Download or read book Managing the Private Spies written by Glenn James Voelz and published by Military Bookshop. This book was released on 2013-08 with total page 88 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book Managing the Private Spies written by Glenn James Voelz and published by . This book was released on 2006 with total page 79 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book Managing the Private Spies written by Glenn James Voelz and published by Createspace Independent Publishing Platform. This book was released on 2016-01-26 with total page 88 pages. Available in PDF, EPUB and Kindle. Book excerpt: The Abu Ghraib prison scandal cast a spotlight on the use of contractors to perform functions normally associated with military personnel, and all the contracting, control, discipline, and training issues associated therewith. The sometimes-overheated rhetoric of the press created an impression that the use of contractor personnel to perform functions traditionally considered to be the realm of uniformed personnel was something new and extraordinary. It is neither, though the number of intelligence-related functions performed by contractors during combat operations in Iraq and Afghanistan may, indeed, be unprecedented. The extensive use of contractor personnel to augment military intelligence operations is now an established fact of life and, occasional contracting "scandals" notwithstanding, any effective and efficient design for intelligence support to operating forces must provide for their use. The civilian sector can respond to rapidly changing requirements of the Global War on Terror with flexibility and speed that the government sector does not possess. And, in a number of cases, the civilian sector possesses technology, equipment, and technological know-how that the government sector could not acquire in any reasonable amount of time. Add to this the problem of end-strength limitations and recruiting and retention problems, and it is apparent that contractors are a permanent part of the intelligence landscape. But this dependence on contractors comes with its own set of problems, most of which stem from inadequate planning and from lack of training of deployed uniformed personnel in the intricacies of contracting for and administering contractor personnel. The author points out certain steps that must be taken to provide for effective management of contractor personnel in the field. Yet uniformed intelligence personnel continue to be deployed without adequate training and preparation to handle contractors who will be supporting them.
Download or read book Managing the Private Spies Use of Commercial Augmentation for Intelligence Operations written by Joint Military Joint Military Intelligence College and published by CreateSpace. This book was released on 2014-05-11 with total page 82 pages. Available in PDF, EPUB and Kindle. Book excerpt: The end of the Cold War presented a paradoxical dilemma for the Intelligence Community (IC). The demise of the Soviet Union brought about a significant downsizing of the nation's intelligence apparatus while concurrently necessitating a major reallocation of intelligence resources to cover a more complex array of trans-national threats such as counter-proliferation, terrorism, organized crime, drug trafficking, and ethnopolitical conflict. The combination of shrinking budgets and expanding analytical requirements placed enormous demands on the Community. Among the most pressing challenges was the need for an on-demand, surged intelligence capability for coverage over a diverse range of operational requirements. A key recommendation of a 1996 House Permanent Select Committee investigation of the nation's intelligence capabilities called for the creation of a dynamic surge capacity for crisis response. The Committee concluded that such resources "need not be self-contained within the IC," but must be quickly marshaled "without undue concerns about who owns the assets." Several other independent reform studies at the time proposed initiatives to satisfy surged collection demands by leveraging nongovernmental resources. Despite these recommendations, during the 1990s there was little effort to create such a surge capacity. Bureaucratic inertia and lack of clear consensus on an intelligence reform agenda made major initiatives impossible. With the enormous intelligence demands of the Global War on Terrorism (GWOT) the issue of surge capacity has reemerged as a critical issue for community leaders. Collection management, remote sensing, linguistic support, document exploitation, interrogation, and technical analysis are just some intelligence support functions currently being performed by private contractors. This ad hoc response to meet the intelligence requirements of GWOT operations has produced mixed results. One report strongly recommended the permanent integration of commercial imagery products into the conventional collection management cycle for operational commanders. Conversely, a key fi nding of the Army Inspector General's report on OIF detainee operations in Iraq clearly identifi ed poor training and misuse of contract interrogators as a contributing factor in detainee abuse. These examples speak to both the promise and the liability of utilizing commercial augmentation for intelligence surge capacity. Given the current mismatch between operational requirements and intelligence force structure, there will be continuing reliance on commercial augmentation. As critical intelligence requirements are increasingly resourced through commercial augmentation, IC leaders must determine the appropriate roles for private sector firms and provide effective plans for legal oversight, operational integration, and management of contracted support. To date, few studies have adequately considered the policy implications of integrating non-governmental providers into the operational intelligence cycle. GWOT operations have required significant reliance on private sector resources for intelligence collection and analysis but have done so without sufficient measures for effective acquisition, management and accountability over commercial providers. This study assesses the value of current commercial activities used within DoD elements of the Intelligence Community, particularly dealing with operational functions such as analysis, collection management, document exploitation, interrogation, production, and linguistic support. These functions were selected due to the extensive use of commercial augmentation in these areas during recent GWOT operations.
