首页 > 最新文献

Intelligence and National Security最新文献

英文 中文
Big data, emerging technologies and the characteristics of ‘good intelligence’ 大数据、新兴技术和 "好情报 "的特点
IF 1.2 3区 社会学 Q1 HISTORY Pub Date : 2023-12-04 DOI: 10.1080/02684527.2023.2287255
Miah Hammond-Errey
{"title":"Big data, emerging technologies and the characteristics of ‘good intelligence’","authors":"Miah Hammond-Errey","doi":"10.1080/02684527.2023.2287255","DOIUrl":"https://doi.org/10.1080/02684527.2023.2287255","url":null,"abstract":"","PeriodicalId":47048,"journal":{"name":"Intelligence and National Security","volume":"33 26","pages":""},"PeriodicalIF":1.2,"publicationDate":"2023-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138602651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research note: ‘a cuckoo in the diplomatic service nest’: freedom of information and the ‘English Desk’ of the Information Research Department (IRD) 研究笔记:“外交服务巢中的杜鹃”:信息自由和信息研究部(IRD)的“英语台”
3区 社会学 Q1 HISTORY Pub Date : 2023-11-06 DOI: 10.1080/02684527.2023.2263947
Rory Cormac, Dan Lomas
{"title":"Research note: ‘a cuckoo in the diplomatic service nest’: freedom of information and the ‘English Desk’ of the Information Research Department (IRD)","authors":"Rory Cormac, Dan Lomas","doi":"10.1080/02684527.2023.2263947","DOIUrl":"https://doi.org/10.1080/02684527.2023.2263947","url":null,"abstract":"","PeriodicalId":47048,"journal":{"name":"Intelligence and National Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135634362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Uncivil War: the British Army and the Troubles, 1966-1975 Uncivil War: the British Army and the Troubles, 1966-1975 , by Huw Bennett, Cambridge, Cambridge University Press, 2023, 427 pp., £25 (Hbk), ISBN: 9781107136380 《非内战:英国军队与动乱,1966-1975》,休·贝内特著,剑桥,剑桥大学出版社,2023年,427页,25英镑(Hbk), ISBN: 9781107136380
3区 社会学 Q1 HISTORY Pub Date : 2023-11-06 DOI: 10.1080/02684527.2023.2272327
Tim Wilson
"Uncivil War: the British Army and the Troubles, 1966-1975." Intelligence and National Security, ahead-of-print(ahead-of-print), pp. 1–2 Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1. Charles Townshend, The British Campaign in Ireland, 1919–1921: The development of political and military policies. Oxford: Oxford University Press, 1975.2. Edward Burke, An Army of Tribes: British Army Cohesion, Deviancy and Murder in Northern Ireland. Liverpool: Liverpool University Press, 2018.3. J. Bowyer Bell, A Time of Terror: How Democratic Societies Respond to Revolutionary Violence. New York: Basic Books, 1978, 131.4. The BAOR was the United Kingdom’s main land contribution to NATO. Headquartered at JHQ Rheindahlen in West Germany between 1954 and 2013. The BAOR was commanded by a general and consisted – in peacetime – of British I Corps and supporting units. In 1969 the BAOR deployed some 53,000 troops.5. The PIRA emerged in December 1969 after a split within the IRA and the Irish Republican movement. By 1972 it had succeeded the Official IRA (OIRA) as the dominant Republican paramilitary organisation.6. The MRF was a covert intelligence-gathering and counterinsurgency unit of the British Army. It was formed in Northern Ireland in 1971 and disbanded in late 1972.
