首页 > 最新文献

International Journal of Intelligence and Counterintelligence最新文献

英文 中文
“Encore Merci de Votre Collaboration et Bravo!” Albert Van Buylaere, a Belgian Intelligence Agent during World War II “再次感谢你们的支持,合作与喝彩!”Albert Van Buylaere,二战期间的一名比利时情报人员
Q3 Social Sciences Pub Date : 2023-11-07 DOI: 10.1080/08850607.2023.2264692
Robin Liefferinckx
AbstractAlthough World War II intelligence and action services are an important research topic in current Belgian intelligence studies, researchers until recently never focused solely on the Benoît network in their studies. However, this organization was of vital importance for the successful transmission of the intelligence that had been gathered by the Belgian government and State Security in London. One of Benoît’s key members was Albert Van Buylaere who was considered “brilliant” by his superiors. This article gives an overview of his motives and actions and gives a first impression of why he was so sought after by various intelligence agencies during the Cold War. After a brief discussion on the organization and activities of this network and the main events around it, the focus will shift to his activities. Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1 Kees Schuyt, Universitair verzet (1940–1945), maatschappelijk verzet en de waarde van wetenschap: Een drieluik (Den Haag: Boom Lemma Uitgevers, 2012), p. 18; Marc Cools, “Universitair verzet, inlichtingen en actie,” in Memorial Volume Intelligence and Action Agents, edited by Roger Coekelbers, Marc Cools, Robin Libert, Veerle Pashley, Jaak Raes, David Stans, and Renaat Vandecasteele (Antwerpen: Maklu, 2015), pp. 95–96.2 Fernand Strubbe, Geheime oorlog ’40–’45: de inlichtings- en actiediensten in België (Tielt: Lannoo, 1992), p. 19.3 For an overview of the activities of each group, see, for example, Emmanuel Debruyne, La guerre secrète des espions belges 1940–1944 (Bruxelles: Racine, 2008); Marie-Pierre d’Udekem d’Acoz, Voor Koning & vaderland: De Belgische adel in het verzet (Tielt: Lannoo, 2013); Cools, “Universitair verzet, inlichtingen en actie.”4 A period known as the “repression” and “epuration: in Belgium (1944–1949).5 Michael Warner, “Sources and Methods for the Study of Intelligence,” in Handbook of Intelligence Studies, edited by Loch K. Johnson (London: Routledge, 2007), pp. 21-22; Emmanuel Debruyne, “La maison de verre: Agents et réseaux de renseignements en Belgique. 1940-1944” (Ph.D. dissertation, Université Catholique de Louvain, 2006), p. 29.6 Peter Jackson, “Enquiries into the ‘Secret State,’” in Exploring Intelligence Archives: Enquiries into the Secret State, edited by R. Gerald Hughes, Peter Jackson, and Len Scott (London: Routledge, 2008), p. 3.7 Jean Fosty, “De Belgische netten in Frankrijk,” Bijdragen tot de geschiedenis van de Tweede Wereldoorlog, Vol. 2 (1972), p. 220.8 Jackson, “Enquiries into the ‘Secret State,’” p. 3.9 Strubbe, Geheime oorlog ’40–’45, p. 48; Etienne Verhoeyen, België Bezet 1940–1944: Een synthese (Brussel: BRTN-Educatieve Uitgaven, 1993), p. 261.10 Free translation: “A bewildering spectacle of people gathering intelligence, grouping together, and forming a network, but not knowing how to pass on that information.” Strubbe, Geheime oorlog ’40–’45, p. 21.11 Francis Balace, “Des milliers d’yeux dans la nuit:
虽然二战情报和行动服务是当前比利时情报研究的一个重要研究课题,但直到最近,研究人员才将研究重点放在beno<e:1>网络上。然而,这个组织对于比利时政府和伦敦国家安全局收集的情报的成功传递至关重要。beno<e:1>的主要成员之一是阿尔伯特·范·拜莱尔,他的上司认为他“才华横溢”。本文概述了他的动机和行为,并给出了他在冷战期间受到各种情报机构追捧的第一印象。在简要讨论了该网络的组织和活动以及围绕该网络的主要事件之后,重点将转移到他的活动上。披露声明作者未报告潜在的利益冲突。注1 Kees Schuyt, Universitair verzet (1940-1945), maatschappelijk verzet en de waarde van wetenschap: Een drieluik (Den Haag: Boom Lemma Uitgevers, 2012), p. 18;马克·库尔斯,“Universitair verzet, inlichtingen en active”,收录于情报与行动代理纪念册,由罗杰·科克尔伯斯、马克·库尔斯、罗宾·利伯特、维尔勒·帕什利、Jaak Raes、大卫·斯坦斯和Renaat Vandecasteele编辑(安特威彭:马克卢,2015年),第95-96.2页。Lannoo, 1992),第19.3页,对每个小组的活动进行概述,例如,见Emmanuel Debruyne, 1940-1944年比利时间谍的秘密活动(布鲁塞尔:拉辛,2008年);Marie-Pierre d 'Udekem d 'Acoz, Voor Koning & vaderland: De Belgische adel in the verzet (Tielt: Lannoo, 2013);“很酷,”Universitair verzzet说,“很活跃。”被称为“镇压”和“清洗”的时期:比利时(1944-1949)Michael Warner,“智力研究的来源和方法”,见Loch K. Johnson编辑的《智力研究手册》(伦敦:Routledge出版社,2007),第21-22页;Emmanuel Debruyne,“La maison de verre: Agents et r<s:1> seaux de renseignements en Belgique, 1940-1944”(博士论文,Louvain天主教大学,2006),第29.6页,Peter Jackson,“对‘秘密国家’的调查”,收录于《情报档案探索:对秘密国家的调查》,由R. Gerald Hughes, Peter Jackson和Len Scott编辑(伦敦:Jean Fosty,“De Belgische netten in Frankrijk”,Bijdragen tot De geschiedenis van De Tweede Wereldoorlog, Vol. 2 (1972), p. 220.8 Jackson,“对‘秘密国家’的调查”,p. 3.9 Strubbe, Geheime oorlog ' 40 - ' 45, p. 48;Etienne Verhoeyen, België Bezet 1940-1944: even synthese(布鲁塞尔:brn - educatieve Uitgaven出版社,1993),第261.10页意译:“一个令人困惑的景象,人们收集情报,聚集在一起,形成一个网络,但不知道如何传递这些信息。”斯特鲁布,Geheime oorlog ' 40- ' 45,第21.11页。弗朗西斯·巴勒斯,“军队的军事行动:1940-1944年的军事行动的起源和类型学”,收录于《情报和行动特工》纪念册,由罗杰·科克尔伯斯、马克·库尔斯、罗宾·利伯特、维尔勒·帕什利、雅克·拉斯、大卫·斯坦斯和雷纳特·范德卡斯蒂尔编辑(安特卫普:马克卢,2015年),第77.12页。Robin Libert,“In vogelvlucht: De geschiedenis van 175 jaar Veiligheid van De Staat”,载于De Staatsveiligheid:超过175 jaar Veiligheid van De Staat的论文,由Marc Cools, Koen Dassen, Robin Libert和Paul Ponsaers编辑(布鲁塞尔:Politeia, 2005),第37.14页。有关该协议的更多信息,请参见:Etienne Verhoeyen和Emmanuel Debruyne,“Les annacimes londoniennes”。《情报与行动特工》,收录于《情报与行动特工》纪念卷,由Roger Coekelbers、Marc Cools、Robin Libert、Veerle Pashley、Jaak Raes、David Stans和Renaat Vandecasteele(安特卫普:Maklu, 2015)编辑,第61-63.15页。Funkabwehr (Funkabwehr der Oberkommando der Wehrmacht)是一个无线电反情报机构,成立于1940年,由Oberstleutnant(相当于德国中校)Hans Kopp领导。在整个战争期间,Funkabwehr作为德国主要的信号情报组织,主要是监视和拦截来自被占领土的无线电传输。此外,Funkabwehr的传输本身向盟军提供的信息也很少。他们的x型设备是谜机的一部分,谜机是一种连布莱切利公园的天才们都觉得极难破译的编码系统Paul Louyet, België in de Tweede Wereldoorlog: Deel 4: heet verzet (Kapellen: de Nederlandsche Boekhandel, 1984), 51.17页。Strubbe, Geheime oorlog ' 40 - ' 45, pp. 20-22。然而,这里应该做一个评论。 由walth<s:1> dew<s:1>领导的克拉伦斯特遣队具有高度的专业精神。例如,它是唯一一个拥有真正“董事会”的组织。这可以从历史的角度来解释:克拉伦斯是第一次世界大战情报网络La Dame Blanche的继任者,该网络在内战期间被转变为SIS的“留守网络”,名为“观察军团”。凭借第一次世界大战的经验和与英国的关系,克拉伦斯能够展示出任何其他组织(包括外国组织)无法比拟的效率。克拉伦斯,被伊曼纽尔·德布鲁因恰如其分地描述为“克拉伦斯,一路前进”,因此成为被占领土上所有其他情报组织的榜样利伯特,“在道德上”,第23-48页;Verhoeyen and Debruyne, < Les annesemonines >,第47-68页。罗马人已经使用了这种策略,因为拥有帝国印章的信使可以自由进入城市。这些信使除了履行公务外,还经常递送私人信件和传递有价值的情报Robin Lieffe
