Spelling suggestions: "subject:"intelligence."" "subject:"l'intelligence.""
1 |
Evaluating Cyber warLee, Jonathan Iming 21 February 2011 (has links)
Richard A. Clarke and Robert K. Knake’s book, Cyber war, claims to identify a new threat and vulnerability in the United States. By examining the points they make and evaluating them in the context of the first cyber attack, STUXNET, we shall conclude that the technical argument is correct; however the overall argument is incomplete. What they fail to emphasize is the amount of human intelligence involved in committing a successful cyber attack, and the extent to which having intelligence operations greatly enhances a state's cyber capabilities. / text
|
2 |
開放兩岸四區觀光對特殊人員入出境作業之研究 / A Study of special personnel’s entry and exit operations on the cross-strait’s tourism謝佾廷, Hsieh, Yi Teng Unknown Date (has links)
自1949年國民黨政府播遷來臺,兩岸分治從軍事對立與衝突時期(1949-1978)至相互對峙互不往來(1979-1987),直到1987年我宣布解除戒嚴令,基於人道及親情考量,開放民眾赴大陸探親,方開啟我方與大陸之交流。並於2002年1月1日起,開放大陸地區人民來臺觀光,2008年新政府規劃將從7月4日開始,陸續擴大開放大陸人民來臺觀光,預估每年將有110萬人次。就國家安全觀點,尤其有無情報人員藉此來臺滲透、蒐情?實值深入研究與探討。
由於中共至今並未放棄以武力犯臺的意圖,其中來臺觀光對象中之特殊人員,在入出境審核作業上,亦以國家安全為主要考量,為謹慎評估威脅國家及其利益的範圍,在確定威脅之後,下一步驟是發展應變,並保護國家利益的政策設計。致本文在研究方法上,採用文獻分析法、歷史研究法及個案研究法來分析相關資料,並就已查獲之共諜案例研究分析。
本文希望藉由研究結論建議政府相關單位,在規劃擴大開放大陸來臺觀光,更應防範大陸人士假藉觀光名義來臺從事「交通」或滲透之實,並提出更有效國家安全管理機制。 / Since the Kuomintang government withdrew to Taiwan in 1949, Taiwan and Mainland China are divided ruled from the period of military conflict (1949-1978) to the period of non-mutual contact(1979-1987). Until 1987, our government based on the considerations of humanitarian and family ties and announced lifting the Martial Law, then opened residents to the mainland to visit their relatives. And since January 1, 2002, our government opened more mainland people to Taiwan for sightseeing, in 2008, the Kuomintang government won the Presidential Election and plan to continuously open wider to the mainland people to Taiwan for sightseeing by the estimation of annual 1.1 million.
From the view point of national security, particularly the Intelligence personnel may infiltrate to Taiwan to make intelligence collection. So,it is worth profound study and discussion.
As the Mainland China has not given up the intention to armed invasion of Taiwan, The Intelligence personnel pretended tourists are the main targets in the entry and exit audit operations. For cautious assessment of the scope of threats to national interests and for the protection of national interests to develop contingency plans and the policy Planning, this study take the use of Literature analysis , historical research and case studies ,especially focus on a total of the seized spy case study analysis.
We hope that the conclusion of the study would be taken into account by the relevant government units in the planning of further opening up the mainland to Taiwan for sightseeing. in the meanwhile, the relevant units should guard against the guise of mainland tourists to Taiwan in the name of "traffic" but clandestine communication or infiltration in reality, and make more effective national security management mechanism.
|
3 |
Increasing Effectiveness of U.S. Counterintelligence: Domestic and International Micro-Restructuring Initiatives to MitigateFerguson, Cody J. 20 August 2012
Approved for public release; distribution is unlimited. / Cyberespionage is a prolific threat that undermines the power projection capacity of the United States through
reduced economic prowess and a narrowing of the technical advantage employed by the American military.
