首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
Professor Goodman analyses the failure of US intelligence prior to 9/11 setting the context in the 1980s and 1990s. He dissects the flaws of the CIA, FBI and the Pentagon. He argues that the State Department should be strengthened because its capabilities are the most important. He also recommends that the FBI be split in two and that the CIA's budget be disclosed.  相似文献   

2.
From the wartime Office of Strategic Services to the contemporary Central Intelligence Agency (CIA), women have played a key role in US national intelligence. Yet, aside from episodic attention to the especially colorful lives of individual spies or analysts, few resources have been available to assess the broader status and service of these women. On 30 October 2013, the Central Intelligence Agency released the document collection From Typist to Trailblazer: The Evolving View of Women in the CIA's Workforce, a set of declassified files related to women's employment at the agency. This essay places these documents – which include personnel files, interagency memoranda, and internal CIA surveys and studies – into their broader institutional and social contexts, arguing that, despite the slow pace of change, CIA has made significant progress in addressing sex discrimination within its ranks.  相似文献   

3.
The transformation of intelligence architectures, particularly in the West, is no less profound than that of the weapons, platforms, warfighting systems and governments they are designed to support and inform. Moreover, the cumulative weight of the changes in prospect will redefine the way in which intelligence is used and conceived. The old demarcation lines between strategic and operational intelligence and between operations and intelligence, once starkly differentiated will blur. Decision-makers will have better access to intelligence as a result of advances in ‘pull’ technology which have made possible intelligence on demand while open source intelligence will enrich and add value to national intelligence databases.

Although information will become more plentiful and less of a privileged source in the global information environment of the twenty-first century, paradoxically the demand for timely, high quality strategic and operational intelligence will intensify rather than diminish. What will distinguish the successful practitioners of twenty-first century intelligence is the ability to fuse and integrate all elements of the process to provide seamless support for policy-makers and operational commanders. However, despite impressive advances in integration, technical collection and communications no intelligence system, no matter how efficacious, will ever be able to completely dispel the fog of war.  相似文献   

4.
There is an inherent tension between a law enforcement–driven approach and a requirementsdriven approach to intelligence collection. The US experience, with the development of the Federal Bureau of Investigation(FBI), as the primary intelligence service within the domestic environment, suggests that the tension is nearly insurmountable if an organization starts from a reactive, threat-focused posture. As a law-enforcement agency, which US government decision-makers expect to fulfill an intelligence function, the FBI is triply handicapped by the external strictures of the Department of Justice (DoJ); the Bureau’s own policies – which respond to the DoJ parameters; and the FBI’s organizational culture.  相似文献   

5.
Abstract

In the nearly 15 years since the events of 11 September 2001, the Federal Bureau of Investigation (FBI) has undertaken a succession of efforts to become an agency capable of fulfilling the intelligence functions with which it has been entrusted. However, historically, the FBI’s experience with intelligence has been reactive due to a law enforcement culture that closed cases rather than identified ways to keep opportunities for collection open, as well as bureaucratic wariness due to the differing expectations from one Presidential administration to the next. The Threat Review and Prioritization (TRP) process is the most recent iteration of the Bureau’s attempt to organize as an intelligence service. However, TRP is informed not by a mission of developing intelligence that will help to disrupt emerging threats or exploit opportunities at both the strategic (policymaking) and tactical (arrests), but instead reactively focuses on the threats which have become fully manifest within the FBI’s own domain. TRP leaves the US at a disadvantage vis-à-vis state and non-state adversaries and competitors. Organizationally, it institutionalizes the shortcomings of reactivity and insularity that were the unfortunate characteristics of the pre-9/11 FBI.  相似文献   

6.
Despite outward appearances, the CIA's evolution between 1945 and 1953 was influenced by two objective investigations – the Eberstadt Task Force and Dulles Commission – and was accelerated, but not instigated, by the shock of the Korean War. The role of these two investigations, which ultimately resulted in NSC 50 and the establishment of the CIA as a viable member of the US intelligence community, has been overlooked in recent literature. While these panels played a critical role in shaping the CIA's organization during this period, the Truman administration never achieved its goal of establishing a truly ‘central’ intelligence organization. This article examines the formation of the CIA, discusses both reports, national policy changes enacted in response, and relevance to the US intelligence community's current operations.  相似文献   

