Spelling suggestions: "subject:"intelligence dervice."" "subject:"intelligence bservice.""
71 |
Intelligence and the development of British grand strategy in the First World WarWest, Kieran Martin January 2011 (has links)
No description available.
|
72 |
George Washington's Development as an Espionage ChiefRitchey, David (David Benjamin 05 1900 (has links)
The American Revolution was a war of movement over great distances. Timely intelligence regarding the strength and location of the enemy was vital to the commanders on both sides. Washington gained his early experience in intelligence gathering in the wilderness during the French and Indian War. By the end of the American Revolution, Washington had become a skilled manager of intelligence. He sent agents behind enemy lines, recruited tory intelligence sources, questioned travelers for information, and initiated numerous espionage missions. Many heroic patriots gathered the intelligence that helped win the War for Independence. Their duties required many of them to pose as one of the enemy, and often incur the hatred of friends and neighbors. Some gave their lives in helping to establish the new American nation. It is possible that without Washington's intelligence service, American independence might not have been won.
|
73 |
The use of intelligence led policing in crime prevention by the South African Police ServiceMashiloane, Ntja Patrick 06 November 2014 (has links)
The advent of democracy in South Africa brought hope for freedom and prosperity for millions of South Africans. The country also experienced an increase in violent crime during those early years of democracy. In order to deal with the threat of crime the government had to develop policing strategies which would eradicate crime and fear of crime. As a young democracy South Africa had to look for policing models which has successfully decreased the high crime rate in developed countries. Fortunately the western democracies like the United Kingdom, United States of America and Australia had some of these answers. Firstly it was community policing, then sector policing, and finally intelligence led policing. This research focuses on the intelligence led policing model by discussing its building blocks in chronological order as follows. Firstly is the historical background of intelligence; Secondly, is information collection; Thirdly is crime analysis; and Fourthly is the Intelligence-cycle, with specific focus on the implementation process in England in the United Kingdom; New Jersey in the United States of America, South Australia State in Australia; and in the Republic of South Africa. A questionnaire was used to collect data on the implementation of intelligence led policing by the South African Police Service / Police Practice / D. Litt. et Phil. (Police Science)
|
74 |
Explaining military, law enforcement and intelligence cooperation between Western statesLewis, Olivier Rémy Tristan David January 2018 (has links)
This thesis answers the question “Why does security cooperation occur between Western states?”. The basic answer is: “Because most state actors do not want their states to integrate”. In other words, cooperation occurs as a coping mechanism, as an imperfect substitute for integration. But the thesis does not only investigate the reasons for cooperation, what Aristotle called the final cause. The thesis also examines the material, formal and efficient causes of cooperation. Such an unorthodox causal explanation of cooperation is based on a Critical Realist philosophy of social science. The application of this philosophy to the empirical study of International Relation is rare, making this thesis original. Beyond the philosophy of social science, the thesis' research design, many of the cases, and much of the data are also rarely used. The research design is an embedded multiple-case study. The states studied are the United States of America, France and Luxembourg. Within each state, the embedded subcases are three types of state security organisations: the armed forces, law enforcement and intelligence agencies. Rarely have these three types of security organisations been compared. Similarly, Luxembourg is seldom studied. Comparing different types of states and different types of state security organisations has not only allowed the main research question to be answered. It has also allowed temporal, spatial, national, and functional variation in cooperation to be identified and theorised. The empirical evidence studied includes participant observation (at the North Atlantic Treaty Organisation) and documents (e.g. state policy documents, annual reports by organisations, reports by parliaments and non-governmental organisations, autobiographies, books by investigative journalists, articles by newspapers and magazines). The thesis is also based on a score of elite interviews (e.g. with ambassadors, diplomatic liaisons, ministerial advisors, foreign ministry officers, military commanders, etc.), and the careful study of both declassified and classified archival records.
