首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
Regulatory Errors with Endogenous Agendas   总被引:1,自引:0,他引:1  
How do a regulator's decisions depend on the characteristics and strategies of its external clients? We develop a theory of approval regulation in which an uninformed regulator may veto the submission of a better‐informed firm. The firm can perform publicly observable experiments to generate product information prior to submission. We find that when experimentation is short, Type I errors (approving bad products) are more likely for products submitted by firms with lower experimentation costs (larger firms), while Type II errors (rejecting good products) should be concentrated among smaller firms. These comparative statics are reversed when experimentation is long. We perform a statistical analysis on FDA approvals of new pharmaceutical products using two different measures of Type I error. We find consistent support for the counterintuitive hypothesis that, under particular conditions, errors are decreasing in the size of the firm submitting the product.  相似文献   

2.
This study explores an information interpretation explanation of strategic surprises using a non-traditional national security threat: a popular uprising. To explain why this type of assessments fail, I emphasize the role of information relevance when evaluating intelligence about civilian unrest. I posit that the dynamic nature of relevance is crucial for signals of popular dissent becoming dominant indicators that are incorporated into security assessments. A case study and observational data analysis of the Palestinian uprising (Intifada, 1987) demonstrate how information relevance contributed to the Israeli intelligence failure and how it affects the potential for strategic surprises facing a civilian threat.  相似文献   

3.
The twenty-first century's security environment has triggered a phenomenon of ‘proliferation’ of intelligence and security cooperation, both domestically and internationally. After the ousting of the communist regime (whose intelligence system served the regime) in 1989, Romania embarked upon democratic reform of its new intelligence system (including strengthening cooperation), to better tackle the current security challenges. This has been a rather onerous process, yet worthwhile: Romania's intelligence is presently cooperating well with national and international partners, to counter national, regional, and global security threats. This paper assesses Romania's efforts in developing intelligence cooperation, after the demise of the communist regime.  相似文献   

4.
American preemptive or preventive military action against WMD-armed adversaries in the future will simply not be feasible without high-quality and timely intelligence. But is American intelligence up to this load-bearing task for the post-11 September national security? This article surveys the Central Intelligence Agency's record of gauging potential WMD threats for more than a decade and assesses its overall performance as dismal. The CIA's recent intelligence debacle against Iraq was one of the greatest in a long series of failures that has publicly exposed the Agency's profound weaknesses. These intelligence failures were due in large measure to the CIA's poor human intelligence collection and shoddy analysis, areas that cannot be remedied alone by the creation of the new Director of National Intelligence post. This article recommends steps needed to increase the quality of intelligence produced by CIA, or elsewhere in the new intelligence community, to move American intelligence in lockstep with military transformation to give the Commander-in-Chief realistic options for countering hostile nation-states or terrorist groups seeking or acquiring WMD.  相似文献   

5.
This article argues that judicial and other institutions concerned with legal interpretation are playing an increasing role in regulating and defining the concept of national security for South Africa, particularly in the realm of national security information. Part I surveys the post-apartheid evolution of accountability of South Africa’s national security agencies with particular attention to the treatment of national security information. Starting from a low base, intelligence agencies in South Africa have become more accountable, in part through the greater degree of access to national security information. Part II portrays the placement of access to national security information within South Africa’s legislative framework, taking into account the keys laws underpinning both secrecy and disclosure regulation. Here, with no definition of national security on the secrecy side, it is on the disclosure side of South Africa’s legislative framework that the judiciary and other legal actors are crafting an operative definition of national security. Part III covers three recent developments, arguing that they demonstrate the increasingly important regulatory role played by the judiciary and other legal institutions. These include two key Constitutional Court decisions and an ongoing legislative reform effort.  相似文献   

6.
This article describes a new effort to engage in analytic outreach between academic scholars and intelligence analysts on the issue of emerging biotechnology threats to US national security. The context of this outreach was a September 2012 meeting in London to explore possibilities for enhanced analytic outreach in relation to emerging biotechnology threats, supported by the UK Genomics Policy and Research Forum. This meeting consisted of a mix of current and former intelligence practitioners and policy officials, and social science and scientific experts, from both the UK and the US. As will be described below, this unique pairing of experts and subjects revealed new insights into how to improve intelligence assessments on biotechnology and bioweapons threats. It also revealed continuing challenges in reforming assessments within existing intelligence work routines.  相似文献   

7.
This article uncovers a Caribbean Basin anti-communist intelligence network independent of the U.S. government and the international Cold War. Nicaraguan dictator Anastasio Somoza, Honduran dictator Tiburcio Carías, and Dominican dictator Rafael Trujillo characterized local democratic developments as communist threats to their regimes’ national security. With the 1947 Cayo Confites expedition and the 1948 Costa Rican Civil War, the military dictators coalesced into an informal network that increasingly shared intelligence. Joined by the Venezuelan military junta and Fulgencio Batista’s Cuban dictatorship, members nurtured a Caribbean Basin anti-communist domino theory characterising threats to one regime as a transnational danger to regional stability.  相似文献   