《非内战:1966-1975年英国军队与麻烦》《情报与国家安全》,印前(ahead-of-print),第1-2页。披露声明作者未报告潜在利益冲突。查尔斯·汤森:《英国在爱尔兰的战役,1919-1921:政治和军事政策的发展》。牛津:牛津大学出版社,1975.2。爱德华·伯克:《部落军队:北爱尔兰的英国军队凝聚力、叛变与谋杀》。利物浦:利物浦大学出版社,2018.3。J.鲍耶·贝尔:《恐怖时代:民主社会如何应对革命暴力》。纽约:基础图书,1978,131.4。BAOR是英国对北约的主要陆上贡献。1954年至2013年间,总部位于西德莱茵达伦JHQ。BAOR由一名将军指挥,在和平时期由英国第1军和支援部队组成。1969年,BAOR部署了大约53,000名士兵。爱尔兰共和军和爱尔兰共和运动分裂后,PIRA于1969年12月成立。到1972年,它已接替官方爱尔兰共和军(OIRA)成为占统治地位的共和派准军事组织。MRF是英国陆军的秘密情报收集和反叛乱部队。它于1971年在北爱尔兰成立,并于1972年底解散。
{"title":"Uncivil War: the British Army and the Troubles, 1966-1975 <b>Uncivil War: the British Army and the Troubles, 1966-1975</b> , by Huw Bennett, Cambridge, Cambridge University Press, 2023, 427 pp., £25 (Hbk), ISBN: 9781107136380","authors":"Tim Wilson","doi":"10.1080/02684527.2023.2272327","DOIUrl":"https://doi.org/10.1080/02684527.2023.2272327","url":null,"abstract":"\"Uncivil War: the British Army and the Troubles, 1966-1975.\" Intelligence and National Security, ahead-of-print(ahead-of-print), pp. 1–2 Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1. Charles Townshend, The British Campaign in Ireland, 1919–1921: The development of political and military policies. Oxford: Oxford University Press, 1975.2. Edward Burke, An Army of Tribes: British Army Cohesion, Deviancy and Murder in Northern Ireland. Liverpool: Liverpool University Press, 2018.3. J. Bowyer Bell, A Time of Terror: How Democratic Societies Respond to Revolutionary Violence. New York: Basic Books, 1978, 131.4. The BAOR was the United Kingdom’s main land contribution to NATO. Headquartered at JHQ Rheindahlen in West Germany between 1954 and 2013. The BAOR was commanded by a general and consisted – in peacetime – of British I Corps and supporting units. In 1969 the BAOR deployed some 53,000 troops.5. The PIRA emerged in December 1969 after a split within the IRA and the Irish Republican movement. By 1972 it had succeeded the Official IRA (OIRA) as the dominant Republican paramilitary organisation.6. The MRF was a covert intelligence-gathering and counterinsurgency unit of the British Army. It was formed in Northern Ireland in 1971 and disbanded in late 1972.","PeriodicalId":47048,"journal":{"name":"Intelligence and National Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135636212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling the intelligence requirements and priorities process: the US response to the Rwandan genocide 模拟情报需求和优先顺序过程:美国对卢旺达种族灭绝的反应
3区 社会学 Q1 HISTORY Pub Date : 2023-11-05 DOI: 10.1080/02684527.2023.2270607
Neveen Abdalla
In the US, national security outcomes tend to be categorised as either the responsibility of the intelligence or policy community. Few discuss systemic outcomes emanating from the requirements and priorities (R&P) process, a top-level collaborative effort that determines national security objectives and establishes the means to address them. Here, a holistic model is introduced to examine the R&P process alongside the binary functions of intelligence and policy, and tested against two mandates of the US response to the Rwandan genocide: evacuation of American expats, and broader intervention. Such macroscopic investigations can better identify the root causes of national security outcomes.
在美国,国家安全结果往往被归类为情报部门或政策部门的责任。很少有人讨论从需求和优先级(R&P)过程中产生的系统结果,这是决定国家安全目标并建立解决它们的方法的顶级协作努力。在这里,引入了一个整体模型来检查研发过程以及情报和政策的二元功能,并针对美国对卢旺达种族灭绝反应的两项任务进行了测试:撤离美国侨民和更广泛的干预。这种宏观调查可以更好地找出国家安全结果的根本原因。