{"title":"“Encore Merci de Votre Collaboration et Bravo!” Albert Van Buylaere, a Belgian Intelligence Agent during World War II","authors":"Robin Liefferinckx","doi":"10.1080/08850607.2023.2264692","DOIUrl":"https://doi.org/10.1080/08850607.2023.2264692","url":null,"abstract":"AbstractAlthough World War II intelligence and action services are an important research topic in current Belgian intelligence studies, researchers until recently never focused solely on the Benoît network in their studies. However, this organization was of vital importance for the successful transmission of the intelligence that had been gathered by the Belgian government and State Security in London. One of Benoît’s key members was Albert Van Buylaere who was considered “brilliant” by his superiors. This article gives an overview of his motives and actions and gives a first impression of why he was so sought after by various intelligence agencies during the Cold War. After a brief discussion on the organization and activities of this network and the main events around it, the focus will shift to his activities. Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1 Kees Schuyt, Universitair verzet (1940–1945), maatschappelijk verzet en de waarde van wetenschap: Een drieluik (Den Haag: Boom Lemma Uitgevers, 2012), p. 18; Marc Cools, “Universitair verzet, inlichtingen en actie,” in Memorial Volume Intelligence and Action Agents, edited by Roger Coekelbers, Marc Cools, Robin Libert, Veerle Pashley, Jaak Raes, David Stans, and Renaat Vandecasteele (Antwerpen: Maklu, 2015), pp. 95–96.2 Fernand Strubbe, Geheime oorlog ’40–’45: de inlichtings- en actiediensten in België (Tielt: Lannoo, 1992), p. 19.3 For an overview of the activities of each group, see, for example, Emmanuel Debruyne, La guerre secrète des espions belges 1940–1944 (Bruxelles: Racine, 2008); Marie-Pierre d’Udekem d’Acoz, Voor Koning & vaderland: De Belgische adel in het verzet (Tielt: Lannoo, 2013); Cools, “Universitair verzet, inlichtingen en actie.”4 A period known as the “repression” and “epuration: in Belgium (1944–1949).5 Michael Warner, “Sources and Methods for the Study of Intelligence,” in Handbook of Intelligence Studies, edited by Loch K. Johnson (London: Routledge, 2007), pp. 21-22; Emmanuel Debruyne, “La maison de verre: Agents et réseaux de renseignements en Belgique. 1940-1944” (Ph.D. dissertation, Université Catholique de Louvain, 2006), p. 29.6 Peter Jackson, “Enquiries into the ‘Secret State,’” in Exploring Intelligence Archives: Enquiries into the Secret State, edited by R. Gerald Hughes, Peter Jackson, and Len Scott (London: Routledge, 2008), p. 3.7 Jean Fosty, “De Belgische netten in Frankrijk,” Bijdragen tot de geschiedenis van de Tweede Wereldoorlog, Vol. 2 (1972), p. 220.8 Jackson, “Enquiries into the ‘Secret State,’” p. 3.9 Strubbe, Geheime oorlog ’40–’45, p. 48; Etienne Verhoeyen, België Bezet 1940–1944: Een synthese (Brussel: BRTN-Educatieve Uitgaven, 1993), p. 261.10 Free translation: “A bewildering spectacle of people gathering intelligence, grouping together, and forming a network, but not knowing how to pass on that information.” Strubbe, Geheime oorlog ’40–’45, p. 21.11 Francis Balace, “Des milliers d’yeux dans la nuit:","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135480314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Auditory and Olfactory Copying in Intelligence: Brain and Thought Modifications Beyond the Word 智力中的听觉和嗅觉复制:超越文字的大脑和思想修正
Q3 Social Sciences Pub Date : 2023-11-02 DOI: 10.1080/08850607.2023.2257553
Davide Bellomo
AbstractFor those who command the machine, regulate the satellite, or handle operations in the field, everything depends on the brain, on the human being. According to the North Atlantic Treaty Organization, the sixth domain where conflict will occur and peace will have to be managed is the cognitive one, made official in 2021. It becomes the most important of all. In the end, the match will be won by whoever will have practitioners, analysts, or those deployed in the field with the best brain. Experiments are being carried out in some countries where the human brain gets physically connected to the machine so that the machine can learn how the human brain works. However, a machine will learn from that person’s brain, with all their limitations, biases, and fears, therefore already having numerous flaws in its system, without considering the ethical disputableness of this kind of thing. There is a way to win in the sixth domain: enhancing the intelligence practitioners’ capabilities, which is doable thanks to the latest studies and techniques developed. It is, therefore, possible, without medicines, drugs, or electrical and electronic equipment, to augment the mental capability and plasticity of those who will have to win these challenges. Disclosure StatementNo potential conflict of interest was reported by the author(s).Notes1 Bernard Claverie, Baptiste Prébot, Norbou Buchler, and François Du Cluzel, “Cognitive Warfare,” in First NATO Scientific Meeting on Cognitive Warfare (Bordeaux: NATO-STO Collaboration Support Office, with the support of NATO-ACT Innovation Hub, Bordeaux ENSC, the French Armed Forces Joint Staff and the Region Nouvelle Aquitaine, 2021).2 Ibid.3 Daniel J. Siegel, La mente relazionale: Neurobiologia dell’esperienza interpersonale [The Relational Mind: Neurobiology of the Interpersonal Experience] (Milan: Raffello Cortina Editore, 2013).4 Sabrina Magris, Perla Di Gioia, Ilaria Lamonato, Livia Stefania Mihalache, and Davide Bellomo, “To Have Alternatives, You Must Be Able to Think of Them,” The Journal of the Australian Institute of Professional Intelligence, Vol. 28, No. 2–3 (2020), pp. 68–82.5 The physiological bias is the elaboration of internal or external information aimed to cover up what is missed of the real information. The brain creates an ostensible version of what happens—based on the information it has already stored, without codifying new information—because it does not have the reality of what happens. At the neural level, it indicates the deficiency of substances that enable the connections between the parts of the brain involved, causing the noncodification of the information received. Davide Bellomo, What Is Biased Can Be Unbiased: The Neurological Process of Identification and Elimination of Biases Held by Professionals and Victims. Study Conducted Using Subject’s Brain Mapping to Evaluate Biases Caused by Trauma, Culture or Education. Poster presentation, End Violence Against Women International Conference