Download or read book Managing the Private Spies written by Glenn James Voelz and published by Glenn Voelz. This book was released on 2006 with total page 66 pages. Available in PDF, EPUB and Kindle. Book excerpt: The extensive use of contractor personnel to augment military intelligence operations is now an established fact of life and, occasional contracting scandals notwithstanding, any effective and effi cient design for intelligence support to operating forces must provide for their use. The author suggests evaluation standards for the use of contractors and possible long-term initiatives to reduce dependence on traditional outside contractors.
Download or read book Publications Combined Over 20 National Intelligence University Studies Focusing On Domestic Intelligence written by and published by Jeffrey Frank Jones. This book was released on with total page 3377 pages. Available in PDF, EPUB and Kindle. Book excerpt: Over 3,300 total pages …. Introduction: The National Intelligence University is the Intelligence Community’s sole accredited, federal degree-granting institution. The main campus is located in Bethesda, MD and it also has Academic Centers located around the world. The faculty of NIU are subject matter experts from around the intelligence community who bring a wealth of knowledge and practical experience, as well as academic qualifications, to the classroom. Included titles: BRINGING INTELLIGENCE ABOUT Practitioners Reflect on Best Practices ANTICIPATING SURPRISE Analysis for Strategic Warning Learning With Professionals: Selected Works from the Joint Military Intelligence College THE CREATION OF THE NATIONAL IMAGERY AND MAPPING AGENCY: CONGRESS’S ROLE AS OVERSEER The Coast Guard Intelligence Program Enters the Intelligence Community A Case Study of Congressional Influence on Intelligence Community Evolution THE BLUE PLANET INFORMAL INTERNATIONAL POLICE NETWORKS AND NATIONAL INTELLIGENCE TEACHING INTELLIGENCE AT COLLEGES AND UNIVERSITIES SHAKESPEARE FOR ANALYSTS: LITERATURE AND INTELLIGENCE Out of Bounds: Innovation and Change in Law Enforcement Intelligence Analysis Managing the Private Spies Use of Commercial Augmentation for Intelligence Operations Intelligence Professionalism in the Americas Y: The Sources of Islamic Revolutionary Conduct GLOBAL WAR ON TERRORISM: ANALYZING THE STRATEGIC THREAT SENSEMAKING - A STRUCTURE FOR AN INTELLIGENCE REVOLUTION Finding Leaders Preparing the Intelligence Community for Succession Management EXPERIENCES TO GO: TEACHING WITH INTELLIGENCE CASE STUDIES Democratization of Intelligence Crime Scene Intelligence An Experiment in Forensic Entomology BENEATH THE SURFACE INTELLIGENCE PREPARATION OF THE BATTLESPACE for COUNTERTERRORISM A FLOURISHING CRAFT: TEACHING INTELLIGENCE STUDIES INTELLIGENCE ANALYSIS IN THEATER JOINT INTELLIGENCE CENTERS: AN EXPERIMENT IN APPLYING STRUCTURED METHODS The Common Competencies for State, Local, and Tribal Intelligence Analysts
Download or read book Our Good Name written by J. Phillip London and published by Simon and Schuster. This book was released on 2010-11-30 with total page 527 pages. Available in PDF, EPUB and Kindle. Book excerpt: The Crisis That Rocked a Country and a Company... In April 2004, an illegally leaked U.S. Army report thrust CACI, an information technology company, into the international spotlight by casting suspicion on a CACI employee for being "either directly or indirectly responsible" for the mistreatment of detainees at Abu Ghraib prison in Iraq. At the same time, pictures from the abuses were shown on national television and tarnished anyone associated with Abu Ghraib--including CACI. What ensued was a media frenzy rarely seen by any company in recent decades. The media twisted the unsupported allegations into a guilty verdict without regard for the facts or the truth, creating a damning public perception of CACI. Our Good Name recounts how CACI battled to defend itself against erroneous and malicious reports by a rampaging media, how it responded to the wide-ranging government investigations, and how it overcame misplaced anger and criticism that put the company's dedicated employees and excellent reputation--even it's future--at risk. Our Good Name is CACI's story of facing one of the biggest scandals in recent history...and coming out honorably with its head high.
