we show that the alleged intelligence failure by producers should be more accurately described as a ‘failure of intelligence’ by consumers. Third, by revisiting the Soviet invasion of Afghanistan (1979), we conclude that there existed neither a producer nor a consumer failure. The Carter Administration made a conscious policy choice to act surprised (when it was not).  相似文献   

12.
This article explores one of the earliest centrally organized state intelligence services in world history. Contrary to the orthodoxy that sees systematized intelligence as a modern political phenomenon, this was developed in early modern Venice. The article reveals the complex organization of Venetian systemized intelligence that distinguished it from other contemporaneous states’ espionage networks. It also shows how Venetian authorities commodified intelligence by engaging citizens and subjects in a trade of information for mutual benefits. Ultimately, the article challenges our understanding of early modern political communication and offers a fresh vista of intelligence as a business trait and economic necessity.  相似文献   

13.
Neutral Ireland posed a unique challenge to the wartime British intelligence community and the latter responded by adopting a dual approach. On the one hand, it carried out covert intelligence operations in Irish territory, involving the Service intelligence branches, the Ministry of Information, and, most importantly, the Secret Intelligence Service (SIS). On the other hand, unprecedented cooperation developed between military, police and intelligence agencies from Britain and Ireland, and in particular between MI5 and Irish military intelligence (G2). For most of the war British intelligence pursued this joint strategy of covert activity and official collaboration, and MI5 and SIS shared responsibility for Ireland. However, there was a gradual shift of emphasis towards cooperation and it was eventually concluded that the MI5-G2 link could serve all Britain's security needs. This article charts this evolution and places it within the context of Anglo-Irish wartime political relations.  相似文献   

14.
This article takes the view that largely impossible standards have been imposed on intelligence analysis, largely for political reasons stemming from the 9/11 attacks and Iraqi WMD. The article begins by examining the supposed lessons for intelligence analysis derived from these. It turns out that many of these widely accepted lessons have little basis and are, when compared, entirely contradictory from one case to the other. The article then reviews what the office of the Director of National Intelligence has done to make changes in analytical tradecraft and assesses whether these steps are likely to have a positive effect on future intelligence analysis. Finally, the article posits some ways in which analysis should be assessed and some of the impediments that will make this difficult even though it is necessary.  相似文献   

15.
This article examines the intersection of Big Data and strategic intelligence from a theoretical-conceptual viewpoint. Adopting Popperian refutation as a starting point, it approaches methodological issues surrounding the incorporation of Big Data into the intelligence cycle, and argues that Big Data analytics is best used to discern long-term developments, generate intelligence hypotheses, and adduce refuting facts. The article then briefly examines the use of Big Data via social media, an increasingly fertile platform for intelligence analysis. Finally, the article argues that despite its potential in filling our epistemic gaps, Big Data should continue to complement traditional subject-matter expertise, supported by game theory, as part of a tripartite analytical framework for strategic intelligence consisting of ‘subtext’, ‘context’ and ‘metatext’. In this respect, Big Data may well become the midwife for more open modes of intelligence management and, ultimately, a more open society.  相似文献   

16.
Abstract

Though community policing is widely promoted by donors and criticized by academics, there has been little research on its practice in Africa. This essay examines one of the main elements of community policing, namely community forums, in Freetown, Sierra Leone. They were examined from the point of view of the police, Partnership Board executives and local communities. The triangulation of response provided an evaluation of their strengths and weaknesses. Positively they have improved communication between police and communities and provided intelligence, investigation, intervention, arrest and dispute resolution. Negatively they are elite dominated and most of the activities, initiatives and even finance come from the community. Despite the difficulties, the Partnership Boards are universally valued and are not seen as unwelcome foreign imports.  相似文献   

17.
Incidents are the key data for several of the statistical reports and analyses created within the military intelligence community. This paper discusses factors that affect the utility of quantitative methods in military intelligence analysis when used in a low intensity conflict. The first half of the paper presents the general critique of the use of quantitative methods. The second half applies this critique to the case of incident reporting in Afghanistan.  相似文献   

18.
THOMAS H. HAMMOND 《管理》2007,20(3):401-422
The adoption of “smart practices” requires that smart practices can actually be identified for the areas of public policy in which we are interested. For the problem of designing structures for public agencies, however, identifying smart practices is not easy. This article explores the reasons for the substantial conservativism, lasting over 50 years, regarding the structural design of the U.S. intelligence community. One central argument is simply that it was very difficult to discover a clearly superior structure; in fact, the long‐standing structure may have had some unrecognized virtues. But the other central argument is that one smart practice may have emerged since the 9/11 attacks: It involves the creation of problem‐focused interagency centers that are intended to enhance the sharing and integration of information within the intelligence community. These conclusions about redesigning the structure of the intelligence community are based on the arguments of Luther Gulick on methods of departmentalization and Martin Landau on redundancy and system reliability.  相似文献   

19.
Lessons for the intelligence community were publicly identified in a 1983 report by Lord Franks and a 2004 report by Lord Butler. However, little is known of the lessons learned during the 20 years between the two. This article draws upon two newly released, previously classified, documents which examine British intelligence lessons from the 1990–91 Gulf War. It provides a previously untold account of the crisis, exclusively from a British intelligence perspective, and presents new evidence that intersects across many intelligence debates. This article also challenges whether identified lessons remained learned and begins to question the wider learning process within the intelligence community.  相似文献   

20.
This article examines attempts by the British intelligence community to improve the security arrangements of members of both the ‘old’ and ‘new’ Commonwealth in the post-war era. The process was regarded not only as a means of countering Communist subversion and protecting Britain's key relationship with the United States, but also as a way of entrenching British influence, particularly in countries nearing independence. The result of this process was a complex network of intelligence contacts reaching across the Commonwealth. Viewing this network from the perspective of the Federal Intelligence and Security Bureau (FISB), the intelligence organization of the Central African Federation, the article suggests that it offered both opportunities and dangers. It provided a potential channel for covert diplomacy. Yet it also threatened to undermine the credibility of Commonwealth intelligence chiefs whose links with the United Kingdom were perceived as being excessively close.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号