{"title":"Modelling the intelligence requirements and priorities process: the US response to the Rwandan genocide","authors":"Neveen Abdalla","doi":"10.1080/02684527.2023.2270607","DOIUrl":"https://doi.org/10.1080/02684527.2023.2270607","url":null,"abstract":"In the US, national security outcomes tend to be categorised as either the responsibility of the intelligence or policy community. Few discuss systemic outcomes emanating from the requirements and priorities (R&P) process, a top-level collaborative effort that determines national security objectives and establishes the means to address them. Here, a holistic model is introduced to examine the R&P process alongside the binary functions of intelligence and policy, and tested against two mandates of the US response to the Rwandan genocide: evacuation of American expats, and broader intervention. Such macroscopic investigations can better identify the root causes of national security outcomes.","PeriodicalId":47048,"journal":{"name":"Intelligence and National Security","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135725254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The New Zealand intelligence community and effects operations: the covert action dilemma 新西兰情报界和影响行动:秘密行动的困境
3区 社会学 Q1 HISTORY Pub Date : 2023-11-03 DOI: 10.1080/02684527.2023.2274142
Murray Place, Rhys Ball
ABSTRACTBounded by current legislation, the New Zealand Intelligence Community (NZIC) is explicitly limited from conducting any form of Covert Action, or what is increasingly being called within New Zealand, Effects Operations. This article aims to understand whether this policy remains both operationally fit for purpose and consistent with the New Zealand public’s understanding and expectations in a time of significant geopolitical and domestic security uncertainty. Supported by 2022 research which surveyed New Zealand public perceptions of the NZIC and the tolerances of Effects Operations, we seek to establish, through an examination of Covert Action policy amongst Five Eyes partners and New Zealand intelligence literature, an understanding of a working definition of Effects Operations, and show that despite previous thinking linked to ethical challenges related to the conduct of such activity, the wider New Zealand public is likely to be supportive of some form of NZIC Effects Operations mandate in the service of national security policy goals. This research thus further reinforces recent independent assessments that the current NZIC legislation, the 2017 Intelligence and Security Act, is not completely fit for purpose and remains overly restrictive in a way that limits future policy options like Effects Operations and needs to be further considered. Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1. United States, United Kingdom, Canada, Australia and New Zealand.2. Rogers and Mawdsley, “Turning the Dial,” 2021.3. Lowenthal, Intelligence: From Secrets to Policy, 249.4. R George, Intelligence and Strategy, 2013, 156; see also, Alan Breakspear, “A New Definition of Intelligence,” 2013, 678–93,; DeVine, “Covert Action and Clandestine Activities” 2019,; Erwin, “Covert Action: Legislative Background,” 2013,; Cormac et al.,, “What Constitutes Successful Covert Action?” 2022, 111–28,; Cormac and Aldrich, “Grey Is the New Black” 2018,: 477–94,; Cormac, ”Disruption and Deniable Interventionism” 2017, 169–91,; Warner, ‘A Matter of Trust’, 2019, 33–42.5. Christopher Andrew, The Secret World, 2018, 690.6. Ibid., 690–91.7. Cormac and Aldrich, “Grey Is the New Black”.8. Lowenthal, Intelligence: From Secrets to Policy, Chapter 8.9. Ibid., 263.10. Cormac and Aldrich, “Grey Is the New Black”.11. Ibid., 487–88.12. Ibid., 488.13. Ibid., 480; Joseph and Poznansky, “Media Technology, Covert Action,” 2018, 320–35.14. Cormac and Aldrich, Grey Is the New Black; see also, Graphika and Stanford, ‘Unheard Voice’, 2022.15. Grey Zone activity is contemporary terminology for activity short of warfare. Covert Action is an activity within the theory of the Grey Zone.16. Monaghan, “Bad Idea,” 2021.17. Cullen and Reddy, “Intelligence and Security,” 2016, 3–14; Intelligence and Security Act 2017.18. Cullen and Reddy, “Intelligence and Security,” 83–84; Gee and Patman, ‘Small State or Minor Power?’, 2021, 38.19. Cullen and Reddy, “Intell