International attempts to limit hostile cyber activity through the development of institutions, normative patterns of
behavior, or assimilation of existing laws do not provide the American national security decision maker with a timely
or effective solution to address these threats. Unfortunately, the stove-piped, redundant and inefficient nature of the
U.S. counterintelligence community does not deliver a viable alternative to mitigating cyberespionage in an effective
manner. Instituting a domestic and international micro-restructuring approach within the Department of Defense
(DoD) addresses the need for increased effectiveness within an environment of fiscal responsibility. Domestic
restructuring places emphasis on developing a forcing mechanism that compels the DoD counterintelligence services
to develop joint approaches for combating cyberespionage by directly addressing the needs of the Combatant
Commands. International restructuring places an emphasis on expanding cybersecurity cooperation to like-minded
nations and specifically explores the opportunity and challenges for increased cyber cooperation with Taiwan. This
approach recognizes that Taiwan and the United States are both negatively affected from hostile cyber activity
derived from within the People’s Republic of China.
|
4 |
Informační síť hlavního představitele protirakouského odboje T. G. Masaryka v době první světové války / Information network of major representative of anti-Austrian resistance T. G. Masaryk in period of the First World WarKOUTSKÝ, Tomáš January 2016 (has links)
The main goal of this diploma thesis is analysis and reconstruction of the information network of major representative of anti-Austrian resistance abroad T. G. Masaryk in the First World War. The analysis and reconstruction will be put in context of contemporary events. Emphasis will be put on foreign and domestic information sources. It will show by which way and by whom was T. G. Masaryk informed about events in Bohemia and Austria-Hungary and what meaning this information had for his activities abroad.
|
5 |
Competitive intelligence with specific reference to the challenges facing the Competitive Intelligence Professional in South AfricaOdendaal, Bernardus Johannes 09 February 2005 (has links)
Natural tension exists between decision-makers and intelligence professionals. The main problems involve control over the gathering, interpretation, presentation, and the use of intelligence products in the decision-making process. Competitive intelligence (CI) professionals are rarely in a management position, and few managers and decision-makers have the necessary understanding of the value of intelligence products and thus intelligence is often misused or discarded. This situation results in intelligence failures and inappropriate strategic decisions by management. The methodology for the study was to determine the perceptions of CI professionals with regard to the current state of affairs of the CI function in the private sector. The study was conducted among members (n=74) of the South African Association of Competitive Intelligence Professionals. An overview of the development of CI within the South African context was also done, and interviews with key personalities practising CI in South Africa were conducted. The results indicated that many issues and challenges still face the CI professional in the South African environment, such as control over intelligence and the way in which it is used. There is a worrying tendency of third parties gathering intelligence, resulting in a situation where plausible denial is possible. Management perception/ignorance of the capabilities of intelligence in the decision-making process still needs to be addressed. There is also a need for recognition among CI professionals with regard to standards and representation. The CI field is still almost exclusively a male-dominated industry, with high barriers of entry in terms of academic qualifications. The conclusions are that a greater understanding of the requirements and needs of decision-makers, with regard to intelligence products, should be created. Decision-makers also need to understand the limits of intelligence products, and that intelligence products can only be compiled from information that has been gathered in a legal and ethical way. CI professionals have the responsibility to develop an indigenous body of knowledge as a means of making CI an accepted business practice and an indispensable tool in management decision-making. / Dissertation (M (Security Studies))--University of Pretoria, 2006. / Political Sciences / unrestricted
|
6 |
Česká nová vlna v rockové hudbě a politika přestavby 1986-1989 / Czech new wave rock music and the politics of Perestroika 1986-1989Andrs, Jiří January 2020 (has links)
The diploma thesis aims to capture and explain the changes in the milieu of nonconformist rock music in relation to the policy of Perestroika in Czechoslovakia during the years 1986- 89. The primary methodological framework is created by an interpretive trichotomy where each perspective includes various historiographical approaches (sociology of Ivo Možný, postmodern deconstruction of authoritarian discourse, so-called totality from below, etc.). The chapter dealing with the repression of rock music analyses the working methods of secret police (StB) in the 1980s while revealing the background of several typical cases (Pražský výběr, Visací zámek, Michael's Uncle). Next chapter explains the differing approaches of nonconformist rockers towards the cultural relief represented by the official festival "Rockfest". The last analytical chapter deals with perception of contemporary authorities. In conclusion it turns out that the relationship to the authoritarian horizons underwent the most fundamental transformation. The disintegration of those authoritarian horizons led to transformations inside the social field and contributed to the decline of the regime of state socialism.
|
Page generated in 0.1025 seconds