摘要对于那些指挥机器、调节卫星或处理野外作业的人来说,一切都取决于大脑,取决于人。根据北大西洋公约组织(North Atlantic Treaty Organization)的说法,2021年正式确定的第六个将发生冲突并必须管理和平的领域是认知领域。它成为最重要的。最终,谁拥有从业者、分析师,谁在该领域拥有最聪明的头脑,谁就能赢得这场比赛。一些国家正在进行实验,将人脑与机器物理连接起来,这样机器就可以学习人脑的工作原理。然而,机器将从人的大脑中学习,尽管有局限性、偏见和恐惧,因此它的系统已经有了许多缺陷,而不考虑这种事情的伦理争议。在第六领域取胜的方法是:提高情报从业者的能力,这是可行的,这得益于最新的研究和技术的发展。因此,不需要药物、药物或电子电气设备,就有可能增强那些必须赢得这些挑战的人的心智能力和可塑性。披露声明作者未报告潜在的利益冲突。注1 Bernard Claverie, Baptiste pracimbot, Norbou Buchler和franois Du Cluzel,“认知战”,在第一次北约认知战科学会议上(波尔多:北约- sto协作支持办公室,在北约- act创新中心,波尔多ENSC,法国武装部队联合参谋部和新阿基坦地区的支持下,2021)4 . Daniel J. Siegel, La mente relazionale: Neurobiologia dell 'esperienza interpersonale[关系思维:人际体验的神经生物学](米兰:Raffello Cortina Editore, 2013)Sabrina Magris, Perla Di Gioia, Ilaria Lamonato, Livia Stefania Mihalache和Davide Bellomo,“要有替代方案,你必须能够想到它们”,《澳大利亚专业情报研究所杂志》,第28卷,第2-3期(2020年),第68-82.5页生理偏见是对内部或外部信息的阐述,旨在掩盖真实信息中遗漏的内容。大脑根据它已经储存的信息创造了一个表面上的版本,而没有编纂新的信息——因为它不知道发生了什么。在神经层面上,它表明缺乏能够连接大脑相关部分的物质,导致接收到的信息不编码。大卫·贝洛莫,有偏见的东西可以是无偏见的:识别和消除专业人员和受害者持有的偏见的神经学过程。利用受试者的大脑映射来评估创伤、文化或教育造成的偏见。5 . 2018年4月3日至5日,美国芝加哥,“制止对妇女的暴力行为国际会议”海报展示Ariel Rokem和Merav Ahissar,“先天失明个体的认知和听觉能力的相互作用”,《神经心理学》,Vol. 47, No. 3 (2009), pp. 843-848。https://doi.org/10.1016/j.neuropsychologia.2008.12.0177同上8 Giacomo Rizzolatti, Luciano Fadiga, Vittorio Gallese和Leonardo Fogassi,“前运动皮层和运动动作的识别”,《大脑研究》。认知脑研究,第3卷,第2期(1996),第131-141页。https://doi.org/10.1016/0926 - 6410 (95) 00038 - 0;Giacomo Rizzolatti和Laila Craighero,“镜像神经元系统”,《神经科学年鉴》,第27卷,第1期(2004),第169-192页。https://doi.org/10.1146/annurev.neuro.27.070203.1442309 Wayne L. Silver和Thomas E. Finger,“外周鼻三叉神经化学感受的解剖和电生理基础”,《纽约科学院年鉴》,Vol. 1170 (2009), pp. 202-205。https://doi.org/10.1111/j.1749-6632.2009.03894.x10 Christopher S. Von Bartheld,“末梢神经及其与球外“嗅觉”投射的关系:来自七鳃鳗和肺鱼的经验”,《显微镜研究与技术》,第65卷,第1-2期(2004),第13-24页。https://doi.org/10.1002/jemt.20095。Wolfgang Klimesch,“大脑和脑体振荡的频率架构:分析”,欧洲神经科学杂志,Vol. 48 (2018), pp. 2431-2453。https://doi.org/10.1111/ejn.14192;Joshua H. Balsters, Ian H. Robertson和Vince D. Calhoun,“BOLD频率功率指数工作记忆性能”,《人类神经科学前沿》,第7卷(2013)。https://doi.org/10.3389/fnhum.2013.00207;Charles J. Wysocki和George Preti,“人类信息素的事实、谬误、恐惧和挫折”,《解剖记录》A卷281(2004),第1201-1211页。https://doi.org/10.1002/ar.a.2012512西格尔,《关系之门》记忆技术,双眼技术,以及与突触重新开放相关的技术。 [14]卢吉·阿诺里和保罗·勒格伦兹,《普通心理学》(博洛尼亚:大众心理学,2001).15“设计意味着一个地方,一个主体所在的地方,如何改变主体的行为。”此外,“设计被转化为谎言的设计,谎言的设计基于存在于地点、物体、文字和图像之间的推理,基于个人如何根据他进入和/或沉浸的地方修改他的行为。”萨布丽娜·马格里斯,La svolta apicale: Come cambiare La mentalitcome aumentare le capacitcomdi leadership[顶点转向:如何改变心态和增强领导技能](Castelfranco Veneto: Panda edition, 2022)几十年来,人们一直认为视力是一种器官,但事实证明视力并不是这种器官。眼见是骗人的。大脑看不见的地方,它就发明,而听觉和嗅觉器官的错误率较低19 .大卫·贝洛莫,“研究成果的介绍”,École国际大学课堂,意大利罗马,2022.18年3月。查尔斯·达尔文,自然选择的进化论(1859)20 .世界卫生组织,《世界卫生统计报告》(2021年)Gaetano Kanizsa,“Margini quasi- perceptivi in campi con stimulmolazione omogenea”[准知觉边缘在均匀刺激场],Rivista di Psicologia[心理学杂志],卷49,第1期(1955),第7-30页;Gaetano Kanizsa和Walter Gerbino,《情态完成:看见还是思考?》Kenneth N. Stevens和Sheila Ellen Blumstein,“顿音发音位置的不变线索”,《美国声学学会杂志》,第64卷,第5期(1978),第1358-1368页。https://doi.org/10.1121/1.382102;Kenneth
{"title":"Auditory and Olfactory Copying in Intelligence: Brain and Thought Modifications Beyond the Word","authors":"Davide Bellomo","doi":"10.1080/08850607.2023.2257553","DOIUrl":"https://doi.org/10.1080/08850607.2023.2257553","url":null,"abstract":"AbstractFor those who command the machine, regulate the satellite, or handle operations in the field, everything depends on the brain, on the human being. According to the North Atlantic Treaty Organization, the sixth domain where conflict will occur and peace will have to be managed is the cognitive one, made official in 2021. It becomes the most important of all. In the end, the match will be won by whoever will have practitioners, analysts, or those deployed in the field with the best brain. Experiments are being carried out in some countries where the human brain gets physically connected to the machine so that the machine can learn how the human brain works. However, a machine will learn from that person’s brain, with all their limitations, biases, and fears, therefore already having numerous flaws in its system, without considering the ethical disputableness of this kind of thing. There is a way to win in the sixth domain: enhancing the intelligence practitioners’ capabilities, which is doable thanks to the latest studies and techniques developed. It is, therefore, possible, without medicines, drugs, or electrical and electronic equipment, to augment the mental capability and plasticity of those who will have to win these challenges. Disclosure StatementNo potential conflict of interest was reported by the author(s).Notes1 Bernard Claverie, Baptiste Prébot, Norbou Buchler, and François Du Cluzel, “Cognitive Warfare,” in First NATO Scientific Meeting on Cognitive Warfare (Bordeaux: NATO-STO Collaboration Support Office, with the support of NATO-ACT Innovation Hub, Bordeaux ENSC, the French Armed Forces Joint Staff and the Region Nouvelle Aquitaine, 2021).2 Ibid.3 Daniel J. Siegel, La mente relazionale: Neurobiologia dell’esperienza interpersonale [The Relational Mind: Neurobiology of the Interpersonal Experience] (Milan: Raffello Cortina Editore, 2013).4 Sabrina Magris, Perla Di Gioia, Ilaria Lamonato, Livia Stefania Mihalache, and Davide Bellomo, “To Have Alternatives, You Must Be Able to Think of Them,” The Journal of the Australian Institute of Professional Intelligence, Vol. 28, No. 2–3 (2020), pp. 68–82.5 The physiological bias is the elaboration of internal or external information aimed to cover up what is missed of the real information. The brain creates an ostensible version of what happens—based on the information it has already stored, without codifying new information—because it does not have the reality of what happens. At the neural level, it indicates the deficiency of substances that enable the connections between the parts of the brain involved, causing the noncodification of the information received. Davide Bellomo, What Is Biased Can Be Unbiased: The Neurological Process of Identification and Elimination of Biases Held by Professionals and Victims. Study Conducted Using Subject’s Brain Mapping to Evaluate Biases Caused by Trauma, Culture or Education. Poster presentation, End Violence Against Women International Conference ","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135933158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Democratization of Intelligence: Demilitarizing the Greek Intelligence Service after the Junta 情报民主化:军政府后希腊情报机构的非军事化
Q3 Social Sciences Pub Date : 2023-11-02 DOI: 10.1080/08850607.2023.2261824
Eleni Braat