8.
Some public health crises and disasters represent threats to national security. In 2010 and 2011, Haiti experienced a cholera disaster surpassing all others in the world following a catastrophic earthquake. A novel integrated intelligence system, the Haiti Epidemic Advisory System (HEAS), provided critical information indicating the United Nations was the accidental source of the cholera disaster. This report reviews the operational context of the HEAS in relation to traditional public health surveillance and the role of intelligence in the determination of biological threat attribution.  相似文献   

9.
Many national security threats now originate on the Dark Web. As a result of the anonymity of these networks, researchers and policymakers often use supply-side data (i.e. the number of sites) as a threat metric. However, the utility of these data depends upon the underlying distribution of users. Users could be distributed uniformly, normally or in a power law across Dark Web content. The utility of supply-side counts varies predictably based upon the underlying distribution of users. Yet, the likelihood of each distribution type varies inversely with its utility: uniform distributions are most useful for intelligence purposes but least likely and power law distributions are least useful but occur most commonly. Complementing supply-side counts with demand-side measures can improve Dark Web threat analysis, thereby helping to combat terrorism, criminality and cyberattacks.  相似文献   

10.
In the winter 1978 issue of International Security, Raymond L. Garthoff authored a seminal article outlining common fallacies in United States government estimates of enemy intentions during the Cold War. Now, given the significant changes in threat over the past 30 years, it seems appropriate to take a fresh look at fallacies – evaluating old ones and introducing new ones – in enemy intentions estimates pertaining to post-Cold War (and post-9/11) security dangers. Based on its assessment, this article concludes that the challenges to accurate intelligence assessment of enemy intentions, and the need to move away from dysfunctional standard operating procedures, have never been higher.  相似文献   

11.
Theoretical work involves explanation and prediction, but thus far there has been little scholarly work explaining and predicting the role of intelligence analysts in support of foreign and national security policies. Without a theory of intelligence, it becomes difficult to decide what the appropriate substantive analytical responsibilities of the intelligence community should be. Accordingly, a theory of foreign intelligence analysis is necessary. This paper presents a theoretical framework developed during the immediate post-Cold War timeframe to explain why there was such a wide variety of perspectives regarding the future need for intelligence, embeds these ideas within the existing intelligence theory literature, applies this framework more generally in a way that can be used to explain variations in the substantive coverage of intelligence analysis in the past and predict possible variations in the future, and then tests the theory's ability to explain the analytical focus of domestic intelligence organizations.  相似文献   

12.
In the UK, the Joint Intelligence Committee (JIC) has a poor track record of predicting attack. In the US, official inquiries into 9/11 identified ‘a failure of imagination’ to conceive of a large scale threat to the American homeland. There is a long-standing literature on surprise attack which emphasizes that clues to predict attack often exist but are not pieced together by an intelligence sector which is not structured to look in the right direction. In a world of increasingly fragmented threats and weak signals, it is apparent that much of the challenge in intelligence work now lies not in collection but in managing requirements, setting priorities, and conducting incisive analysis based on the ability to imagine new threats. One solution to a failure of imagination is to widen the range of people who can contribute to the task. Non-Governmental analysis of security issues, whether by academia, civil society or the private sector, can help to identify emerging issues and set priorities. Whilst collection of secret intelligence may always remain the preserve of specialist Government agencies, the rest of the intelligence cycle can benefit from external contributions and open source intelligence. We argue that the process of setting intelligence requirements could be opened to a wider range of actors. In conflict environments, there may be particular value in an open process to identify what each side would need to know about the other to confidently seek peace.  相似文献   

13.
This article looks to answer the question of why the James Bond novels and films should matter to scholars of intelligence and national security. We argue that Bond is important because, rightly or wrongly, and not without inaccuracy, it has filled a public knowledge vacuum about intelligence agencies and security threats. On another level, this article explores the unexpected yet important interactions between Bond and the actual world of intelligence. We contend that the orthodoxy dictating that Bond and spying are diametric opposites—one is the stuff of fantasy, the other is reality—is problematic, for the worlds of Bond and real intelligence collide, overlap and intermesh in fascinating and significant ways. In short, Bond is important for scholars because he is an international cultural icon that continues to operate at the borders of fiction and reality, framing and constructing not only public perceptions but also to some degree intelligence practices. Core narratives of intelligence among not only the public but also policymakers and intelligence officers are imagined, sustained, deepened, produced and reproduced through and by Bond. We conclude that Bond and intelligence should be thought of as co-constitutive; the series shapes representations and perceptions of intelligence, but it also performs a productive role, influencing the behaviours of intelligence agencies themselves.  相似文献   

