Strategic Intelligence Management
National Security Imperatives and Information and Communications Technologies
Strategic Intelligence Management introduces both academic researchers and law enforcement professionals to contemporary issues of national security and information management and analysis. This contributed volume draws on state-of-the-art expertise from academics and law enforcement practitioners across the globe. The chapter authors provide background, analysis, and insight on specific topics and case studies. Strategic Intelligent Management explores the technological and social aspects of managing information for contemporary national security imperatives.
Academic researchers and graduate students in computer science, information studies, social science, law, terrorism studies, and politics, as well as professionals in the police, law enforcement, security agencies, and government policy organizations will welcome this authoritative and wide-ranging discussion of emerging threats.
Students in homeland security and national security as well as information security programs in US and EMEA; law enforcement and intelligence practitioners in US, UK, & Europe
Hardbound, 340 Pages
Published: March 2013
Imprint: Butterworth Heinemann
Foreword (Lord Carlile of Berriew CBE, QC)
Part 1: Foundation of National Security
1.1 National Security Strategy1.2 A framework for formulation of National security strategies and narratives
1.3 "We have met the enemy and they are us": Insider Threat and its Challenge to National Security1.4 A Global Terrorism Threat Assessment
1.5 4th Generation Warfare at Sea: Implications for National Security1.6. CBRN and threat assessment for global security
Part 2: Understanding tools and techniques2.1 Law enforcement agencies guide to Big data concept and business intelligence
2.2 Critical success factors for data-mining and business intelligence protocols to combat terrorism2.3 Data fusion and knowledge integration in National Security context
2.4 Security Policy Reasoning with the Automated Transaction Graph for financial crimePart 3: Analytical methods and tools
3.1 Social media analysis for crisis management - Athena Project3.2 CT intelligence analysis
3.3 Online behaviour from radical to extremism -analytical models using cognitive maps3.4 Social Media analysis
Part 4: Security applications4.1 Exploring "The Crisis Management/Knowledge Management Nexus"
4.2 Open source exploitation for "Intelligent surveillance and enhancing border security"4.3 Intelligence Management tools for global terrorism assessment
Part 5: Cyber Security and Terrorism5.1 Cyber Security Strategy
5.2 Cyber security Tools and Countermeasures to combat Cyber-Terrorism5.3 "National Cyber Defence Strategy "
5.4 Cyber Security ResearchConcluding remarks