首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
This article examines how Great Britain helped create Pakistan’s Inter-Services Intelligence Directorate (ISI) with two goals: (1) establishing a Pakistani branch of a Commonwealth intelligence network; (2) ensuring information security within that network. Ultimately, this endeavor failed because of perceived deficiencies in Pakistan’s security institutions and Britain’s inability to address Pakistan’s security needs. By the mid-1950s ISI forged close ties with the United States which offered more and with fewer political strings attached. This article offers new insights on intelligence alliance formation during the cold war. It also provides a useful case study in the weaknesses of multilateral intelligence coalitions.  相似文献   

4.
Revelations of corruption and of maladministration have forced a re‐examination of some of the basic characteristics of the Greek party‐state and party system. The purpose of this article is to examine how the controversies ‐ ‘scandals’ ‐ arose, and to assess their consequences for political development in Greece in the light of the June 1989 national elections. The elections may prove critical for the evolution of the State and the party system.  相似文献   

5.
6.
《Strategic Comments》2020,26(1):vii-ix
The threat to public security and the rule of law posed by drug cartels has been the defining domestic issue for Mexico’s presidents for over a decade. The Mexican people hoped security would improve when they elected an outsider president in late 2018 who promoted a new idea for pacifying the cartels – ‘hugs, not bullets’ – but the situation continues to deteriorate.  相似文献   

7.
Many intelligence services around the world maintain mechanisms intended to help minimize the risk of erroneous intelligence assessments. One of the best-known mechanisms is the ‘devil’s advocate’ whose goal is to present – sometimes artificially – an intelligence assessment that contradicts the prevailing view. The goal of this practice is to try to encourage doubts, both among intelligence assessors and among decision-makers. This paper will describe the importance and function of the 'devil’s advocate' mechanism in intelligence. Using Israel as a test case, the paper will seek to draw conclusions regarding the desirable format of operations of this mechanism.  相似文献   

8.
9.
10.
11.
George W. Bush has claimed that the latest intelligence estimates single out Iran, Iraq, and North Korea as an ‘axis of evil’ fomenting terrorism and weapons of mass destruction. However, the intelligence itself demonstrates that this concept has been largely manufactured and the CIA bypassed in favor of a pre-existing political consensus among right-wing Republicans. In reality, the ‘axis’ serves to perpetuate an American ‘preponderance of power’. It justifies specific policies which had already been decided before Bush came to power and which now have popular acceptance through their association with the successful war on terrorism.  相似文献   

12.
13.
This paper seeks to contribute to a number of debates that have attracted scholarly attention over the last few years. Firstly, by examining the experiences of the Swiss foreign intelligence service, the paper takes issue with what one scholar has dubbed ‘intelligence history snobbery’; a process that has privileged the study of the major powers and overlooked the contribution made to the secret world by the intelligence agencies of small states. Secondly, the paper explores the extent to which a state's engagement in the secret world is affected by its preconceived ideas over its place and standing in the international community. It asks whether the behaviour of a neutral foreign intelligence service is likely to differ from that of any other ‘small’ state, and whether neutrals can be both honest brokers in international affairs, and earnest players in the field of secret intelligence. The final section of the paper looks at the impact of the end of the Cold War and the emerging ‘global war on terror’ on the shape of the Swiss intelligence community.  相似文献   

14.
《Patterns of Prejudice》2012,46(1):51-63
The phenomenon of ‘social antisemitism’ is well known. By the beginning of the twentieth century, however, an idiosyncratic variant had emerged in France. Where, elsewhere, social antisemitism tended to be ingrained and unthinking, this French variant was (typically) more theoretical, and its practitioners tended to be among the most prominent authors and thinkers. It stressed the essential cultural differences between the ‘French’ and the ‘Israelites’, and the ‘separateness’ of the Jews within France, and also developed a series of facile generalizations about the essentially inferior nature of the Jewish intellect. Griffiths examines this phenomenon, both for its characteristics and for its widespread existence in French intellectual circles, by taking a specific subject: the reception of Lacretelle’s 1922 novel Silbermann. A wide range of writers and critics—a number of whom had in other circumstances a reputation for liberal values and attitudes, and had been among those who had deplored the excesses of the antisemitic mob during the Dreyfus affair—are found to echo the views put forward by Lacretelle in that novel, and even to elaborate on them. Many of these writers were to adopt a completely different attitude towards the Jews after the Second World War; when the position of the Jews was fully realized, their earlier ‘social antisemitism’ proved less powerful than their human sympathies. But this is not to devalue the importance of the danger posed by social antisemitism, which could provide the basis for far more virulent forms of racism to flourish.  相似文献   