14.
The analysis examines the puzzle as to why the intelligence structures of South-East Asia largely failed to detect the evolving threat of violently inclined radical Islamic groups, despite the existence of elaborate and pervasive internal security arrangements within the states of the region. The article explores this issue by positing contending viewpoints about how authoritarianism in South-East Asia might have affected the awareness of such threats. Answers to these questions enable an assessment of the current ASEAN response to the ‘war on terrorism’ and to discern whether South-East Asia's elites will move either to improve the quality of their intelligence and threat analysis in the future, or whether they will, instead, extend the instruments of authoritarian rule, further curtailing civil and political space under the rubric of combating terrorism. The evidence so far suggests that the latter outcome is the more likely.  相似文献   

15.
In this article we seek to address the emerging role of the European Union (EU) as a security and intelligence actor from the perspective of counter-terrorism. Intelligence as a process and product has been strongly promoted by the EU as a useful and necessary tool in the fight against terrorism, radicalization, organized crime and public order problems. A range of agencies has been established that collect, analyze and operationalize intelligence in view of strategically defined security threats. Examples are Europol and Frontex. This article makes an inventory of their roles and competences in the field of intelligence and looks at the list of instruments that encourage the sharing of intelligence between different law enforcement and security agencies. Moreover, it is argued in this article that as intelligence becomes more hybrid and as the EU only holds light powers of oversight on ownership and integrity of data, considerable governance challenges lurk around the corner. As ‘intelligence’ is usually a complex and sensitive product, it often travels outside formal bureaucratic channels, which undermines accountability and transparency of where, how and for what purpose the intelligence was gathered.  相似文献   

16.
Paradoxically, the greater the national security threats, the more important the role of local policy in the United States. In this article we examine homeland security initiatives—particularly the tension between risk and vulnerability—and the governance dilemmas they pose for local communities. In contrast to the usual emphasis on coordination and capacity, we argue for conceptualizing local imperatives attendant to homeland security as collective action problems requiring the construction of local performance regimes. Performance regimes must engage three challenges: (1) to enlist diverse stakeholders around a collective local security goal despite varying perceptions of its immediacy; (2) to persuade participants to sustain their involvement in the face of competing demands, and (3) to create a durable coalition around performance goals necessary for reducing local vulnerability. Using these analytic categories casts local homeland security issues in strategic terms; it also encourages comparisons of local governance arrangements to respond to risk and vulnerability.  相似文献   

17.
Abstract The national Councils for Security Cooperation in the Asia-Pacific (CSCAPs) are fine exemplars of Track II security diplomacy whose mission is to prepare studies on security matters for their governmental Track I counterparts in the ASEAN Regional Forum (ARF). The CSCAPs also provide a test of propositions drawn from the epistemic community literature in inter-national relations which posits that non-governmental experts can influence government decision-making. This study of CSCAP activities and their impact on the ARF provides some support for epistemic community propositions. However, other findings suggest that epistemic community theory requires modification to take account of the blurred line between Tracks I and II in CSCAP. Nevertheless, the CSCAPs have achieved some noteworthy successes, including a definition of preventive diplomacy adopted by the ARF. On balance, then, Track II epistemic communities are playing a significant role in Track I security deliberations in the Asia-Pacific.  相似文献   

18.
International economic issues have become a foremost government concern since the start of the global financial crisis, leaving economic security increasingly linked to more traditional concepts of national interest and politico-military security. This prioritization has been reflected in the recent requirements of the United Kingdom's intelligence and security actors. Yet, scholarly research has neglected the relationship between intelligence, international economics, and contemporary security policy. Taking current requirements as a catalyst, this article draws on contemporary British history to explore when intelligence can be used to protect economic security and when intelligence actors can best use economic measures to achieve broader politico-military goals. The use of secret intelligence in the economic sphere does, however, have certain limitations and it should therefore only be employed when necessary.  相似文献   

19.
In the debate on intelligence contracting, intelligence officers are grouped into two personnel categories characterized by opposing sets of motivations and interests. Government employees are assumed to be motivated by a higher goal related to national security, while intelligence contractors are said to be motivated primarily by pecuniary interests and loyal first and foremost to their shareholders. Contemporary research on human motivation, however, suggests that the two personnel categories are not all that different in that both appear to be intrinsically motivated and loyal primarily to the mission at hand, namely national security. Moreover, comparative research on public organizations and private corporations suggests that there are more similarities between the two than there are differences. This must lead us to re-examine the recent criticism fielded against the practice of intelligence contracting.  相似文献   

20.
The events in East Timor leading up to and immediately following the vote for independence from Indonesia in September 1999, and the attendant breach in Australian-Indonesian relations, posed the greatest challenge to the Australian intelligence agencies and the national security policymaking organization in more than a quarter of a century. On the whole, the intelligence agencies performed very well, producing timely, accurate and informative reports, with the important exception being the under-estimation of the scale of the killings and forced deportations in the fortnight after 4 September, 1999. However, there were serious deficiencies in the national security policy-making organization, and elements of the intelligence community succumbed to political pressures when the Government found some of the intelligence about Indonesian involvement in planning and directing the violence to be unpalatable.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号