摘要受现行立法的限制,新西兰情报界(NZIC)被明确限制进行任何形式的秘密行动,或者在新西兰越来越多地被称为“影响行动”。本文旨在了解在地缘政治和国内安全存在重大不确定性的情况下,这一政策在操作上是否符合目的,是否符合新西兰公众的理解和期望。2022年的一项研究调查了新西兰公众对NZIC的看法和对效果行动的容忍程度,我们试图通过对五眼合作伙伴之间的秘密行动政策和新西兰情报文献的审查,建立对效果行动工作定义的理解,并表明尽管之前的想法与此类活动的行为相关的道德挑战有关,更广泛的新西兰公众可能会支持某种形式的NZIC影响行动授权,为国家安全政策目标服务。因此,这项研究进一步强化了最近的独立评估,即目前的NZIC立法,即2017年的情报和安全法,并不完全符合目的,并且在某种程度上仍然过于严格,限制了未来的政策选择,如影响操作,需要进一步考虑。披露声明作者未报告潜在的利益冲突。美国、英国、加拿大、澳大利亚和新西兰。罗杰斯和莫兹利,《拨动拨号盘》,2021.3。《情报:从秘密到政策》,第249.4页。R George,《情报与战略》,2013,156;另见Alan Breakspear,《智能的新定义》,2013,第678-93页;迪瓦恩,《秘密行动和秘密活动》,2019;Erwin,《秘密行动:立法背景》,2013;Cormac等人,《成功的秘密行动是什么?》“2022,111-28,;科马克和奥尔德里奇,《灰色生活》(Grey Is the New Black) 2018,第477-94页;科马克,“破坏与可否认的干预主义”,2017,169-91;华纳,《信任问题》,2019,33-42.5。克里斯托弗·安德鲁,《秘密世界》,2018年,690.6。出处同上,690 - 91.7。科马克和奥尔德里奇,《新黑人格蕾》《情报:从秘密到政策》,第8.9章。如上,263.10。科马克和奥尔德里奇,《新黑人格蕾》出处同上,487 - 88.12。如上,488.13。出处同上,480;Joseph和Poznansky,“媒体技术,秘密行动”,2018,320-35.14。科马克和奥尔德里奇,《新黑人格蕾》;另见Graphika和Stanford,《未被听到的声音》,2022.15。灰色地带活动是指战争以外的活动。秘密行动是灰色地带理论中的一种活动。莫纳汉,《坏主意》,2021.17。Cullen和Reddy,“情报与安全”,2016,3-14;《2017.18情报与安全法》卡伦和雷迪,《情报与安全》,83-84页;吉和帕特曼,“小国还是小国?”, 2021, 38.19。卡伦和雷迪,《情报与安全》,83-84.20页。《2017.21情报与安全法》Ibid.22。吉尔伯特和埃利,“剃光头和Sonnenrads”,2020,280-94;罗杰斯,《引渡Kim Dotcom》,2015年,第46-57页;罗杰斯和莫兹利,《拨动拨号盘》;史密斯,“紧急与重要”,2019年,第13-37页;Gillespie和Breen,“安全情报机构”,2021,676-95.23。布雷迪,《魔法武器》,2017年,43.24。新西兰安全情报局,“年度报告2021”,2021,35.25。巴特斯比,《新西兰恐怖主义幽灵》,2019年,第45.26页。反恐镇压法新西兰皇家调查委员会,引文2020,第10.28页。同前。新西兰皇家调查委员会,Citation2020,章节2.5.29。30.出于对苏联在新西兰境内无限制的影响的关切,军情五处总干事于1948年和ASIO总干事于1956年相继提出报告,这在很大程度上影响了NZSIS的建立。沃顿,“新西兰安全情报的发展”,2012.31。罗杰斯,《情报与安全法》,2018,657-92;沃顿,《新西兰安全情报的发展》,1993年。亨特,间谍和革命者”,2007;沃顿,“新西兰安全情报的发展”,第6.33章。1969年新西兰安全情报服务法;沃顿,《新西兰安全情报的发展》34。新西兰安全情报服务法1969.35。新西兰安全情报局,“NZSIS任务的演变性质”36。巴特斯比和鲍尔,《幽灵之眼:新西兰和五只眼睛》,9.37。Tonkin-Covell,《收藏家》,2000.38。Filer,《新西兰的信号情报》,2019,2.39。当时被称为新西兰安全部门。Filer,“新西兰的信号情报”,3.41。出处同上,5 - 6.42。2003年政府通信安全局法案,第8.43条。2003年政府通信安全局法案,第8A(b)条。 萨特和必应,“联邦调查局表示它已经破坏了黑客工具”,2023.45年5月10日。Kitteridge,《合规审查》,2013年6月。《2013年情报与安全委员会修正案》第9.47条。针对间谍活动、外国干涉和恐怖主义的立法漏洞正是本报告所指的。48.注意到在《卡伦-雷迪报告》发表时,《林恩·玛尔袭击案》后的《2002年反恐法引用修正案》尚未制定。《2017年情报与安全法》第13条和16.49条。ISA综述,2017,2023,213.50。《2017年情报与安全法》第16(c).51条。美国法典:美国法典第50卷第3093条。迪瓦恩,“秘密行动和秘密活动”,2019年,4.53。如上,4.54。《情报:从秘密到政策》第263.55页。1994年情报服务法。Ibid.57。《1994年情报服务法》第1(b)条。《情报:从秘密到政策》,492.59。1994年情报服务法,第1.60条。《1994年情报服务法》第3(1)(a)条。《1994年情报服务法》第3(2)条。《2001年情报服务法》第6(1)(e)条。2001年情报服务法,第6(2)条。2001年情报服务法,第6(2)条。Hanson and Uren,《政策简报》,2018.66。Hanson and Uren, 6-8;和澳大利亚信号局,REDSPICE, 6.67。《2001年情报服务法》第7(e)(ii)条。Hanson and Uren, <政策简报>,9.69。1979年澳大利亚安全情报组织法,第17(2)条。1979年澳大利亚安全情报组织法。三世;3.71部门。Chubb,“对澳大利亚恐怖主义的看法:1978-2019”,2020.72。国家安全和情报审查机构,《战略与国际研究中心减少威胁活动审查》,2020年,第2.73期。1985年加拿大安全情报服务法,第12.1.74条。国家安全和情报审查机构,《战略与国际研究中心减少威胁活动的审查》,75页。如上,2.76。库珀,“2017年渥太华破坏CSIS调查时,针对温哥华锡克教徒的印度领事馆网络继续‘有增无减’,”2023.77。Ibid.78。《2019年通信安全建立法案》第19.79条。同上,第30.80段。巴特斯比,《新西兰恐怖主义幽灵》,36.81分。新西兰皇家调查委员会,Citation2020.82。如上,分。10;章2.5;45.83段。如上,分。10;章2.5;47.84段。帕特曼和索斯盖特,《国家安全和监视》,85页。这项调查在研究人员的社交网络上发布,并在新西兰一个关注情报和国防的热门Instagram页面上发布——Instagram
{"title":"The New Zealand intelligence community and effects operations: the covert action dilemma","authors":"Murray Place, Rhys Ball","doi":"10.1080/02684527.2023.2274142","DOIUrl":"https://doi.org/10.1080/02684527.2023.2274142","url":null,"abstract":"ABSTRACTBounded by current legislation, the New Zealand Intelligence Community (NZIC) is explicitly limited from conducting any form of Covert Action, or what is increasingly being called within New Zealand, Effects Operations. This article aims to understand whether this policy remains both operationally fit for purpose and consistent with the New Zealand public’s understanding and expectations in a time of significant geopolitical and domestic security uncertainty. Supported by 2022 research which surveyed New Zealand public perceptions of the NZIC and the tolerances of Effects Operations, we seek to establish, through an examination