You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book offers a vast conceptual and theoretical exploration of the ways intelligence analysis must change in order to succeed against today's most dangerous combatants and most complex irregular theatres of conflict. Intelligence Analysis: How to Think in Complex Environments fills a void in the existing literature on contemporary warfare by examining the theoretical and conceptual foundations of effective modern intelligence analysis—the type of analysis needed to support military operations in modern, complex operational environments. This volume is an expert guide for rethinking intelligence analysis and understanding the true nature of the operational environment, adversaries, and m...
Sociological theories of crime include: theories of strain blame crime on personal stressors; theories of social learning blame crime on its social rewards, and see crime more as an institution in conflict with other institutions rather than as in- vidual deviance; and theories of control look at crime as natural and rewarding, and explore the formation of institutions that control crime. Theorists of corruption generally agree that corruption is an expression of the Patron–Client relationship in which a person with access to resources trades resources with kin and members of the community in exchange for loyalty. Some approaches to modeling crime and corruption do not involve an explicit ...
This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated patchwork of tactical denial and deception (D&D) techniques and their orchestration in service of an organization’s mission. Concepts for cyber- D&D planning operations and management are detailed within the larger organizational, business, and cyber defense context. It examines the necessity of a comprehensive, active cyber denial scheme. The authors explain the organizational implications of integrating D&D with a legacy cyber strategy, and...
This book offers a vast conceptual and theoretical exploration of the ways intelligence analysis must change in order to succeed against today's most dangerous combatants and most complex irregular theatres of conflict. Intelligence Analysis: How to Think in Complex Environments fills a void in the existing literature on contemporary warfare by examining the theoretical and conceptual foundations of effective modern intelligence analysis—the type of analysis needed to support military operations in modern, complex operational environments. This volume is an expert guide for rethinking intelligence analysis and understanding the true nature of the operational environment, adversaries, and m...
This book examines the theoretical and conceptual foundation of effective modern intelligence collection—the strategies required to support intelligence analysis of the modern, complex operational environments of today's military conflicts or competitive civilian situations such as business. Just as the old rules of conventional warfare and intelligence analysis do not apply fully in the 21st-century environment, neither does the traditional methodology of collecting intelligence on these elusive, adapting foes operating as complex adaptive systems (CAS)—adversaries that excel in today's complex contexts. Intelligence Collection: How To Plan and Execute Intelligence Collection In Complex...
An examination of the ways cyberspace is changing both the theory and the practice of international relations.
John A. Gentry and Joseph S. Gordon update our understanding of strategic warning intelligence analysis for the twenty-first century. Strategic warning—the process of long-range analysis to alert senior leaders to trending threats and opportunities that require action—is a critical intelligence function. It also is frequently misunderstood and underappreciated. Gentry and Gordon draw on both their practitioner and academic backgrounds to present a history of the strategic warning function in the US intelligence community. In doing so, they outline the capabilities of analytic methods, explain why strategic warning analysis is so hard, and discuss the special challenges strategic warning ...
This book describes issues in modeling unconventional conflict and suggests a new way to do the modeling. It presents an ontology that describes the unconventional conflict domain, which allows for greater ease in modeling unconventional conflict. Supporting holistic modeling, which means that we can see the entire picture of what needs to be modeled, the ontology allows us to make informed decisions about what to model and what to omit. The unconventional conflict ontology also separates the things we understand best from the things we understand least. This separation means that we can perform verification, validation and accreditation (VV&A) more efficiently and can describe the competenc...
America in the early twentieth century was rife with threats. Organized crime groups like the Mafia, German spies embedded behind enemy lines ahead of World War I, package bombs sent throughout the country, and the 1920 Wall Street bombing dominated headlines. Yet the story of the one man tasked with combating these threats has yet to be told. The Bulldog Detective: William J. Flynn and America’s First War Against the Mafia, Spies, and Terrorists is the first book to tell the story of Flynn, the first government official to bring down the powerful Mafia, uncover a sophisticated German spy ring in the United States, and launch a formal war on terrorism on his way to becoming one of the most...