Military dictatorships critically rely on the armed forces and intelligence agencies for the maintenance of their regime. They strengthen these through the allocation of substantial staff and personal resources. We know little about the behavior of intelligence and security services in the transition from authoritarianism to democracy. This article examines the Greek Intelligence Service (KYP) and, since 1986, the National Intelligence Service as its successor. A principal ingredient for the democratic embedment of the service was a break with this dictatorial past and, consequently, its demilitarization. This article shows that the de facto demilitarization of the service was a protracted process that was largely independent from the de jure formal demilitarization in 1986. It both preceded and lagged the legislative decision in 1986. This article particularly focusses on personnel policies aimed at distancing the service from its former ties to the junta regime (1967–1974), the “old KYP.” Its methodological contribution lies in its reliance on original, oral history interviews with former employees of the service and in its systematic analysis of newspaper publications for research on the KYP. I argue and show that internal organizational factors, most notably professionalization and shifting responsibilities, rather than external factors such as party politics or a prodemocratic ideological vision, are the key explanations for a change in the otherwise persistent military staffing of the intelligence service.
军事独裁政权严重依赖武装部队和情报机构来维持其政权。它们通过分配大量工作人员和个人资源来加强这些资源。我们对情报和安全部门在从威权主义向民主过渡过程中的行为知之甚少。本文考察了希腊情报局(KYP),以及自1986年以来作为其继任者的国家情报局(National Intelligence Service)。将军种民主嵌入的一个主要因素是与这种独裁的过去决裂,从而使其非军事化。这篇文章表明,军事服务事实上的非军事化是一个长期的过程,在很大程度上独立于1986年法律上的正式非军事化。它既早于1986年的立法决定,又落后于1986年的立法决定。本文特别关注人事政策,旨在使军种与军政府政权(1967-1974),即“旧KYP”保持距离。它在方法论上的贡献在于,它依赖于对该服务前雇员的原始口述历史采访,并对报纸出版物进行系统分析,以研究KYP。我认为并表明,内部组织因素,最明显的是专业化和责任转移,而不是外部因素,如政党政治或亲民主的意识形态愿景,是情报部门持续的军事人员配置变化的关键解释。
{"title":"Democratization of Intelligence: Demilitarizing the Greek Intelligence Service after the Junta","authors":"Eleni Braat","doi":"10.1080/08850607.2023.2261824","DOIUrl":"https://doi.org/10.1080/08850607.2023.2261824","url":null,"abstract":"Military dictatorships critically rely on the armed forces and intelligence agencies for the maintenance of their regime. They strengthen these through the allocation of substantial staff and personal resources. We know little about the behavior of intelligence and security services in the transition from authoritarianism to democracy. This article examines the Greek Intelligence Service (KYP) and, since 1986, the National Intelligence Service as its successor. A principal ingredient for the democratic embedment of the service was a break with this dictatorial past and, consequently, its demilitarization. This article shows that the de facto demilitarization of the service was a protracted process that was largely independent from the de jure formal demilitarization in 1986. It both preceded and lagged the legislative decision in 1986. This article particularly focusses on personnel policies aimed at distancing the service from its former ties to the junta regime (1967–1974), the “old KYP.” Its methodological contribution lies in its reliance on original, oral history interviews with former employees of the service and in its systematic analysis of newspaper publications for research on the KYP. I argue and show that internal organizational factors, most notably professionalization and shifting responsibilities, rather than external factors such as party politics or a prodemocratic ideological vision, are the key explanations for a change in the otherwise persistent military staffing of the intelligence service.","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135933167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spanish Intelligence in the Early Days of Late-Francoism: Fault Lines and Continuity 后弗朗哥主义早期的西班牙情报:断层线与连续性
Q3 Social Sciences Pub Date : 2023-10-31 DOI: 10.1080/08850607.2023.2261823
Antonio M. Díaz-Fernández
{"title":"Spanish Intelligence in the Early Days of Late-Francoism: Fault Lines and Continuity","authors":"Antonio M. Díaz-Fernández","doi":"10.1080/08850607.2023.2261823","DOIUrl":"https://doi.org/10.1080/08850607.2023.2261823","url":null,"abstract":"","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135871163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flood of Erroneous Details on Soviet IntelligenceBoris Volodarsky : The Birth of the Soviet Secret Police: Lenin and History’s Greatest Heist 1917–1927 Frontline Books, Barnsley, South Yorkshire, 2023, 393 p., £25.00 (hardbound). 鲍里斯·沃洛达尔斯基:《苏联秘密警察的诞生:列宁与1917-1927年历史上最伟大的劫案》,前线图书,南约克郡巴恩斯利,2023年,393页,25.00英镑(精装本)。
Q3 Social Sciences Pub Date : 2023-10-30 DOI: 10.1080/08850607.2023.2259743
Kevin Riehle
{"title":"Flood of Erroneous Details on Soviet IntelligenceBoris Volodarsky <b>:</b> <i>The Birth of the Soviet Secret Police: Lenin and History’s Greatest Heist 1917–1927</i> Frontline Books, Barnsley, South Yorkshire, 2023, 393 p., £25.00 (hardbound).","authors":"Kevin Riehle","doi":"10.1080/08850607.2023.2259743","DOIUrl":"https://doi.org/10.1080/08850607.2023.2259743","url":null,"abstract":"","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136104859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building Trust to Enhance Elicitation 建立信任,加强沟通
Q3 Social Sciences Pub Date : 2023-10-17 DOI: 10.1080/08850607.2023.2255507
Simon Oleszkiewicz, Dominick J. Atkinson, Steven Kleinman, Christian A. Meissner
Drawing on the scientific literature on trust and the experiences of distinguished interviewers, two primary trust-building tactics with potential application in investigative and intelligence interviewing were identified and assessed for their efficacy in this context. Trust-building tactics that demonstrate trustworthiness and demonstrate a willingness to trust portray the interviewer as reliable and dependable (i.e., perceptions of cognitive trust) as well as convey goodwill and warmth (i.e., perceptions of affective trust) were viewed as likely to increase a source’s willingness to disclose critical information. Across three experiments, both tactics were found to be influential in engaging the reciprocity principle in a manner that elicited the sources’ cooperation and enhanced information yield. However, perceptions of cognitive trust were found to function as a direct encouragement to reveal information. In contrast, perceptions of affective trust first facilitated a willingness to cooperate that had the potential for subsequently manifesting as an instrumental form of cooperation.