of Covert Action policy amongst Five Eyes partners and New Zealand intelligence literature, an understanding of a working definition of Effects Operations, and show that despite previous thinking linked to ethical challenges related to the conduct of such activity, the wider New Zealand public is likely to be supportive of some form of NZIC Effects Operations mandate in the service of national security policy goals. This research thus further reinforces recent independent assessments that the current NZIC legislation, the 2017 Intelligence and Security Act, is not completely fit for purpose and remains overly restrictive in a way that limits future policy options like Effects Operations and needs to be further considered. Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1. United States, United Kingdom, Canada, Australia and New Zealand.2. Rogers and Mawdsley, “Turning the Dial,” 2021.3. Lowenthal, Intelligence: From Secrets to Policy, 249.4. R George, Intelligence and Strategy, 2013, 156; see also, Alan Breakspear, “A New Definition of Intelligence,” 2013, 678–93,; DeVine, “Covert Action and Clandestine Activities” 2019,; Erwin, “Covert Action: Legislative Background,” 2013,; Cormac et al.,, “What Constitutes Successful Covert Action?” 2022, 111–28,; Cormac and Aldrich, “Grey Is the New Black” 2018,: 477–94,; Cormac, ”Disruption and Deniable Interventionism” 2017, 169–91,; Warner, ‘A Matter of Trust’, 2019, 33–42.5. Christopher Andrew, The Secret World, 2018, 690.6. Ibid., 690–91.7. Cormac and Aldrich, “Grey Is the New Black”.8. Lowenthal, Intelligence: From Secrets to Policy, Chapter 8.9. Ibid., 263.10. Cormac and Aldrich, “Grey Is the New Black”.11. Ibid., 487–88.12. Ibid., 488.13. Ibid., 480; Joseph and Poznansky, “Media Technology, Covert Action,” 2018, 320–35.14. Cormac and Aldrich, Grey Is the New Black; see also, Graphika and Stanford, ‘Unheard Voice’, 2022.15. Grey Zone activity is contemporary terminology for activity short of warfare. Covert Action is an activity within the theory of the Grey Zone.16. Monaghan, “Bad Idea,” 2021.17. Cullen and Reddy, “Intelligence and Security,” 2016, 3–14; Intelligence and Security Act 2017.18. Cullen and Reddy, “Intelligence and Security,” 83–84; Gee and Patman, ‘Small State or Minor Power?’, 2021, 38.19. Cullen and Reddy, “Intell","PeriodicalId":47048,"journal":{"name":"Intelligence and National Security","volume":"28 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135819629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Unified Theory for Intelligence Analysis 情报分析的统一理论
3区 社会学 Q1 HISTORY Pub Date : 2023-11-01 DOI: 10.1080/02684527.2023.2272349
Carles Ortola
ABSTRACTCausation has traditionally been an under-theorized topic. Until Hendrickson’s work, very little effort had been devoted to creating a compelling theory of causation in intelligence analysis. In line with the recent attempts to integrate intelligence theory with philosophy, this article is intended to contribute to the philosophy of intelligence by defining a dedicated account of causation for it. The Unified Theory for Intelligence Analysis, as this account of causation is named, is intended to integrate into a single account Betts’ Normal and Exceptional Theories as well as Hendrickson’s target challenges. It is then proved that a pluralistic account of causation that combines both counterfactual and probabilistic accounts of causation is the most successful option. Finally, it is shown that Bayesian tools are the natural manifestation of this Unified Theory, and that Subjective Logic can help refute criticism against Bayesianism in intelligence analysis. Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1. Phythian, “Intelligence Analysis and Social Science Methods: Exploring the Potential for and Possible Limits of Mutual Learning,” 601.2. Marrin, Improving Intelligence Analysis: Bridging the Gap between Scholarship and Practice.3. Kaupi, “Counterterrorism Analysis 101,” 47.4. Phythian, “Intelligence Analysis and Social Science Methods: Exploring the Potential for and Possible Limits of Mutual Learning,” p. 605.5. Betts, Enemies of Intelligence: Knowledge and Power in American National Security, p. 57.6. Laplace’s demon is a hypothetical being that has perfect knowledge of the position and momentum of every particle in the universe. If such a being existed, it could use this knowledge to predict the future with certainty. Laplace and his contemporaries believed that the universe was deterministic, meaning that every event was caused by a previous event and could be predicted with perfect knowledge. However, later research showed that the universe is not deterministic at the quantum level, meaning that there is an element of randomness in nature. This led to the crisis of classical determinism and the development of probabilistic quantum mechanics, which is a more accurate description of the world.7. Minkel, “If the Universe Were a Computer”.8. Phythian, ‘Intelligence Analysis and Social Science Methods: Exploring the Potential for and Possible Limits of Mutual Learning’. P. 603.9. Hendrickson, Reasoning for Intelligence Analysts: A Multidimensional Approach of Traits, Techniques, and Targets.10. Heuer, “The Evolution of Structured Analytic Techniques,” p. 4.11. Hendrickson, Reasoning for Intelligence Analysts: A Multidimensional Approach of Traits, Techniques, and Targets.12. According to Hendrickson, there is an epistemic continuum from data collection to strategic advice, and it can be divided into four separate stages that can be added up depending on the kind of intelligence to be produced. I
摘要因果关系历来是一个理论化程度较低的话题。在亨德里克森的工作之前,很少有人致力于在情报分析中建立一个令人信服的因果关系理论。根据最近将智力理论与哲学相结合的尝试,本文旨在通过定义其因果关系的专门说明来为智力哲学做出贡献。这种对因果关系的解释被命名为“情报分析统一理论”,其目的是将贝茨的“正常理论”和“例外理论”以及亨德里克森的目标挑战整合到一个单一的解释中。然后证明,结合反事实和概率因果关系的多元因果关系是最成功的选择。最后,本文表明贝叶斯工具是这一统一理论的自然表现,主观逻辑可以帮助反驳对贝叶斯理论在智力分析中的批评。披露声明作者未报告潜在的利益冲突。智力分析和社会科学方法:探索相互学习的潜力和可能的限制,第601.2期。《提高智力分析:弥合学术与实践之间的差距》,第3期。考皮,《反恐分析101》,47.4页。Phythian,“智力分析和社会科学方法:探索相互学习的潜力和可能的限制”,第605.5页。贝茨,《情报的敌人:美国国家安全中的知识和权力》,第57.6页。拉普拉斯妖是一种假设的存在,它对宇宙中每一个粒子的位置和动量都有完美的了解。如果存在这样的生物,它可以利用这些知识来准确地预测未来。拉普拉斯和他的同时代人相信宇宙是决定论的,这意味着每一个事件都是由前一个事件引起的,可以用完美的知识来预测。然而,后来的研究表明,宇宙在量子层面上不是确定性的,这意味着自然界中存在随机性的因素。这导致了经典决定论的危机和概率量子力学的发展,后者是对世界的更准确的描述。8.《如果宇宙是一台计算机》Phythian,“智力分析和社会科学方法:探索相互学习的潜力和可能的限制”。p . 603.9。《情报分析家的推理:特征、技术和目标的多维方法》第10卷。Heuer,“结构化分析技术的演变”,第4.11页。《情报分析家的推理:特征、技术和目标的多维方法》12。亨德里克森认为,从数据收集到战略建议,这是一个认知连续体,它可以分为四个独立的阶段,根据要产生的情报类型,这些阶段可以叠加起来。特别地,他将这个连续体分为:正在发生什么?为什么会发生这种情况?这种变化可能在何时何地发生?客户会如何回应?亨德里克森的四个问题依次成为其中一个阶段的主角。此外,这种分类与爱德华·瓦尔兹的认知领域相似:规定性的、描述性的、探索性的和预测性的。Godson和Wirtz,“战略否认和欺骗”,426.14。贝茨,《情报的敌人:美国国家安全中的知识和权力》,第60.15页。警告困境:正常理论与例外理论>,829.16。情报的敌人:美国国家安全中的知识和权力,6217。危机预测的前景:南太平洋案例研究。, 3118页。亨德里克森,《情报分析的推理:特征、技术和目标的多维方法》19。Hart和Simon, <直想直说:智力分析的问题>,第41期第20页。《定量智能分析:应用分析模型、模拟和游戏》21。Gaspard and Pili, <整合智力理论与哲学:特刊导论>,763.22。张志明,“战略情报的实证主义及其局限性:一种非建构主义的信息鸿沟批判”,第12期。奈特不确定性(Knight uncertainty)是经济学家弗兰克·奈特(Frank Knight)提出的概念,指的是当面对新的或不熟悉的情况,无法确定概率时产生的一种不确定性。桎梏-波普尔不确定性是人类行为和复杂系统固有的不可预测性,这是由于众多相互关联的变量在起作用。《因果知觉与推理的心理学》,第458.25页。下层,“决定论与偶然性”,612.26。Psillos, "规律性理论",132-13327。Berofsky和Mackie,“宇宙的水泥:因果关系的研究”,86.28。《禁果:反事实和国际关系》,259-28629。
