Pub Date : 2024-09-04DOI: 10.1080/08850607.2024.2382029
Ruxandra Oana Vlad, John Hardy
Targeted killings have been a polarizing political issue since the first lethal drone strike was conducted in 2002. In the last decade, literature has debated the merits of targeted killing in inte...
{"title":"Signature Strikes and the Ethics of Targeted Killing","authors":"Ruxandra Oana Vlad, John Hardy","doi":"10.1080/08850607.2024.2382029","DOIUrl":"https://doi.org/10.1080/08850607.2024.2382029","url":null,"abstract":"Targeted killings have been a polarizing political issue since the first lethal drone strike was conducted in 2002. In the last decade, literature has debated the merits of targeted killing in inte...","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"37 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142198605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-07DOI: 10.1080/08850607.2024.2374227
Seumas Miller
National security intelligence (NSI) activity is considered through a normative (ethical) lens and the application of a normative theory to NSI collection, analysis, and dissemination undertaken. T...
{"title":"National Security Intelligence Activity and the Just Intelligence Theory","authors":"Seumas Miller","doi":"10.1080/08850607.2024.2374227","DOIUrl":"https://doi.org/10.1080/08850607.2024.2374227","url":null,"abstract":"National security intelligence (NSI) activity is considered through a normative (ethical) lens and the application of a normative theory to NSI collection, analysis, and dissemination undertaken. T...","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"17 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141969565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-31DOI: 10.1080/08850607.2024.2374228
Tom Sorell
Covert information gathering about one state by another is not itself an act of hostility, and it can coexist with friendship between the states in question. Indeed, it can be predicated on friends...
{"title":"Ethics of Spying on One’s Friends: Angela Merkel’s Telephone","authors":"Tom Sorell","doi":"10.1080/08850607.2024.2374228","DOIUrl":"https://doi.org/10.1080/08850607.2024.2374228","url":null,"abstract":"Covert information gathering about one state by another is not itself an act of hostility, and it can coexist with friendship between the states in question. Indeed, it can be predicated on friends...","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"31 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141946877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-31DOI: 10.1080/08850607.2024.2371814
Hogr Tarkhani
Published in International Journal of Intelligence and CounterIntelligence (Ahead of Print, 2024)
发表于《国际情报与反情报杂志》(2024 年提前出版)
{"title":"Offensive Cyberterrorism","authors":"Hogr Tarkhani","doi":"10.1080/08850607.2024.2371814","DOIUrl":"https://doi.org/10.1080/08850607.2024.2371814","url":null,"abstract":"Published in International Journal of Intelligence and CounterIntelligence (Ahead of Print, 2024)","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"103 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141883416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-01DOI: 10.1080/08850607.2024.2365609
Aleksandar Životić
Based on published and unpublished archival sources of Yugoslav origin, as well as relevant memoir and historiographical literature, this article analyzes the changes in the methods of work of the ...
本文以南斯拉夫已出版和未出版的档案资料以及相关的回忆录和史学文献为基础,分析了...
{"title":"Old Experiences and New Circumstances: Data Collection Methods of the Yugoslav Military Intelligence Service during the Yugoslav–Soviet Conflict (1948–1951)","authors":"Aleksandar Životić","doi":"10.1080/08850607.2024.2365609","DOIUrl":"https://doi.org/10.1080/08850607.2024.2365609","url":null,"abstract":"Based on published and unpublished archival sources of Yugoslav origin, as well as relevant memoir and historiographical literature, this article analyzes the changes in the methods of work of the ...","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"40 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141737095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-17DOI: 10.1080/08850607.2024.2358802
Isabelle Bond
The Australian Government has identified climate change as being a threat to national security. With the emerging prospect that a climate security policy will be established, the question arises as...
{"title":"Emissions, the Strategic Omission: Climate Security and Australia’s National Intelligence Community","authors":"Isabelle Bond","doi":"10.1080/08850607.2024.2358802","DOIUrl":"https://doi.org/10.1080/08850607.2024.2358802","url":null,"abstract":"The Australian Government has identified climate change as being a threat to national security. With the emerging prospect that a climate security policy will be established, the question arises as...","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"50 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141548025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-28DOI: 10.1080/08850607.2024.2345056
Kevin P. Riehle
Soviet intelligence officer defectors arrived in their new countries lacking skills that translated easily into postdefection jobs. To earn money, they often turned to the one asset they had—their ...
{"title":"Everybody Needs Help Sometimes: Facilitators of Soviet Defectors’ Publications","authors":"Kevin P. Riehle","doi":"10.1080/08850607.2024.2345056","DOIUrl":"https://doi.org/10.1080/08850607.2024.2345056","url":null,"abstract":"Soviet intelligence officer defectors arrived in their new countries lacking skills that translated easily into postdefection jobs. To earn money, they often turned to the one asset they had—their ...","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"70 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141548026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-19DOI: 10.1080/08850607.2024.2322641
Angela Gendron
Published in International Journal of Intelligence and CounterIntelligence (Ahead of Print, 2024)
发表于《国际情报与反情报杂志》(2024 年提前出版)
{"title":"My Lovable Fascist","authors":"Angela Gendron","doi":"10.1080/08850607.2024.2322641","DOIUrl":"https://doi.org/10.1080/08850607.2024.2322641","url":null,"abstract":"Published in International Journal of Intelligence and CounterIntelligence (Ahead of Print, 2024)","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"2013 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140623879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-11DOI: 10.1080/08850607.2024.2325147
Patrick Peprah Obuobi
This article analyzes the prospects for strategic intelligence at the United Nations (UN) Secretariat within the framework of the Peacekeeping-Intelligence (PKI) policy that was first published in ...
本文分析了联合国秘书处在维持和平情报(PKI)政策框架内开展战略情报工作的前景。
{"title":"Prospects for United Nations Strategic Intelligence","authors":"Patrick Peprah Obuobi","doi":"10.1080/08850607.2024.2325147","DOIUrl":"https://doi.org/10.1080/08850607.2024.2325147","url":null,"abstract":"This article analyzes the prospects for strategic intelligence at the United Nations (UN) Secretariat within the framework of the Peacekeeping-Intelligence (PKI) policy that was first published in ...","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"22 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140566960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-11DOI: 10.1080/08850607.2024.2317755
J. Eli Margolis
What explains variation in how officials use intelligence analysis? How can one official acting on one issue within one bureaucratic and political reality seem alternately to use, misuse, and not u...
{"title":"How Officials Use Intelligence Analysis: A Situational Theory","authors":"J. Eli Margolis","doi":"10.1080/08850607.2024.2317755","DOIUrl":"https://doi.org/10.1080/08850607.2024.2317755","url":null,"abstract":"What explains variation in how officials use intelligence analysis? How can one official acting on one issue within one bureaucratic and political reality seem alternately to use, misuse, and not u...","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":"21 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140566965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}