Results 91 to 100 of about 10,273 (209)

Counterintelligence Risks in Crew Management and Recruitment: The Role of Profiling and Screening in Shipping Companies

open access: yesBulletin of "Carol I" National Defense University
This paper examines the critical role of profiling screening in countring security threats within the maritime industry, focusing on crew management and recruitment processes.In light of the industry’s susceptibility to espionage, terrorism, and ...
Anastasios-Nikolaos KANELLOPOULOS
doaj   +1 more source

Not Peace, but a Sword: Navy v. Egan and the Case Against Judicial Abdication in Foreign Affairs [PDF]

open access: yes, 2009
In the United States\u27 system of separation of powers, the judiciary must safeguard the rights of individuals from abuses by the political branches of government.
Rathod, Jason
core   +1 more source

Reforming Intelligence: The Challenge of Control in New Democracies [PDF]

open access: yes, 2014
Within the realm of civilian control of the armed forces as a subset of civil-military relations, probably the most problematic issue is control of the intelligence services.
Bruneau, Thomas C.   +1 more
core  

DEVELOPING THEORY ON THE INSURGENT USE OF INTELLIGENCE

open access: yesThe Journal of Intelligence, Conflict and Warfare
On November 15, 2023, Dr. David Strachan-Morris, presented on Developing Theory on the Insurgent Use of Intelligence for this year’s West Coast Security Conference.
David Strachan-Morris
doaj   +1 more source

Personality Disruption as Mental Torture: The CIA, Interrogational Abuse, and the U.S. Torture Act [PDF]

open access: yes, 2019
This Article is a contribution to the torture debate. It argues that the abusive interrogation tactics used by the United States in what was then called the “global war on terrorism” are, unequivocally, torture under U.S. law. To some readers, this might
Luban, David, Newell, Katherine S.
core   +1 more source

Book Reviews

open access: yesJournal of Strategic Security, 2008
Fair Play: The Moral Dilemmas of Spying. By James M. Olson. The Corporate Spy: Industrial Espionage and Counterintelligence in the Multinational Enterprise with Case Studies (Abridged Version) by Edward M. Roche.
Bart Bechtel, Jeffrey Ahn
doaj  

From baseworld to droneworld [PDF]

open access: yes, 2012
Our planet is garrisoned by a network of around 1,100 bases operated by the U.S. military. Many of these sites exist in shadow because they are used for paramilitary operations by Special Forces and the CIA.
Shaw, I.
core  

Analogy of intelligence with other disciplines [PDF]

open access: yes
Intelligence analysis has many important epistemological resemblances with science (problem solving, discovery, skillful use of tools, knowledge verification) and is more interested in a posteriori than a priori knowledge, on how or the basis on which a ...
Sfetcu, Nicolae
core  

Home - About - Disclaimer - Privacy