{"title":"A Unified Theory for Intelligence Analysis","authors":"Carles Ortola","doi":"10.1080/02684527.2023.2272349","DOIUrl":"https://doi.org/10.1080/02684527.2023.2272349","url":null,"abstract":"ABSTRACTCausation has traditionally been an under-theorized topic. Until Hendrickson’s work, very little effort had been devoted to creating a compelling theory of causation in intelligence analysis. In line with the recent attempts to integrate intelligence theory with philosophy, this article is intended to contribute to the philosophy of intelligence by defining a dedicated account of causation for it. The Unified Theory for Intelligence Analysis, as this account of causation is named, is intended to integrate into a single account Betts’ Normal and Exceptional Theories as well as Hendrickson’s target challenges. It is then proved that a pluralistic account of causation that combines both counterfactual and probabilistic accounts of causation is the most successful option. Finally, it is shown that Bayesian tools are the natural manifestation of this Unified Theory, and that Subjective Logic can help refute criticism against Bayesianism in intelligence analysis. Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1. Phythian, “Intelligence Analysis and Social Science Methods: Exploring the Potential for and Possible Limits of Mutual Learning,” 601.2. Marrin, Improving Intelligence Analysis: Bridging the Gap between Scholarship and Practice.3. Kaupi, “Counterterrorism Analysis 101,” 47.4. Phythian, “Intelligence Analysis and Social Science Methods: Exploring the Potential for and Possible Limits of Mutual Learning,” p. 605.5. Betts, Enemies of Intelligence: Knowledge and Power in American National Security, p. 57.6. Laplace’s demon is a hypothetical being that has perfect knowledge of the position and momentum of every particle in the universe. If such a being existed, it could use this knowledge to predict the future with certainty. Laplace and his contemporaries believed that the universe was deterministic, meaning that every event was caused by a previous event and could be predicted with perfect knowledge. However, later research showed that the universe is not deterministic at the quantum level, meaning that there is an element of randomness in nature. This led to the crisis of classical determinism and the development of probabilistic quantum mechanics, which is a more accurate description of the world.7. Minkel, “If the Universe Were a Computer”.8. Phythian, ‘Intelligence Analysis and Social Science Methods: Exploring the Potential for and Possible Limits of Mutual Learning’. P. 603.9. Hendrickson, Reasoning for Intelligence Analysts: A Multidimensional Approach of Traits, Techniques, and Targets.10. Heuer, “The Evolution of Structured Analytic Techniques,” p. 4.11. Hendrickson, Reasoning for Intelligence Analysts: A Multidimensional Approach of Traits, Techniques, and Targets.12. According to Hendrickson, there is an epistemic continuum from data collection to strategic advice, and it can be divided into four separate stages that can be added up depending on the kind of intelligence to be produced. I","PeriodicalId":47048,"journal":{"name":"Intelligence and National Security","volume":"150 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135371559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Warship 2023 Warship 2023 , edited by John Jordan, London, Osprey, 2023, 224 pp., Illustrated throughout with black-and-white photographs, £45 (hbk), ISBN: 9781472857132 《战舰2023》,约翰·乔丹主编,伦敦,鱼鹰出版社,2023年,224页,全配黑白照片,45英镑(中文版),ISBN: 9781472857132
3区 社会学 Q1 HISTORY Pub Date : 2023-10-24 DOI: 10.1080/02684527.2023.2272326
Jesse Heley
{"title":"Warship 2023 <b>Warship 2023</b> , edited by John Jordan, London, Osprey, 2023, 224 pp., Illustrated throughout with black-and-white photographs, £45 (hbk), ISBN: 9781472857132","authors":"Jesse Heley","doi":"10.1080/02684527.2023.2272326","DOIUrl":"https://doi.org/10.1080/02684527.2023.2272326","url":null,"abstract":"","PeriodicalId":47048,"journal":{"name":"Intelligence and National Security","volume":"55 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135322027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Evolution of African Intelligence Cultures 非洲智力文化的演变
3区 社会学 Q1 HISTORY Pub Date : 2023-10-18 DOI: 10.1080/02684527.2023.2211872
R. Gerald Hughes, Martin Plaut