15.
John N. Gentry argues that Violent Non-State Actors, such as insurgencies or terrorist groups, use intelligence in three ways. First and foremost, they employ intelligence to plan physical military attacks and to protect themselves from penetration and attack by government forces. Secondly, they use counterintelligence in order to ensure the survival of the insurgency and preserve the faith of their members by enforcing ideological discipline. Finally, they use information operations to shape their operational environments. This article seeks to determine what type of intelligence the Greek insurgents employed during the civil war and whether this insurgency fits Gentry’s model.  相似文献   

16.
In 2003 the Pentagon's Office of Special Plans employed a hypothesis-based methodology to deliver the now discredited intelligence that justified the Iraq war. The 1976 ‘Team B’, which was also heavily influenced by neoconservatives and used the same methodology, has been recognized as a precedent. There is, however, another precedent, the 1998 Rumsfeld Commission, which challenged CIA predictions on the ballistic missile threat to the US. Lobbied for by many of the same conservatives and neoconservatives, the Commission used the same analytical style as Team B and the OSP. The now discredited intelligence on Iraq was not a ‘failure’ or ‘mistake’, but a method, tried and tested by the right, of challenging the CIA on political grounds.  相似文献   

17.
This article examines the efforts of French and British intelligence services to assess the German economy before and during the opening stage of World War II. The French and British, attached to a long‐war strategy based on the assumption time worked in their favour, looked to economic intelligence to indicate whether this was in fact the case. Yet for a variety of reasons clear and consistent assessments were impossible. Rather than accept uncertainty, the French and British chose to impose certainty by assuming the worst, a decision which contributed to the abandonment of a long‐war strategy as the Allies began to search for some way to win a short war.  相似文献   

18.
In the age of ‘Big Data’, the potential value of open-source information for intelligence-related purposes is widely recognised. Of late, progress in this space has increasingly become associated with software that can expand our ability to gather, filter, interrelate and manipulate data through automated processes. The trend towards automation is both innovative and necessary. However, techno-centric efforts to replace human analysts with finely crafted algorithms across the board, from collection to synthesis and analysis of information, risk limiting the potential of OSINT rather than increasing its scope and impact. Effective OSINT systems must be carefully designed to facilitate complementarity, exploit the strengths, and mitigate the weaknesses of both human analysts and software solutions, obtaining the best contribution from both. Drawing on insights from the field of cognitive engineering, this article considers at a conceptual level how this might be achieved.  相似文献   

19.
China’s Belt and Road Initiative and its associated domestic industrial policies represent a parallel trade and investment strategy that challenges the Akamatsu principle of the Flying Geese pattern of industrial development in East Asia. This paper is positioned against the dominant orthodox theory of national systems of industrial development in East Asia. It argues that China’s trade and industry policy in the 2012–2017 period has demonstrated that government will expand its industrial policy market intervention rather than retract, moving away from the regional economic integration order by moving industrial production and import trade away from the Asia-Pacific along a Westward axis to the Indian Ocean and Eurasia. Implications are that the emergence of China’s geoindustrial policy will subvert multilateral trade norms as China begins to institutionalise its external trade and industrial policies.  相似文献   

20.
This article contributes to the debate on the politicization of intelligence with a case study of a major attempt of politicization that so far largely escaped academic attention: the Special National Intelligence Estimate on the Soviet Union’s role in international terrorism produced by the US Intelligence Community in spring 1981. Despite direct and indirect manipulation by members of President Reagan’s Cabinet, this case differs from those usually discussed in a decisive way – politicization failed. Based on the empirical analysis, a theoretical model of intelligence politicization is introduced that extends Joshua Rovner’s oversell model, which can explain why policymakers demand intelligence support but is insufficient due to its exclusive focus on the consumers of intelligence, by integrating the incentives of intelligence producers and specifying the determinants of whether politicization succeeds or fails.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号