7.
Abstract

As the professional practice of intelligence collection adapts to the changing environment and new threats of the twenty-first century, many academic experts and intelligence professionals call for a coherent ethical framework that outlines exactly when, by what means and to what ends intelligence is justified. Reports of abuse at detention centres such as Guantanamo Bay and Abu Ghraib, the ever increasing use of technological surveillance, and the increased attention on the use of torture for intelligence collection purposes have all highlighted a need to make an explicit statement about what is and what is not permissible intelligence practice. In this article an ethical framework will be established which will outline under what circumstances the use of different intelligence collection activities would be permissible. This ethical framework will first underline what it is about intelligence collection that is ‘harmful’ and, therefore, should be prohibited under normal circumstances. The ethical framework then outlines a set of ‘just intelligence principles’, based on the just war tradition, which delineate when the harm caused can be justified. As a result, this article outlines a systemic ethical framework that makes it possible to understand when intelligence collection is prohibited and when it is permissible.  相似文献   

8.
Intelligence is widely misunderstood. Too much is made of secrecy, and of covert operations and counter-intelligence (action domains informed by intelligence rather than integral to it). Intelligence is often focused on threats, missing opportunities for advantage. A standard definition is proposed for better understanding of intelligence by the academy, media and public. Intelligence is a corporate capability to forecast change in time to do something about it. The capability involves foresight and insight, and is intended to identify impending change which may be positive, representing opportunity, or negative, representing threat. Definitions which converge with this proposal are found in several intelligence settings.  相似文献   

9.
American preemptive or preventive military action against WMD-armed adversaries in the future will simply not be feasible without high-quality and timely intelligence. But is American intelligence up to this load-bearing task for the post-11 September national security? This article surveys the Central Intelligence Agency's record of gauging potential WMD threats for more than a decade and assesses its overall performance as dismal. The CIA's recent intelligence debacle against Iraq was one of the greatest in a long series of failures that has publicly exposed the Agency's profound weaknesses. These intelligence failures were due in large measure to the CIA's poor human intelligence collection and shoddy analysis, areas that cannot be remedied alone by the creation of the new Director of National Intelligence post. This article recommends steps needed to increase the quality of intelligence produced by CIA, or elsewhere in the new intelligence community, to move American intelligence in lockstep with military transformation to give the Commander-in-Chief realistic options for countering hostile nation-states or terrorist groups seeking or acquiring WMD.  相似文献   

10.
ABSTRACT

How does one design and sustain interdisciplinary, cross-sector collaboration to improve intelligence results for twenty-first century security threats? This paper will analyse five past and present initiatives designed to create interdisciplinary, cross-sectoral collaboration within different agencies of the US Intelligence Community (IC). We will discuss key features of each effort, their successes and challenges, identify common themes and, propose which collaborative model might be most advantageous for a particular type of project based on project constraints. In so doing, we provide direction for IC leaders seeking to improve academia–industry–intelligence partnerships for future planning on intelligence-funded collaborations.  相似文献   

11.
Public discussion about the 11 September 2001 terrorist attacks has focused on the human causes of tragedy – on individual mistakes, failures of leadership, and the power plays between intelligence officers in the field and policymakers in Washington. But closer examination of the FBI suggests that organizational weaknesses are the root cause of poor agency performance. Longstanding deficiencies in the FBI's organizational structure, culture, and incentive systems proved crippling in the 1990s, when the Cold War ended and the terrorist threat emerged. These lingering weaknesses ultimately prevented the bureau from capitalizing on 12 separate opportunities that might have disrupted the 9/11 plot.  相似文献   

12.
《Strategic Comments》2013,19(1):iv-vi
On 11 January 2013 France initiated military operations against Islamist rebels in Mali in order ‘to stop the terrorist aggression … make Bamako safe … and enable Mali to recover its territorial integrity’. It hopes that the current ground and air offensive will be limited in duration. But this will depend on several factors, including the effectiveness of its planning and intelligence, and the tactics of the opposition. If Bamako is to reassert its authority over the country's ungoverned north, the capacity of Mali's military will need to be dramatically enhanced.  相似文献   

13.
British intelligence in Ireland between 1919 and 1921 has been characterized as a toxic mix of incompetence and mendacity. This article will challenge this judgement by examining the activities, impact and consequences of a British civil servant, Alfred Cope, who between 1920 and 1921 was an Assistant Under Secretary in Dublin Castle. Using the three criteria of counter-intelligence operations: the ability to locate, identify and neutralize a target, it will be shown that within months of his posting to Dublin British intelligence, albeit inadvertently, had located and identified him as passing classified information to Sinn Fein. Political patronage meant the ability of the intelligence community to neutralize his impact was nugatory. Latterly Cope recognized the consequences of his actions reverberated beyond the period of his time in Ireland.  相似文献   