根据关于信任的科学文献和杰出采访者的经验,确定并评估了两种主要的信任建立策略,这些策略在调查和情报采访中具有潜在的应用前景。建立信任的策略表现出可信度和信任意愿,将面试官描绘成可靠和可靠的(即认知信任的感知),以及传达善意和温暖(即情感信任的感知),被认为有可能增加消息来源透露关键信息的意愿。在三个实验中,我们发现这两种策略都对互惠原则产生了影响,从而引发了信息源的合作并提高了信息产量。然而,认知信任的感知被发现是一种直接鼓励信息泄露的作用。相反,对情感信任的感知首先促进了合作意愿,这种意愿随后有可能表现为一种工具性的合作形式。
{"title":"Building Trust to Enhance Elicitation","authors":"Simon Oleszkiewicz, Dominick J. Atkinson, Steven Kleinman, Christian A. Meissner","doi":"10.1080/08850607.2023.2255507","DOIUrl":"https://doi.org/10.1080/08850607.2023.2255507","url":null,"abstract":"Drawing on the scientific literature on trust and the experiences of distinguished interviewers, two primary trust-building tactics with potential application in investigative and intelligence interviewing were identified and assessed for their efficacy in this context. Trust-building tactics that demonstrate trustworthiness and demonstrate a willingness to trust portray the interviewer as reliable and dependable (i.e., perceptions of cognitive trust) as well as convey goodwill and warmth (i.e., perceptions of affective trust) were viewed as likely to increase a source’s willingness to disclose critical information. Across three experiments, both tactics were found to be influential in engaging the reciprocity principle in a manner that elicited the sources’ cooperation and enhanced information yield. However, perceptions of cognitive trust were found to function as a direct encouragement to reveal information. In contrast, perceptions of affective trust first facilitated a willingness to cooperate that had the potential for subsequently manifesting as an instrumental form of cooperation.","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135994074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Perkins Operations: Tactics Used in Undercover Interactions 珀金斯行动:卧底互动中使用的战术
Q3 Social Sciences Pub Date : 2023-10-10 DOI: 10.1080/08850607.2023.2257544
Simon Oleszkiewicz, Pär Anders Granhag, Timothy J. Luke
In the United States, it is permissible to place an undercover police officer in the jail cell with a suspect. This tactical move is rare and launched only for serious crimes, and it takes place before any charges have been filed. This tactic goes under the name of Perkins operations, from the case ruling that if an individual speaks freely to someone whom they believe is a fellow inmate it is allowed to take advantage of their misplaced trust (Illinois v. Perkins, 1990). In this study, we examine 22 Perkins operations, 60 hours of secretly taped interactions in the cells, and we describe and categorize the different approaches and tactics that the undercover officers used. Based on the descriptive analysis, we conceptualize two pathways to information elicitation (direct and relational) and explore the undercover officers’ use of risky interview tactics. The findings suggest that undercover officers use four broader approaches to establish relationships and gather information, and we were able to identify only a few instances of risky tactics in this sample. The relevance of the findings for human intelligence gathering and counterintelligence are discussed.
在美国,允许将一名便衣警察与嫌疑人关在牢房里。这种战术行动很少见,只针对严重犯罪才会实施,而且是在任何指控被提起之前。这种策略被称为帕金斯操作,从案件裁决中可以看出,如果一个人自由地与他认为是狱友的人说话,就可以利用他们错误的信任(伊利诺伊州诉帕金斯,1990)。在这项研究中,我们研究了22次珀金斯行动,60小时秘密录制的牢房里的互动,我们描述和分类了卧底警官使用的不同方法和策略。在描述性分析的基础上,我们概念化了两种获取信息的途径(直接和关系),并探讨了卧底人员使用风险访谈策略的情况。调查结果表明,卧底人员使用四种更广泛的方法来建立关系和收集信息,我们只能在这个样本中识别出少数危险策略的例子。讨论了这些发现与人类情报收集和反情报的相关性。
{"title":"Perkins Operations: Tactics Used in Undercover Interactions","authors":"Simon Oleszkiewicz, Pär Anders Granhag, Timothy J. Luke","doi":"10.1080/08850607.2023.2257544","DOIUrl":"https://doi.org/10.1080/08850607.2023.2257544","url":null,"abstract":"In the United States, it is permissible to place an undercover police officer in the jail cell with a suspect. This tactical move is rare and launched only for serious crimes, and it takes place before any charges have been filed. This tactic goes under the name of Perkins operations, from the case ruling that if an individual speaks freely to someone whom they believe is a fellow inmate it is allowed to take advantage of their misplaced trust (Illinois v. Perkins, 1990). In this study, we examine 22 Perkins operations, 60 hours of secretly taped interactions in the cells, and we describe and categorize the different approaches and tactics that the undercover officers used. Based on the descriptive analysis, we conceptualize two pathways to information elicitation (direct and relational) and explore the undercover officers’ use of risky interview tactics. The findings suggest that undercover officers use four broader approaches to establish relationships and gather information, and we were able to identify only a few instances of risky tactics in this sample. The relevance of the findings for human intelligence gathering and counterintelligence are discussed.","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136353378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ideology in Costume: A Growing Threat to Intelligence Studies 服装中的意识形态:对情报研究日益增长的威胁
Q3 Social Sciences Pub Date : 2023-10-10 DOI: 10.1080/08850607.2023.2254490
John A. Gentry
Intelligence studies (IS) is a new and rapidly evolving academic discipline. Scholars periodically assess its status, noting considerable progress, but they have barely begun to assess the origins and implications of a significant recent development in IS: infiltration of the discipline by people determined to alter intelligence studies for ideological reasons. This commentary focuses on the destructive impact of neo-Marxian “critical intelligence studies” on IS generally. It addresses the origins and implications of this infection and suggests ways to inoculate IS against further damage.