{"title":"The Evolution of African Intelligence Cultures","authors":"R. Gerald Hughes, Martin Plaut","doi":"10.1080/02684527.2023.2211872","DOIUrl":"https://doi.org/10.1080/02684527.2023.2211872","url":null,"abstract":"","PeriodicalId":47048,"journal":{"name":"Intelligence and National Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135825335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
State Department cipher machines and communications security in the early Cold War, 1944–1965 冷战初期,1944-1965年,国务院密码机和通信安全
3区 社会学 Q1 HISTORY Pub Date : 2023-10-17 DOI: 10.1080/02684527.2023.2269512
David Easter
From 1944 the State Department attempted to improve its communications security by creating a Division of Cryptography and mechanising the encryption process. This article assesses the effectiveness of these reforms and shows that State’s new cipher equipment had cryptographic vulnerabilities. Moreover, the department was unable to maintain physical security at the Moscow embassy and through espionage and technical surveillance the KGB broke the ciphers and read American communications. The paper concludes by analysing the impact of this security failure, including the claim that intercepted messages influenced Stalin’s decision to approve the North Korean invasion of South Korea in 1950.
从1944年开始,美国国务院试图通过创建一个加密部门和机械化加密过程来提高其通信安全性。本文评估了这些改革的有效性,并表明国家的新密码设备存在密码漏洞。此外,该部门无法维持莫斯科大使馆的人身安全,克格勃通过间谍活动和技术监视破译了密码,读取了美国人的通信。论文最后分析了这一安全失误的影响,包括声称截获的信息影响了斯大林在1950年批准朝鲜入侵韩国的决定。
{"title":"State Department cipher machines and communications security in the early Cold War, 1944–1965","authors":"David Easter","doi":"10.1080/02684527.2023.2269512","DOIUrl":"https://doi.org/10.1080/02684527.2023.2269512","url":null,"abstract":"From 1944 the State Department attempted to improve its communications security by creating a Division of Cryptography and mechanising the encryption process. This article assesses the effectiveness of these reforms and shows that State’s new cipher equipment had cryptographic vulnerabilities. Moreover, the department was unable to maintain physical security at the Moscow embassy and through espionage and technical surveillance the KGB broke the ciphers and read American communications. The paper concludes by analysing the impact of this security failure, including the claim that intercepted messages influenced Stalin’s decision to approve the North Korean invasion of South Korea in 1950.","PeriodicalId":47048,"journal":{"name":"Intelligence and National Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135993128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning for times of uncertainty Estimative intelligence in European foreign policymaking. Learning lessons from an era of surprise , edited by Christoph Meyer, Eva Michaels, Nikki Ikani, Aviva Guttmann, Michael S. Goodman, Edinburgh, Edinburgh University Press, 2022, 370 pp., £85.00 (Hardback), ISBN: 9781399505512 不确定时期的学习欧洲外交政策制定中的评估智力。《从惊喜时代汲取教训》,克里斯托弗·迈耶、伊娃·迈克尔斯、尼基·伊卡尼、阿维娃·古特曼、迈克尔·s·古德曼主编,爱丁堡,爱丁堡大学出版社,2022年,370页,85英镑(精装本),ISBN: 9781399505512
3区 社会学 Q1 HISTORY Pub Date : 2023-10-13 DOI: 10.1080/02684527.2023.2269517
Antonio M. Díaz-Fernández
{"title":"Learning for times of uncertainty <b>Estimative intelligence in European foreign policymaking. Learning lessons from an era of surprise</b> , edited by Christoph Meyer, Eva Michaels, Nikki Ikani, Aviva Guttmann, Michael S. Goodman, Edinburgh, Edinburgh University Press, 2022, 370 pp., £85.00 (Hardback), ISBN: 9781399505512","authors":"Antonio M. Díaz-Fernández","doi":"10.1080/02684527.2023.2269517","DOIUrl":"https://doi.org/10.1080/02684527.2023.2269517","url":null,"abstract":"","PeriodicalId":47048,"journal":{"name":"Intelligence and National Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135853783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Intelligence and National Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1