You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The detektiv, Russia's version of the murder mystery, has conquered what in Soviet days loved to call itself 'the most reading nation on earth.' Most Russians don't read much Tolstoy, but they devour the lurid covers and cheap paper of the detektivs by the millions. Serials based on the works of two of the most popular authors (Andrei Kivinov and Aleksandra Marinina) have been hits of the last few TV seasons, their characters now a part of Russian everyday life. The ubiquity of the detektiv may puzzle Westerners, who may conclude that this is a post-Soviet import like McDonalds. Not so—Russia sprouted its own versions of 'penny dreadfuls' as soon as peasants came off the land and learned t...
The book explains how openly available information is undervalued by the intelligence community and how analysts can use of this huge amount of information.
None
None
New communication technology has transformed the way in which news about key events is communicated. For example, in the immediate aftermath of catastrophic events such as the Mumbai attacks or the Japanese tsunami, partial accounts, accurate and inaccurate facts, rumour and speculation are now very rapidly disseminated across the globe, often ahead of official announcements and formal news reporting. Often in such situations rumours take hold, and continue to characterise events even after a more complete, more accurate picture eventually emerges. This book explores how such rumours are created, disseminated and absorbed in the age of the internet and mobile communications. It includes a wide range of examples and, besides considering the overall processes involved, engages with scholarly debates in the field of media and communication studies.
NOTE: NO FURTHER DISCOUNT FOR THIS PRODUCT- OVERSTOCK SALE -- Significantly reduced list price Diagnoses the ills of the intelligence community. Describes the potential that sensemaking offers as a means precisely for helping policymakers to improve how they think about policy. Other related items: Critical Thinking and Intelligence Analysis is available here: https: //bookstore.gpo.gov/products/sku/008-020-01589-0 United States Congressional Serial Set, Serial No. 14876, Senate Report No. 301, U.S. Intelligence Community\'s Prewar Intelligence Assessments on Iraq, Report of Select Committee on Intelligence is available here: https: //bookstore.gpo.gov/products/sku/552-108-00074-4 Crafting an Intelligence Community: Papers of the First Four DCIs (Book and DVD) is available here: https: //bookstore.gpo.gov/products/sku/041-015-00298-8 Interrogation: World War II, Vietnam, and Iraq is available here: https: //bookstore.gpo.gov/products/sku/008-000-01017-0 Who Watches the Watchmen?: The Conflict between National Security and Freedom of the Press is available here: https: //bookstore.gpo.gov/products/sku/008-020-01606-3"
Intelligence is currently facing increasingly challenging cross-pressures from both a need for accurate and timely assessments of potential or imminent security threats and the unpredictability of many of these emerging threats. The essence of intelligence is no longer the collection, analysis, and dissemination of secret information, but has become instead the management of uncertainty in areas critical for overriding security goals.
Over 1,600 total pages ... CONTENTS: AN OPEN SOURCE APPROACH TO SOCIAL MEDIA DATA GATHERING Open Source Intelligence – Doctrine’s Neglected Child (Unclassified) Aggregation Techniques to Characterize Social Networks Open Source Intelligence (OSINT): Issues for Congress A BURNING NEED TO KNOW: THE USE OF OPEN SOURCE INTELLIGENCE IN THE FIRE SERVICE Balancing Social Media with Operations Security (OPSEC) in the 21st Century Sailing the Sea of OSINT in the Information Age Social Media: Valuable Tools in Today‘s Operational Environment ENHANCING A WEB CRAWLER WITH ARABIC SEARCH CAPABILITY UTILIZING SOCIAL MEDIA TO FURTHER THE NATIONWIDE SUSPICIOUS ACTIVITY REPORTING INITIATIVE THE WHO, WHAT AND HOW OF SOCIAL MEDIA EXPLOITATION FOR A COMBATANT COMMANDER Open Source Cybersecurity for the 21st Century UNAUTHORIZED DISCLOSURE: CAN BEHAVIORAL INDICATORS HELP PREDICT WHO WILL COMMIT UNAUTHORIZED DISCLOSURE OF CLASSIFIED NATIONAL SECURITY INFORMATION? ATP 2-22.9 Open-Source Intelligence NTTP 3-13.3M OPERATIONS SECURITY (OPSEC) FM 2-22.3 HUMAN INTELLIGENCE COLLECTOR OPERATIONS