情报研究是一门新兴的、发展迅速的学科。学者们定期评估它的地位,注意到相当大的进步,但他们几乎没有开始评估伊斯兰国最近一个重大发展的起源和影响:出于意识形态原因,决心改变情报研究的人对这门学科的渗透。这篇评论主要关注新马克思主义的“批判性情报研究”对IS的破坏性影响。它阐述了这种感染的起源和影响,并提出了预防IS进一步损害的方法。
{"title":"Ideology in Costume: A Growing Threat to Intelligence Studies","authors":"John A. Gentry","doi":"10.1080/08850607.2023.2254490","DOIUrl":"https://doi.org/10.1080/08850607.2023.2254490","url":null,"abstract":"Intelligence studies (IS) is a new and rapidly evolving academic discipline. Scholars periodically assess its status, noting considerable progress, but they have barely begun to assess the origins and implications of a significant recent development in IS: infiltration of the discipline by people determined to alter intelligence studies for ideological reasons. This commentary focuses on the destructive impact of neo-Marxian “critical intelligence studies” on IS generally. It addresses the origins and implications of this infection and suggests ways to inoculate IS against further damage.","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136353221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Helping Intelligence Analysts Gain Insight 帮助情报分析师获得洞察力
Q3 Social Sciences Pub Date : 2023-10-05 DOI: 10.1080/08850607.2023.2257549
Adrian Wolfberg
AbtractDecisionmakers expect intelligence assessments to be insightful. Still, intelligence professionals do not understand the insight process well enough to achieve consistently such indispensable outcomes. Little, if any, research has studied how intelligence analysts achieve insights. A qualitative, interview-based unclassified study was conducted to understand how insight emerges in 36 intelligence analysts who solved novel problems. The results include an emergence process consisting of two interacting elements—internalized tensions and priming—across the emotion–cognition and individual–social dimensions, and that the relationship between the two elements is complex. The emergence of insight is not predictable or controllable, which has significant challenges for the management of intelligence analysts because intelligence agencies typically are hierarchical organizations that emphasize order and control, conditions antithetical for nurturing emergence. This conundrum requires a major individual and cultural shift by management. The study suggests that the findings are generalizable across intelligence analysts in any national security organization, domestic or international. Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1 Thomas H. Kean and Lee Hamilton, The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States (Washington, DC: U.S. Government Printing Office, 2004), p. 339. https://www.9-11commission.gov/report/; Laurence H. Silberman and Charles S. Robb, The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction (Washington, DC: U.S. Government Printing Office, 2005), p. 560. https://www.govinfo.gov/app/details/GPO-WMD2 Jacob W. Getzels and Mihalyi Csikszentmihalyi, “From Problem Solving to Problem Finding,” in Perspectives in Creativity, edited by Irving A. Taylor and Jacob W. Getzels (Chicago, IL: Aldine, 1975), pp. 90–115.3 Robert J. Sternberg, “A Three-Facet Model of Creativity,” in The Nature of Creativity, edited by Robert J. Sternberg (Cambridge, UK: Cambridge University Press, 1988), pp. 125–147.4 Stephen Marrin, “Understanding and Improving Intelligence Analysis by Learning from Others,” Intelligence and National Security, Vol. 32, No. 5 (2017), pp. 539–547. https://doi.org/10.1080/02684527.2017.1310913; Joseph Soeters, Management and Military Studies: Classical and Current Foundations (New York: Routledge, 2020), pp. 1–10.5 Peter A. Corning, “The Re-Emergence of ‘Emergence’: A Venerable Concept in Search of a Theory,” Complexity, Vol. 7, No. 6 (2002), pp. 18–30. https://doi.org/10.1002/cplx.100436 Steve W. J. Kozlowski and Katherine J. Klein, “A Multilevel Approach to Theory and Research in Organizations: Contextual, Temporal, and Emergent Processes,” in Multilevel Theory, Research, and Methods in Organizations: Foundations, Extensions, and New Directions, edited by Katherine J. Klein
决策者期望情报评估具有洞察力。尽管如此,情报专业人员对洞察过程的了解还不够充分,无法持续实现这些不可或缺的结果。很少有研究研究情报分析师是如何获得洞见的。我们进行了一项定性的、基于访谈的非分类研究,以了解36名解决新问题的情报分析师是如何产生洞察力的。结果表明,在情绪认知和个人社会维度上,出现了一个由两个相互作用的因素——内化紧张和启动——组成的出现过程,这两个因素之间的关系是复杂的。洞察力的出现是不可预测或可控的,这对情报分析人员的管理构成了重大挑战,因为情报机构通常是强调秩序和控制的等级组织,而这些条件与培养洞察力是对立的。这个难题需要管理层在个人和文化上做出重大转变。该研究表明,这些发现适用于任何国家安全组织的情报分析师,无论是国内还是国际。披露声明作者未报告潜在的利益冲突。注1 Thomas H. Kean和Lee Hamilton,《9/11委员会报告:美国恐怖袭击国家委员会的最终报告》(华盛顿特区:美国政府印刷局,2004年),第339页。https://www.9-11commission.gov/report/;Laurence H. Silberman和Charles S. Robb,《美国关于大规模杀伤性武器的情报能力委员会》(华盛顿特区:美国政府印刷局,2005年),第560页。https://www.govinfo.gov/app/details/GPO-WMD2 Jacob W. Getzels和Mihalyi Csikszentmihalyi,“从解决问题到发现问题”,见Irving A. Taylor和Jacob W. Getzels编辑的《创造力的视角》(芝加哥,IL: Aldine, 1975),第90-115.3页。Robert J. Sternberg,“创造力的三方面模型”,见《创造力的本质》,Robert J. Sternberg编辑的《创造力的本质》(剑桥,英国)。斯蒂芬·马林,《通过向他人学习来理解和改进情报分析》,《情报与国家安全》,第32卷,第5期(2017),第539-547页。https://doi.org/10.1080/02684527.2017.1310913;约瑟夫·索特斯,《管理与军事研究:古典与现代基础》(纽约:劳特利奇,2020),第1-10.5页。彼得·A·康宁,“‘涌现’的重新出现:一个寻求理论的可敬概念”,《复杂性》,第7卷,第6期(2002),第18-30页。https://doi.org/10.1002/cplx.100436 Steve W. J. Kozlowski和Katherine J. Klein,“组织中理论和研究的多层次方法:语境、时间和突发过程”,《组织中的多层次理论、研究和方法:基础、扩展和新方向》,由Katherine J. Klein和Steve W. J. Kozlowski编辑(旧金山,CA);Gary Klein和Andrea Jarosz,“洞察力的自然主义研究”,《认知工程与决策杂志》,第5卷,第4期(2011),第335-351页。https://doi.org/10.1177/15553434114270138布鲁诺·拉图尔,科学在行动:如何跟随科学家和工程师通过社会(剑桥,马萨诸塞州:哈佛大学出版社,1987年),第2-3.9米哈里·奇克森特米哈里和基思·索耶,“创造性的洞察力:孤独时刻的社会维度”,在洞察力的本质,由罗伯特J.斯滕伯格和珍妮特E.戴维森编辑(剑桥,马萨诸塞州:斯特兰·奥尔森,“洞察力和相关现象的信息处理解释”,载于马克·t·基恩和肯尼斯·j·吉尔胡利编辑的《思维心理学进展》(亨普斯特德,英国:收割机麦穗,1992),第1-44页;斯特兰·奥尔森,“常规与创造性认知之间的辩证法”,载于洞察力:关于新思想的起源,由弗雷德里克·韦利-图朗高编辑(纽约:劳特利奇出版社,2018年),第8-29.11页。伊万·阿什,本杰明·d·吉和詹妮弗·威利,“调查洞察力作为突然学习”,《问题解决杂志》,第4卷,第2期(2012年),第1-27页。https://doi.org/10.7771/1932-6246.1123.12同上13 Ohlsson,“洞察力和相关现象的信息处理解释”,第1-44.14页同上15 Daniel Kahneman, Thinking, Fast and Slow(纽约:Farrar, Straus and Giroux出版社,2011),第19-30页;William Taggart和Daniel Robey,“思想和管理者:关于人类信息处理和管理的双重性”,《管理评论学会》,第6卷,第2期(1981),第187-195页。https://doi.org/10.5465/amr.1981.4287774;Michael L. Tushman和David A. Nadler,“信息处理作为组织设计中的集成概念”,《管理评论》,1978年第3卷第3期,第613-624页。https://doi.org/10.5465/amr.1981。 428777416 Leon Festinger,《认知失调理论》(斯坦福,加州:斯坦福大学出版社,1957年),第9.17页。John A. Bargh和Tanya L. Chartrand,“在中间研究心灵:启动和自动性研究的实用指南”,《社会和人格心理学研究方法手册》,Harry T. Reis和Charles M. Judd编辑(纽约:剑桥大学出版社,2000年),第253-285.18页。《边界与有机体》,《创造行为杂志》,第43卷,第1期(2009),第1 - 28页。https://doi.org/10.1002/j.2162-6057.2009.tb01303.x19 Thomas Fingar,《减少不确定性:情报分析与国家安全》(斯坦福,CA)《斯坦福安全研究》,2011年),第1-18.20页。国家情报总监办公室,情报共同体指令203,《分析标准》,2015年1月2日,https://www.dni.gov/files/documents/ICD/ICD%20203%20Analytic%20Standards.pdfAdditional信息。关于投稿人的说明。sadrian Wolfberg开始他的情报生涯时是一名EA-3B喷气式航空母舰海军飞行军官,然后是一名民用情报分析师。Adrian的研究集中在大型复杂组织中的挑战,在这些组织中,知识生产者和高级决策者之间的知识交换接受、吸收和处理知识。他在凯斯西储大学韦瑟黑德管理学院获得博士学位,在国家战争学院获得国家安全战略理学硕士学位。可以通过awolfberg@gmail.com与作者联系