Download or read book Interagency Collaborative Arrangements and Activities Types Rationales Considerations written by and published by DIANE Publishing. This book was released on 2011 with total page 37 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book Beyond States and Spies written by Lewis Sage-Passant and published by Edinburgh University Press. This book was released on with total page 386 pages. Available in PDF, EPUB and Kindle. Book excerpt: Scholars have long viewed intelligence as the preserve of nation states. Where the term 'private sector intelligence' is used, the focus has been overwhelmingly on government contractors. As such, a crucial aspect of intelligence power has been overlooked: the use of intelligence by corporations to navigate and influence the world. Where there has been academic scrutiny of the field, it is seen as a post-9/11 phenomenon, and that a state monopoly of intelligence has been eroded. Beyond States and Spies demonstrates - through original research - that such a monopoly never existed. Private sector intelligence is at least as old as the organised intelligence activities of the nation state. The book offers a comparative examination of private and public intelligence, and makes a compelling case for understanding the dangers posed by unregulated intelligence in private hands. Overall, this casts new light on a hitherto under investigated academic space.
Download or read book Private Military and Security Contractors written by Gary Schaub, Jr. and published by Rowman & Littlefield. This book was released on 2016-06-16 with total page 440 pages. Available in PDF, EPUB and Kindle. Book excerpt: In Private Military and Security Contractors (PMSCs) a multinational team of scholars and experts address a developing phenomenon: controlling the use of privatized force by states in international politics. Robust analyses of the evolving, multi-layered tapestry of formal and informal mechanisms of control address the microfoundations of the market, such as the social and role identities of contract employees, their acceptance by military personnel, and potential tensions between them. The extent and willingness of key states—South Africa, the United States, Canada, the United Kingdom, and Israel—to monitor and enforce discipline to structure their contractual relations with PMSCs on land and at sea is examined, as is the ability of the industry to regulate itself. Also discussed is the nascent international legal regime to reinforce state and industry efforts to encourage effective practices, punish inappropriate behavior, and shape the market to minimize the hazards of loosening states’ oligopolistic control over the means of legitimate organized violence. The volume presents a theoretically-informed synthesis of micro- and macro-levels of analysis, offering new insights into the challenges of controlling the agents of organized violence used by states for scholars and practitioners alike.
Download or read book Deter Disrupt or Deceive written by Robert Chesney and published by Georgetown University Press. This book was released on 2023-05-01 with total page 318 pages. Available in PDF, EPUB and Kindle. Book excerpt: A fresh perspective on statecraft in the cyber domain The idea of “cyber war” has played a dominant role in both academic and popular discourse concerning the nature of statecraft in the cyber domain. However, this lens of war and its expectations for death and destruction may distort rather than help clarify the nature of cyber competition and conflict. Are cyber activities actually more like an intelligence contest, where both states and nonstate actors grapple for information advantage below the threshold of war? In Deter, Disrupt, or Deceive, Robert Chesney and Max Smeets argue that reframing cyber competition as an intelligence contest will improve our ability to analyze and strategize about cyber events and policy. The contributors to this volume debate the logics and implications of this reframing. They examine this intelligence concept across several areas of cyber security policy and in different national contexts. Taken as a whole, the chapters give rise to a unique dialogue, illustrating areas of agreement and disagreement among leading experts and placing all of it in conversation with the larger fields of international relations and intelligence studies. Deter, Disrupt, or Deceive is a must read because it offers a new way for scholars, practitioners, and students to understand statecraft in the cyber domain.
Download or read book Outsourcing US Intelligence written by Van Puyvelde Damien Van Puyvelde and published by Edinburgh University Press. This book was released on 2019-05-03 with total page 224 pages. Available in PDF, EPUB and Kindle. Book excerpt: In the 21st century, more than any other time, US agencies have relied on contractors to conduct core intelligence functions. This book charts the swell of intelligence outsourcing in the context of American political culture and considers what this means for the relationship between the state, its national security apparatus and accountability within a liberal democracy. Through analysis of a series of case studies, recently declassified documents and exclusive interviews with national security experts in the public and private sectors, the book provides an in-depth and illuminating appraisal of the evolving accountability regime for intelligence contractors.