14.
This essay argues that, since 1989, the CIA has been slow to understand the transformative impact of globalization upon its own activities as an intelligence agency. While the CIA spent considerable time examining global trends as part of its work on generalized strategic analysis, its thinking about how globalization would change its own business was less prescient. This problem is explained in terms of the way in which debates over the CIA have been framed historiographically. While intelligence studies as a subject has been successfully integrated into mainstream international history, it has failed to make the same connections with international relations. As a result, those debating how intelligence might change have tended to focus quite narrowly on matters of bureaucratic organization and have taken only limited interest in global politics. This is stark contrast to those working on the subject of terrorism and counter-terrorism, who have engaged in wider debates about world affairs. This needs to change, since the perils of globalization remain the over-arching challenge for the CIA over the next ten years.  相似文献   

15.
In counter-revolutionary warfare strategy, political action forms the overwhelming part; however, also central as an off-shoot of the tenets of counter-revolutionary warfare is the elimination of insurgent structures – generally a euphemism for assassination. In reality, assassination is a subset of covert paramilitary action, implemented as a consequence of counter-intelligence or even counter-terrorism. South Africa's Security Branch presents one of the best recent examples of the use of counter-intelligence techniques for counter-revolutionary warfare. While politico-constitutional intelligence was gathered by the National Intelligence Service to support constitutional efforts to achieve a settlement of the conflict and bring about a new political dispensation in South Africa, the apartheid government relied on the covert operational capabilities of the security forces (especially the Security Branch) to not only halt the ‘Revolutionary Onslaught’ of the liberation movements, but to eliminate them as a viable political and revolutionary force. In attempting to support an unwinnable political objective, the ultimate corruption of the intelligence process and the reliance of individuals overseeing it far and away on the covert operational intelligence capabilities of the state, the apartheid government brought about its own downfall. The Security Branch was at the heart of these efforts.  相似文献   

16.
This article examines the way in which intelligence was used by Israel in its war against Hizb'allah in south Lebanon. By using ideas drawn from the literature on strategic culture, it argues that in trying to replicate methods used in countering Palestinian insurgents, Israel's intelligence agencies failed to appreciate fully the finite political aims of Hizb'allah's guerrilla struggle. As such, the paucity in Israel's collective intelligence effort allowed operatives of Hizb'allah's military wing, al-Muqawama, to score notable intelligence triumphs over Israel, triumphs that did much force the IDF into a unilateral withdrawal from south Lebanon in May 2000.  相似文献   

17.
In the modern era, almost all intelligence professionals will study the Intelligence Cycle as a kind of gospel of how intelligence functions. Yet it is not a particularly good model, since the cyclical pattern does not describe what really happens. Policy officials rarely give collection guidance. Collection and analysis, which are supposed to work in tandem, in fact work more properly in parallel. Finally, the idea that decision makers wait for the delivery of intelligence before making policy decisions is equally incorrect. In the modern era, policy officials seem to want intelligence to support policy rather than to inform it. The Intelligence Cycle also fails to consider either counter-intelligence or covert action. Taken as a whole, the cycle concept is a flawed model, but nevertheless continues to be taught in the US and around the world.  相似文献   

18.
In 1947, the United States created a modern intelligence community to guard against another surprise attack like the one at Pearl Harbor. This community consists of 13 major agencies, among them the CIA and the FBI. Concealed from public view, they pose a significant challenge to the concept of government accountability in a democratic society. This article examines the failure of congressional lawmakers to hold the secret agencies accountable during the Cold War. Contrary to recent theoretical research on legislative oversight, which suggests reasons that accountability has been strong in the United States, this study finds that a weak system of legislative review has permitted a dangerous erosion of civil liberties. The study also explores the efforts of the Church Committee in 1975 to fashion new safeguards that would reduce the probability of further abuse of power by the intelligence community.  相似文献   

19.
A recent review of restructuring efforts at the Federal Bureau of Investigation published by the National Academy of Public Administration examines several studies that precipitated the reorganization and discusses the current state of counterterrorism, intelligence, and internal security functions within the agency. However, the report fails to seriously engage the benefits of restructuring federal agencies to separate criminal investigation from antiterrorism or to address the financial implications of the current reorganization. Although it provides a useful overview of current changes within the FBI, it lacks theoretical linkages.  相似文献   

20.
The twenty-first century's security environment has triggered a phenomenon of ‘proliferation’ of intelligence and security cooperation, both domestically and internationally. After the ousting of the communist regime (whose intelligence system served the regime) in 1989, Romania embarked upon democratic reform of its new intelligence system (including strengthening cooperation), to better tackle the current security challenges. This has been a rather onerous process, yet worthwhile: Romania's intelligence is presently cooperating well with national and international partners, to counter national, regional, and global security threats. This paper assesses Romania's efforts in developing intelligence cooperation, after the demise of the communist regime.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号