{"title":"Helping Intelligence Analysts Gain Insight","authors":"Adrian Wolfberg","doi":"10.1080/08850607.2023.2257549","DOIUrl":"https://doi.org/10.1080/08850607.2023.2257549","url":null,"abstract":"AbtractDecisionmakers expect intelligence assessments to be insightful. Still, intelligence professionals do not understand the insight process well enough to achieve consistently such indispensable outcomes. Little, if any, research has studied how intelligence analysts achieve insights. A qualitative, interview-based unclassified study was conducted to understand how insight emerges in 36 intelligence analysts who solved novel problems. The results include an emergence process consisting of two interacting elements—internalized tensions and priming—across the emotion–cognition and individual–social dimensions, and that the relationship between the two elements is complex. The emergence of insight is not predictable or controllable, which has significant challenges for the management of intelligence analysts because intelligence agencies typically are hierarchical organizations that emphasize order and control, conditions antithetical for nurturing emergence. This conundrum requires a major individual and cultural shift by management. The study suggests that the findings are generalizable across intelligence analysts in any national security organization, domestic or international. Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1 Thomas H. Kean and Lee Hamilton, The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States (Washington, DC: U.S. Government Printing Office, 2004), p. 339. https://www.9-11commission.gov/report/; Laurence H. Silberman and Charles S. Robb, The Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction (Washington, DC: U.S. Government Printing Office, 2005), p. 560. https://www.govinfo.gov/app/details/GPO-WMD2 Jacob W. Getzels and Mihalyi Csikszentmihalyi, “From Problem Solving to Problem Finding,” in Perspectives in Creativity, edited by Irving A. Taylor and Jacob W. Getzels (Chicago, IL: Aldine, 1975), pp. 90–115.3 Robert J. Sternberg, “A Three-Facet Model of Creativity,” in The Nature of Creativity, edited by Robert J. Sternberg (Cambridge, UK: Cambridge University Press, 1988), pp. 125–147.4 Stephen Marrin, “Understanding and Improving Intelligence Analysis by Learning from Others,” Intelligence and National Security, Vol. 32, No. 5 (2017), pp. 539–547. https://doi.org/10.1080/02684527.2017.1310913; Joseph Soeters, Management and Military Studies: Classical and Current Foundations (New York: Routledge, 2020), pp. 1–10.5 Peter A. Corning, “The Re-Emergence of ‘Emergence’: A Venerable Concept in Search of a Theory,” Complexity, Vol. 7, No. 6 (2002), pp. 18–30. https://doi.org/10.1002/cplx.100436 Steve W. J. Kozlowski and Katherine J. Klein, “A Multilevel Approach to Theory and Research in Organizations: Contextual, Temporal, and Emergent Processes,” in Multilevel Theory, Research, and Methods in Organizations: Foundations, Extensions, and New Directions, edited by Katherine J. Klein","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134947345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stronger Together: Intelligence in the English-Speaking West Indies 《共同强大:讲英语的西印度群岛的情报》
Q3 Social Sciences Pub Date : 2023-09-19 DOI: 10.1080/08850607.2023.2252181
Ryan Shaffer
AbstractThis article explores intelligence in the English-speaking West Indies by examining institutions, capabilities, and objectives. It highlights how the British Overseas Territories and independent nations separately and collectively gather and utilize intelligence. The article argues the territories and countries’ sizes and resources as well as their geographic locations significantly shape intelligence networks that collect, share, and use vital security information. In doing so, this article provides the first academic analysis of the region’s intelligence as a whole in understanding how intelligence is viewed, utilized, and shared within territories and countries that are not usually examined in the intelligence studies literature. Disclosure statementThe author reports there are no competing interests to declare.Notes1 For example, see: Christopher Andrew, Defend the Realm: The Authorized History of MI5 (London: Allen Lane, 2009), pp. 477–480; Biko Agozino, Ben Bowling, Elizabeth Ward, and Godfrey St Bernard, “Guns, Crime and Social Order in the West Indies,” Criminology & Criminal Justice, Vol. 9, No. 3 (2009). doi:10.1177/1748895809336378; Don D. Marshall and Aretha M. Campbell, “The Consequences of Global Policy Initiatives Against Money Laundering, Terrorist Financing and Tax Evasion on Financial Centres in the Caribbean Region,” in Money Laundering, Terrorist Financing, and Tax Evasion (Cham: Palgrave Macmillan, 2021), pp. 267–324.2 Some examples include: Owen L. Sirrs, Pakistan’s Inter-Services Intelligence Directorate: Covert Action and Internal Operations (New York: Routledge, 2017); Bob de Graaff, “Elements of an Asian Intelligence Culture,” in Intelligence Communities and Cultures in Asia and the Middle East: A Comprehensive Reference, edited by Bob de Graaff (Boulder, CO: Lynne Rienner Publishers, 2020), pp. 461–470; Dheeraj Chaya, India’s Intelligence Culture and Strategic Surprises Spying for South Block (New York: Routledge, 2023); Ryan Shaffer, “Introduction,” African Intelligence Services: Early Postcolonial and Contemporary Challenges, edited by Ryan Shaffer (Lanham, MD: Rowman and Littlefield, 2021), pp. 3–22; Ryan Shaffer, “Introduction,” The Handbook of African Intelligence Cultures, edited by Ryan Shaffer (Lanham, MD: Rowman and Littlefield, 2023), pp. xvii–xxvi; Ryan Shaffer, “Introduction,” The Handbook of Asian Intelligence Cultures, edited by Ryan Shaffer (Lanham, MD: Rowman and Littlefield, 2023), pp. xii–xxi; Ryan Shaffer, “Following in Footsteps: The History of Kenya’s Post-Colonial Intelligence Services,” Studies in Intelligence, Vol. 63, No. 1 (2019), pp. 23–40.3 For example, see: Kevin Peters, “Bahamas-Trinidad Tobago-Jamaica,” in The Handbook of Latin American and Caribbean Intelligence Cultures, edited by Florina Cristiana Matei, Carolyn Halladay, and Eduardo E. Estévez (Lanham, MD: Rowman and Littlefield, 2022), pp. 227–244; Glenn E. McPhee, “Barriers to Collecting ‘Secret Intelligence’ in the Bahamas,”