|
75 |
The use of intelligence led policing in crime prevention by the South African Police ServiceMashiloane, Ntja Patrick 06 November 2014 (has links)
The advent of democracy in South Africa brought hope for freedom and prosperity for millions of South Africans. The country also experienced an increase in violent crime during those early years of democracy. In order to deal with the threat of crime the government had to develop policing strategies which would eradicate crime and fear of crime. As a young democracy South Africa had to look for policing models which has successfully decreased the high crime rate in developed countries. Fortunately the western democracies like the United Kingdom, United States of America and Australia had some of these answers. Firstly it was community policing, then sector policing, and finally intelligence led policing. This research focuses on the intelligence led policing model by discussing its building blocks in chronological order as follows. Firstly is the historical background of intelligence; Secondly, is information collection; Thirdly is crime analysis; and Fourthly is the Intelligence-cycle, with specific focus on the implementation process in England in the United Kingdom; New Jersey in the United States of America, South Australia State in Australia; and in the Republic of South Africa. A questionnaire was used to collect data on the implementation of intelligence led policing by the South African Police Service / Police Practice / D. Litt. et Phil. (Police Science)
|
76 |
Argentina, Brasil e Chile e o desafio da reconstrução das agencias nacionais civis de inteligencia no contexto no contexto de democratizaçãoAntunes, Priscila Carlos Brandão 25 July 2005 (has links)
Orientador: Eliezer Rizzo de Oliveira / Tese (doutorado) - Universidade Estadual de Campinas, Instituto de Filosofia e Ciencias Humanas / Made available in DSpace on 2018-08-05T00:45:52Z (GMT). No. of bitstreams: 1
Antunes_PriscilaCarlosBrandao_D.pdf: 26356082 bytes, checksum: c01a75fdefd83ce61dece0abae7a04c2 (MD5)
Previous issue date: 2005 / Resumo: Esta tese analisa as recentes reformas nos serviços de inteligência civil brasileiro, argentino
e chileno, no contexto das relações civis militares. Três diferentes problemas analíticos estruturam a pesquisa: A) o desafio institucional da construção de sistemas que sejam eficientes, eficazes e consistentes com as demandas de segurança e defesa nestes países. Como os serviços de inteligência civis têm sido institucionalmente desenhados a partir dos processos de transição e consolidação democrática? B) O desafio institucional de construção de sistemas de inteligência responsáveis, responsivos e consistentes com as
demandas de controle público democrático? Porque os recentes mecanismos de supervisão congressual e accountability têm desempenho diferenciado nos diversos países em termos de sua capacidade de controle sobre as atividadesde inteligência? C) Odesafio profissional da construção de sistemas de inteligência flexíveis, capacitados e analiticamente relevantes. Quais são os mecanismos institucionais mais importantes utilizados em cada país para avaliar o desempenho analítico dos serviços de inteligência? Os objetivos gerais desta
pesquisa são produzir conhecimentos sobre o funcionamento e o papel dos sistemas de inteligência durante processos de consolidação democrática e aumentar o grau de expertise civil e reconhecimento público sobre a importância e os dilemas envolvidos na atuação dos serviços de inteligência / Abstract: This thesis analyzes the recent refonns of the Brazilian, Argentinean and Chilean civic intelligence services in the context of the South American civic-military relationship issues. The research is based on three different problems: A) The institutional challenge of building effective, efficient and consistent intelligence
systems in order to fulfill the demands for security and defense of those countries. How have Latin American civic intelligence services been institutionally planned in the transition and consolidation periods? B) The institutional challenge of designing responsive, consistent and responsible intelligence systems to do what is required by the public democratic controI. Why have the modern means of supervising congress tasks had
distinct perfonnances in the control of intelligence activities considering accountability in those countries? C) The professional challenge of structuring flexible, qualified and analytically relevant intelligence systems. How do those countries deal with the professionalization issues related to intelligence systems analysis? What are the most important institutional devices used to evaluate the analytic perfonnance of intelligence services by the national government in each of those countries? The general objectives of the research are to produce knowledge about the role and operations of intelligence systems during processes of democratic consolidation and to increase civil expertise and public awareness about the importance and the dilemmas involved in the perfonnance of intelligence services / Doutorado / Doutor em Ciências Sociais
|
77 |
Financial market monitoring and surveillance systems framework : a service systems and business intelligence approachDiaz Solis, David Alejandro January 2012 (has links)
The thesis introduces a framework for analysing market monitoring and surveillance systems in order to provide a common foundation for researchers and practitioners to specify, design, implement, compare and evaluate such systems. The proposed framework serves as a reference map for researchers and practitioners to position their work in the context of market monitoring and surveillance, resulting in a useful instrument for the analysis, testing and management of such systems. More specifically, the thesis examines the new requirements for the operation of financial markets, the role of technologies, the recent consultations on the structure and governance of EU and US markets, as well as, future usage scenarios and emerging technologies. It examines the context in which market monitoring and market surveillance systems are currently been used. It reports on their processes, performance, and on the organisational and regulatory environments in which they exist. Furthermore, it develops a set of taxonomies which cover the majority of the concepts of market manipulation, market monitoring, market surveillance, entities, technologies and actors that are relevant for the work in this thesis. Building on the gaps and limitations of the current systems, it proposes a new framework following the Design Science methodology. The usefulness of the framework is evaluated through four critical case studies, which not only help to understand with practical exercises the way how markets monitoring and surveillance systems work, but also to investigate their weaknesses, potential evolution and ways to improve them. For each case study, the thesis develops a fully working prototype tested using a sample prosecution case and evaluated in terms of the appropriateness and suitability of the proposed framework. Finally, implications relating to policies, procedures and future market structures are discussed followed by suggestions for future research.
