
Strategic Intelligence Management
National Security Imperatives and Information and Communications Technologies
Description
Key Features
- Hot topics like cyber terrorism, Big Data, and Somali pirates, addressed in terms the layperson can understand, with solid research grounding
- Fills a gap in existing literature on intelligence, technology, and national security
Readership
Students in homeland security and national security as well as information security programs in US and EMEA; law enforcement and intelligence practitioners in US, UK, & Europe
Table of Contents
Acknowledgments
Organizations
People
About the Authors
Foreword
Chapter 1. Introduction: Strategy Formation in a Globalized and Networked Age—A Review of the Concept and its Definition
Introduction
National strategy and strategy formulation process
National security
Strategic intelligence
Interconnected world
National security, ICT, and strategy
Section One: National Security Strategies and Issues
Chapter 2. Securing the State: Strategic Responses for an Interdependent World
A catalyst for change
Lessons learned
Contesting terror
National security frameworks
Strategic responses
National security machinery
Security context today
From threat to threat
Challenges ahead
Chapter 3. We Have Met the Enemy and They Are Us: Insider Threat and Its Challenge to National Security
Introduction
Defining the insider threat
The amerithrax case
Summary
Chapter 4. An Age of Asymmetric Challenges—4th Generation Warfare at Sea
Introduction
Definitions: from naval AW to MIAS
Case study: the indian-pacific and sea lines of communication security
Discussion: from asymmetries and irregularities to 4GW
3GW reloaded: a caveat
Conclusion: the perils of “swimming in the instantaneousness of postmodernism”
Chapter 5. Port and Border Security: The First and Last Line of National Security Defense
A new era
Second wave
Independent review
Trans-atlantic terror
Securing the border
All hazards approach
Section Two: The Public, Communication, Risk, and National Security
Chapter 6. Risk Communication, Risk Perception and Behavior as Foundations of Effective National Security Practices
Introduction
Risk communication: a pillar of national security
The importance of effective risk communication
Risk perception: a foundation for understanding public responses to extreme events
Behavior: understanding likely public responses to extreme events
Risk communication in practice
Chapter 7. Promoting Public Resilience against Chemical, Biological, Radiological and Nuclear Terrorism
Introduction
Beyond prevention and security in counterterrorism: promoting public resilience and managing risk
Resilience and the role of the public
Public perceptions, risk communication, and the promotion of resilience
Conclusions: public resilience, CBRN, and human factors
Chapter 8. From Local to Global: Community-based Policing and National Security
Introduction
Policing by consent, community, and prevent
Devilry through the dark web: preventing online radicalization
Implications of online behavior for national security
Conclusion
Chapter 9. The Role of Social Media in Crisis: A European Holistic Approach to the Adoption of Online and Mobile Communications in Crisis Response and Search and Rescue Efforts
Introduction
Lessons from past crisis situations
The role of ICT tools and social media in crisis
The iSAR + Way: approaching a multidimensional problem
Conclusion
About the contributors
Chapter 10. Emerging Technologies and the Human Rights Challenge of Rapidly Expanding State Surveillance Capacities
Introduction
A brief survey of emerging surveillance technologies
Nongovernmental organization policy research: intervention and accountability on surveillance
Human rights and surveillance technologies
Conclusions
Section Three: Technologies, Information, and Knowledge for National Security
Chapter 11. User Requirements and Training Needs within Security Applications: Methods for Capture and Communication
User requirements elicitation
Conducting user requirements elicitation
Security case study
Identifying training needs
Discussion
Conclusion
Acknowledgments
Chapter 12. Exploring the Crisis Management/Knowledge Management Nexus
Introduction
Crisis management
Knowledge management
Concluding reflections: implications for CM
Chapter 13. A Semantic Approach to Security Policy Reasoning
Introduction
Current approaches
Best practice
Business rules
Enterprise architecture frameworks
Threats, vulnerabilities, and security concepts in cgs
Financial trading case study
Security reasoning with the ft transaction graph
Business rule and evolving security policy
Concluding remarks
Chapter 14. The ATHENA Project: Using Formal Concept Analysis to Facilitate the Actions of Responders in a Crisis Situation
Introduction
The athena vision
Architecture narrative
Formal concept analysis
Formal concept analysis for deriving crisis information
Building on prior projects
Conclusion
Chapter 15. Exploiting Intelligence for National Security
Big data: challenges and opportunities
Discussion
Chapter 16. Re-thinking Standardization for Interagency Information Sharing
Introduction
Situation awareness and intelligence gathering
Sources of intelligence data
Creating value-added information
Recognizing developing threats
The benefits of structured data
The limitations of data structuring
The particular problems of natural language information
An agency is not an island
A nation is not an island…
Specific problems in with natural language information
Finding a common representation
A solution for security and law enforcement out of nato
C2LG: A solution for security and law enforcement
C2LG Variant: a language for intelligence and law enforcement
C2LG Variant: crisis management language
Conclusions
Section Four: Future Threats and Cyber Security
Chapter 17. Securing Cyberspace: Strategic Responses for a Digital Age
Cyber terror
Cyber threats
Strategic responses
A new approach
UK Cyber security guiding principles
Cyber collaboration
Chapter 18. National Cyber Defense Strategy
Introduction
Training cyber defense professionals
Types of cyber warrior
Acknowledgments
Chapter 19. From Cyber Terrorism to State Actors’ Covert Cyber Operations
Introduction
Conclusion
Chapter 20. Cyber Security Countermeasures to Combat Cyber Terrorism
Introduction
Cyberphysical attacks
Malware candidates for cyber terrorism
The insider threat
Countermeasures to combat cyber terrorism
The future
Key issues
Chapter 21. Developing a Model to Reduce and/or Prevent Cybercrime Victimization among the User Individuals
Introduction
Crime prevention theories
Crime prevention models
Challenges facing preventive measures
Conclusion
Acknowledgments
Chapter 22. Conclusion: National Security in the Networked Society
National security today and in the future
The public, threats, and new media
Deploying network technologies for national security
Threats to the infrastructure of the networked society
Conclusion
References
Index
Product details
- No. of pages: 340
- Language: English
- Copyright: © Butterworth-Heinemann 2013
- Published: January 17, 2013
- Imprint: Butterworth-Heinemann
- Hardcover ISBN: 9780124071919
- eBook ISBN: 9780124072190
About the Editors
Babak Akhgar
Affiliations and Expertise
Simeon Yates
the University of Liverpool (UK).
Ratings and Reviews
There are currently no reviews for "Strategic Intelligence Management"