Download or read book FM 34 52 Intelligence Interrogation written by Department of Department of the Army and published by Createspace Independent Publishing Platform. This book was released on 2017-12-13 with total page 178 pages. Available in PDF, EPUB and Kindle. Book excerpt: The 1992 edition of the FM 34-52 Intelligence Interrogation Field Manual.
Download or read book Global Trends 2040 written by National Intelligence Council and published by Cosimo Reports. This book was released on 2021-03 with total page 158 pages. Available in PDF, EPUB and Kindle. Book excerpt: "The ongoing COVID-19 pandemic marks the most significant, singular global disruption since World War II, with health, economic, political, and security implications that will ripple for years to come." -Global Trends 2040 (2021) Global Trends 2040-A More Contested World (2021), released by the US National Intelligence Council, is the latest report in its series of reports starting in 1997 about megatrends and the world's future. This report, strongly influenced by the COVID-19 pandemic, paints a bleak picture of the future and describes a contested, fragmented and turbulent world. It specifically discusses the four main trends that will shape tomorrow's world: - Demographics-by 2040, 1.4 billion people will be added mostly in Africa and South Asia. - Economics-increased government debt and concentrated economic power will escalate problems for the poor and middleclass. - Climate-a hotter world will increase water, food, and health insecurity. - Technology-the emergence of new technologies could both solve and cause problems for human life. Students of trends, policymakers, entrepreneurs, academics, journalists and anyone eager for a glimpse into the next decades, will find this report, with colored graphs, essential reading.
Download or read book Multilevel Regulation of Military and Security Contractors written by Christine Bakker and published by Bloomsbury Publishing. This book was released on 2012-02-10 with total page 431 pages. Available in PDF, EPUB and Kindle. Book excerpt: The outsourcing of military and security services is the object of intense legal debate. States employ private military and security companies (PMSCs) to perform functions previously exercised by regular armed forces, and increasingly international organisations, NGOs and business corporations do the same to provide security, particularly in crisis situations. Much of the public attention on PMSCs has been in response to incidents in which PMSC employees have been accused of violating international humanitarian law. Therefore initiatives have been launched to introduce uniform international standards amidst what is currently very uneven national regulation. This book analyses and discusses the interplay between international, European, and domestic regulatory measures in the field of PMSCs. It presents a comprehensive assessment of the existing domestic legislation in EU Member States and relevant Third States, and identifies implications for future international regulation. The book also addresses the crucial questions whether and how the EU can potentially play a more active future role in the regulation of PMSCs to ensure compliance with human rights and international humanitarian law.
Download or read book Spies and Shuttles written by James E. David and published by University Press of Florida. This book was released on 2015-01-27 with total page 395 pages. Available in PDF, EPUB and Kindle. Book excerpt: In this real life spy saga, James E. David reveals the extensive and largely hidden interactions between NASA and U.S. defense and intelligence departments. The story begins with the establishment of NASA in 1958 and follows the agency through its growth, not only in scope but also in complexity. In Spies and Shuttles, David digs through newly declassified documents to ultimately reveal how NASA became a strange bedfellow to the Department of Defense (DoD) and the Central Intelligence Agency (CIA). He tracks NASA’s early cooperation—supplying cover stories for covert missions, analyzing the Soviet space program, providing weather and other scientific data from its satellites, and monitoring missile tests—that eventually devolved into NASA’s reliance on DoD for political and financial support for the Shuttle. David also examines the restrictions imposed on such activities as photographing the Earth from space and the intrusive review mechanisms to ensure compliance. The ties between NASA and the intelligence community have historically remained unexplored, and David’s riveting book is the first to investigate the twists and turns of this labyrinthine relationship.
Download or read book Intelligence Revolution 1960 written by Ingard Clausen and published by . This book was released on 2012 with total page 260 pages. Available in PDF, EPUB and Kindle. Book excerpt: Overview: Provides a history of the Corona Satellite photo reconnaissance Program. It was a joint Central Intelligence Agency and United States Air Force program in the 1960s. It was then highly classified.