|
78 |
FISA and warrantless wire-tapping: Does FISA conform to Fourth Amendment standards?Meyer, Aric 05 1900 (has links)
Electronic surveillance for foreign intelligence purposes was largely unregulated prior to 1978. The Foreign Intelligence Surveillance Act of 1978 (hereinafter "FISA") was enacted to implement a judicial authorization process for foreign intelligence electronic surveillance that would effectively balance competing needs for national security and civil liberty under the Fourth Amendment. This study examines the evolution of FISA and its effectiveness under the Fourth Amendment, as assessed by federal reviewing courts and scholars since the statute's enactment. The study concludes that the FISA electronic surveillance authorization process has been effective in providing a constitutional mechanism to obtain foreign intelligence information.
|
79 |
User Acceptance of North Central Texas Fusion Center System by Law Enforcement OfficersOdabasi, Mehmet 12 1900 (has links)
The September 11 terrorist attacks pointed out the lack of information sharing between law enforcement agencies as a potential threat to sound law enforcement in the United States. Therefore, many law enforcement agencies as well as the federal government have been initiating information sharing systems among law enforcement agencies to eradicate the information sharing problem. One of the systems established by Homeland Security is the North Central Texas Fusion Center (NCTFC). This study evaluates the NCTFC by utilizing user acceptance methodology. The unified theory of acceptance and the use of technology is used as a theoretical framework for this study. Within the study, user acceptance literature is examined and various models and theories are discussed. Furthermore, a brief information regarding the intelligence work done by law enforcement agencies are explained. In addition to the NCTFC, several major law enforcement information systems are introduced. The data for this study comes from the users of the NCTFC across the north central Texas region. Surveys and interviews are used to triangulate data. It is found in this study that performance expectancy and effort expectancy are important indicators of system use. Furthermore, outreach and needs assessment are important factors in establishing systems. The results of the study offer valuable input for NCTFC administrators, law enforcement officials, and future researchers.
|
80 |
An analysis of information in South African electronic newspaper articles on cash-in-transit robberies as a source of intelligenceNemutshili, Tshianzi 01 1900 (has links)
The escalating number of cash-in-transit robberies in South Africa is of major concern and this requires information in South African electronic newspaper articles as a source of intelligence. The aim of this study is to determine if newspaper articles on Cash-in-transit robbery can be a source of intelligence.
The researcher identified sources which can be used for data collection that could be turned into intelligence. Electronic newspaper articles were explored and turned into informative documents in terms of information that can be gathered about cash-in-transit robberies. The researcher discussed the available sources of intelligence and intelligence that can be gathered through newspaper articles.
The researcher conducted the study with the purpose of exploring, describing, and empowering. Exploring existing method used to gather intelligence on crime and CIT robberies, exploring and the topic under investigation the by consulting national and international sources and local newspaper articles, in order to obtain new knowledge on the problem, exploring if newspaper articles could provide intelligence on CIT robberies, by examining existing literature to gather information about the sources of intelligence.
Furthermore, the researcher also wanted to describe how newspaper articles can be used in the investigation of CIT robberies. Lastly, to ensure that this research is made available to other researchers who have an interest in exploring the sources of information and the crime intelligence-gathering process.
To accomplish this, the researcher examined national and international literature found in textbooks, research articles; master’s dissertations and PhD theses; newspaper articles (online); and searched the internet with the intention of finding data that could answer the research questions. / Police Practice / M.A. (Criminal Justice)
|
Page generated in 0.0897 seconds