摘要本文通过考察制度、能力和目标来探讨讲英语的西印度群岛的智力。它突出了英国海外领土和独立国家如何单独或集体地收集和利用情报。这篇文章认为,领土和国家的大小、资源以及地理位置显著地塑造了情报网络,这些网络收集、共享和使用重要的安全信息。在这样做的过程中,本文提供了第一个对该地区情报作为一个整体的学术分析,以了解情报是如何在情报研究文献中通常没有研究过的领土和国家内被看待、利用和共享的。披露声明作者报告无竞争利益需要申报。注1例如,参见:Christopher Andrew,《保卫王国:军情五处的授权历史》(伦敦:Allen Lane出版社,2009),第477-480页;Biko Agozino, Ben Bowling, Elizabeth Ward和Godfrey St Bernard,“西印度群岛的枪支,犯罪和社会秩序”,犯罪学与刑事司法,第9卷,第3期(2009)。doi: 10.1177 / 1748895809336378;Don D. Marshall和Aretha M. Campbell,“全球反洗钱、恐怖主义融资和逃税政策举措对加勒比地区金融中心的影响”,载于《洗钱、恐怖主义融资和逃税》(Cham: Palgrave Macmillan, 2021),第267-324.2页。一些例子包括:Owen L. Sirrs,《巴基斯坦三军情报局:秘密行动和内部行动》(纽约:Routledge, 2017);鲍勃·德·格拉夫,“亚洲情报文化的要素”,《亚洲和中东的情报社区和文化:综合参考》,由鲍勃·德·格拉夫编辑(博尔德,CO: Lynne Rienner出版社,2020),第461-470页;Dheeraj Chaya,印度的情报文化和战略惊喜间谍南区(纽约:劳特利奇,2023);Ryan Shaffer,“介绍,”非洲情报服务:早期后殖民和当代挑战,由Ryan Shaffer编辑(Lanham, MD: Rowman and Littlefield, 2021),第3-22页;Ryan Shaffer,“引言”,《非洲情报文化手册》,由Ryan Shaffer编辑(Lanham, MD: Rowman and Littlefield, 2023),第17 - 26页;Ryan Shaffer,“引言”,《亚洲智力文化手册》,由Ryan Shaffer编辑(Lanham, MD: Rowman and Littlefield, 2023),第12 - 21页;Ryan Shaffer,“跟随脚步:肯尼亚后殖民情报服务的历史”,情报研究,第63卷,第1期(2019),第23-40.3页例如,参见:Kevin Peters,“巴哈马-特立尼达多巴哥-牙买加”,在拉丁美洲和加勒比情报文化手册中,由Florina Cristiana Matei, Carolyn Halladay和Eduardo E. estvez (Lanham, MD: Rowman and Littlefield, 2022),第227-244页;Glenn E. McPhee,“在巴哈马收集‘秘密情报’的障碍”,《国际情报、安全和公共事务杂志》,第18卷,第2期(2016),第93-109页。doi: 10.1080 / 23800992.2016.1196937。另见:Derron Mc Clean,情报改革:特立尼达和多巴哥的考虑(未发表的硕士论文,海军研究生院,2018)。https://apps.dtic.mil/sti/pdfs/AD1069660.pdf4例如,参见:查尔斯·考利,《冲突中的殖民地:英国海外领土的历史》(泰恩河畔纽卡斯尔:剑桥学者出版社,2015)菲利普·洛夫特,《英国海外领土及其总督》,第9583号(伦敦:下议院图书馆,2022年6月30日),第7页。https://researchbriefings.files.parliament.uk/documents/CBP-9583/CBP-9583.pdf6海外领土和内政部(伦敦:内政部,2012),第1页。https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/98668/overseas-territories.pdf7 Loft,英国海外领土及其总督,第5.8页“军情五处的资源和联系”,安全服务,2022年,https://www.mi5.gov.uk/resources-and-links9“我们做什么”,安全服务,2022年,https://www.mi5.gov.uk/what-we-do10海外领土:国防部的贡献(伦敦:国防部,未注明日期)。https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/27626/overseas_territories.pdf11同上12关于英国情报风格在后殖民时期肯尼亚的连续性的一个例子,请参见:Ryan Shaffer,“更多的事情变化:肯尼亚在独立十年中的特殊分支”,非洲情报部门:早期后殖民和当代挑战,由Ryan Shaffer (Lanham, MD)编辑。罗曼和利特菲尔德,2021),第33-46.13 Loft,英国海外领土及其总督,第13.14页“特立尼达和多巴哥被FATF从灰名单中删除”特立尼达和多巴哥政府(2020),http://www.news.gov.tt/content/trinidad-tobago-removed-grey-list-fatf#。 108朱莉塔·彼得,“台湾圣卢西亚联手打击跨国犯罪”,圣卢西亚民政、司法和国家安全部,2018年2月5日,https://homeaffairs.govt.lc/news/saint-lucia-taiwan-join-forces-on-transnational-crime109“圣卢西亚委员会会议”,圣卢西亚内政、司法和国家安全部,2019年11月15日,https://homeaffairs.govt.lc/news/the-franco-saint-lucian-committee-meets110“圣卢西亚警察情报不足”,《加勒比全球新闻》,2021年5月5日,https://www.caribbeannewsglobal.com/st-lucia-police-intelligence-found-wanting/111中央情报局,“圣文森特和格林纳丁斯”,《世界概况》(2022年),https://www.cia.gov/the-world-factbook/countries/saint-vincent-and-the-grenadines/112“部门联系人名单”,圣文森特和格林纳丁斯国家安全部(2022年),http://www.security.gov.vc/security/index.php?option=com_conte
{"title":"Stronger Together: Intelligence in the English-Speaking West Indies","authors":"Ryan Shaffer","doi":"10.1080/08850607.2023.2252181","DOIUrl":"https://doi.org/10.1080/08850607.2023.2252181","url":null,"abstract":"AbstractThis article explores intelligence in the English-speaking West Indies by examining institutions, capabilities, and objectives. It highlights how the British Overseas Territories and independent nations separately and collectively gather and utilize intelligence. The article argues the territories and countries’ sizes and resources as well as their geographic locations significantly shape intelligence networks that collect, share, and use vital security information. In doing so, this article provides the first academic analysis of the region’s intelligence as a whole in understanding how intelligence is viewed, utilized, and shared within territories and countries that are not usually examined in the intelligence studies literature. Disclosure statementThe author reports there are no competing interests to declare.Notes1 For example, see: Christopher Andrew, Defend the Realm: The Authorized History of MI5 (London: Allen Lane, 2009), pp. 477–480; Biko Agozino, Ben Bowling, Elizabeth Ward, and Godfrey St Bernard, “Guns, Crime and Social Order in the West Indies,” Criminology & Criminal Justice, Vol. 9, No. 3 (2009). doi:10.1177/1748895809336378; Don D. Marshall and Aretha M. Campbell, “The Consequences of Global Policy Initiatives Against Money Laundering, Terrorist Financing and Tax Evasion on Financial Centres in the Caribbean Region,” in Money Laundering, Terrorist Financing, and Tax Evasion (Cham: Palgrave Macmillan, 2021), pp. 267–324.2 Some examples include: Owen L. Sirrs, Pakistan’s Inter-Services Intelligence Directorate: Covert Action and Internal Operations (New York: Routledge, 2017); Bob de Graaff, “Elements of an Asian Intelligence Culture,” in Intelligence Communities and Cultures in Asia and the Middle East: A Comprehensive Reference, edited by Bob de Graaff (Boulder, CO: Lynne Rienner Publishers, 2020), pp. 461–470; Dheeraj Chaya, India’s Intelligence Culture and Strategic Surprises Spying for South Block (New York: Routledge, 2023); Ryan Shaffer, “Introduction,” African Intelligence Services: Early Postcolonial and Contemporary Challenges, edited by Ryan Shaffer (Lanham, MD: Rowman and Littlefield, 2021), pp. 3–22; Ryan Shaffer, “Introduction,” The Handbook of African Intelligence Cultures, edited by Ryan Shaffer (Lanham, MD: Rowman and Littlefield, 2023), pp. xvii–xxvi; Ryan Shaffer, “Introduction,” The Handbook of Asian Intelligence Cultures, edited by Ryan Shaffer (Lanham, MD: Rowman and Littlefield, 2023), pp. xii–xxi; Ryan Shaffer, “Following in Footsteps: The History of Kenya’s Post-Colonial Intelligence Services,” Studies in Intelligence, Vol. 63, No. 1 (2019), pp. 23–40.3 For example, see: Kevin Peters, “Bahamas-Trinidad Tobago-Jamaica,” in The Handbook of Latin American and Caribbean Intelligence Cultures, edited by Florina Cristiana Matei, Carolyn Halladay, and Eduardo E. Estévez (Lanham, MD: Rowman and Littlefield, 2022), pp. 227–244; Glenn E. McPhee, “Barriers to Collecting ‘Secret Intelligence’ in the Bahamas,”","PeriodicalId":45249,"journal":{"name":"International Journal of Intelligence and Counterintelligence","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135060610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Intelligence and Counterintelligence
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1