130 likes | 297 Views
STRATEGIC INTELLIGENCE MANAGEMENT. National Security Imperatives and Information and Communications Technologies. Edited by: Babak Akhgar & Simeon Yates. Introduction. 1. Strategy Formation in a Globalized and Networked Age – A Review of the Concept and its definition Pg. 1
E N D
STRATEGIC INTELLIGENCE MANAGEMENT National Security Imperatives and Information and Communications Technologies Edited by: BabakAkhgar & Simeon Yates
Introduction • 1. Strategy Formation in a Globalized and Networked Age – A Review of the Concept and its definition Pg. 1 • The rise and continued development of digital media and networking has led to the emergence of a multitude of new opportunities, threats and challenges within the context of National Security.
Section 1: National Security Strategies and Issues • 2. Securing the State: Strategic Responses for an Interdependent World, Pg. 10 • In the shadow of 9/11 governments are faced with engineering a new strategy to secure their state’s against emerging threats of terrorism. This chapter explores the operational insights and practitioners’ perspectives of how government's in the Western world create new national security strategies for protecting their citizens from contemporary security threats. • 3. We Have Met the Enemy and They Are Us: Insider Threat and Its Challenge to National Security, Pg. 24 • Some of the most significant threats to national security have emerged from employee’s on the inside. This chapter addresses insider threats and the requirement to address underlying behavioural components alongside the more traditional, technical aspects of security.
Section 1: National Security Strategies and Issues • 4. An Age of Asymmetric Challenges-4th Generation Warfare at Sea, Pg. 36 • While the global security environment continues to evolve and change at short notice a sub-standard maritime security policy can take years to rectify. This chapter places emphasis on the challenges posed by, and the potential for underestimation of asymmetric threats within a naval context. • 5. Port and Border Security: The First and Last Line of National Security Defence, Pg. 49 • A Key aspect of in the preservation of nation states lies in the policing and security of borders. The need to police and protect borders is ever present as terrorist tactics evolve to overcome border security measures. • This chapter examines the diverse range of security challenges encountered in border policing.
Section 2: The public, Communication, Risk, and National Security • 6. Risk Communication, Risk Perception and Behaviour as Foundations of Effective National Security Practices, Pg. 66 • Risk communication, risk perception and behaviour must be recognized as the foundations of effective national security. • This chapter provides insight into the primary drivers and targets of risk communication, perception and behaviour before analysing how perceptions influence the behavioural responses that play a role in determining the impact of extreme events. • 7. Promoting Public Resilience against Chemical, Biological, Radiological and Nuclear Terrorism, Pg. 75 • Counterterrorism policy needs to include measures that improve the resilience of societies and communities in order to enable effective response in instances where preventative measures fail to stop an attack.
Section 2: The public, Communication, Risk, and National Security • 8. From Local to Global: Community-based Policing and National Security, Pg. 85 • The Internet has become a significant instrument for extremists and terrorists. They increasingly utilize online environments to recruit and promote their ideologies. • A mixed approach linking technical solutions with community based “policing” and countering of online radical content is needed in order to profile, detect and prevent online radicalisation. • 9. The Role of Social Media in Crisis..., Pg. 93 • A holistic approach to the effective adoption of the new communication media in crisis management by PPDRs and citizens is presented. • The proposed approach enables the use of those online technologies for a bidirectional information dissemination, sharing, and retrieval between PPDRs, FRs, and citizens.
Section 2: The public, Communication, Risk, and National Security • 10. Emerging Technologies and the Human Rights Challenge of Rapidly Expanding State Surveillance Capacities, Pg. 108 • The emergence and adoption of mobile communications and ICT has changing our way of living fundamentally. • This chapter explores and reviews some of the key emerging technologies and the impact of rapidly expanding state digital surveillance capabilities in terms of citizen's human rights.
Section 3: Technologies, Information, and Knowledge for National Security • 11. User Requirements and Training Needs within Security Applications: Methods for Capture and Communication, Pg. 120 • In order to effectively capture user requirements, it is it is necessary to take a user centred approach to security. • This chapter considers the use of various methods for the collection of user requirements within sensitive domains. • 12. Exploring the Crisis Management/Knowledge Management Nexus, Pg. 134 • The extraction of knowledge from prior experience is as important as ever in improving response to current and potential threats. • This chapter considers the case for the marriage of knowledge management and crisis management to stimulate 'instant learning' in times of crisis, for both current and future application.
Section 3: Technologies, Information, and Knowledge for National Security • 13. A Semantic Approach to Security Policy Reasoning, Pg. 150 • Enterprise architects are increasingly faced with the task of securing ever more complex transactional information systems without being able to model the complexities of security at a business level. • This chapter provides a semantic approach to enable enterprise architects to model the semantics of fraudulent transactions via conceptual graphs. • 14. The ATHENA Project: Using Formal Concept Analysis to Facilitate the Actions of Responders in a Crisis Situation, Pg. 167 • The ATHENA project aims to enable and encourage users of new media to contribute to security in times of crisis. • This chapter provides an explanation of how the huge flows of information available due to mobile communications and social media can be extracted and deployed to aid first responders.
Section 3: Technologies, Information, and Knowledge for National Security • 15. Exploiting Intelligence for National Security, Pg. 181 • It is becoming increasingly challenging to rationalise data sources using traditional analysis and computing solutions. This chapter provides an evaluation of an number of solutions that aim to improve the exploitation of intelligence within the context of national security. • 16. Re-thinking Standardization for Interagency Information Sharing, Pg. 199 • Data is collected in vast quantities for the purpose of national security intelligence. Presented in this chapter are a number of problems that arise due to a lack of standardisation and a potential solution in the form of C2LG (Command & Control Lexical Grammar).
Section 4: Future Threats and Cyber Security • 17. From Cyber Terrorism to State Actors’ Covert Cyber Operations, Pg. 213 • Cyber security poses a number of emergent challenges due to its growing role in society. This chapter explores these threats and examines the countermeasures put in place to protect citizens today and in the future. • 18. National Cyber DefenseStrategy, Pg. 224 • This chapter presents the key strategic goals of the US cyber security strategy placing particular focus upon the human aspects of cyber defence in conjunction with the traditionally prioritized technological aspects.
Section 4: Future Threats and Cyber Security • 19. Securing Cyberspace: Strategic Responses for a Digital Age, Pg. 229 • As we become increasingly reliant on the internet the impact of potential threats is ever increasing. Due to the increase threat upon national security the chapter calls for a modified view of the role of cyberspace in this context to readdress the balance between terrorists and the defending state. • 20. Cyber Security Countermeasures to Combat Cyber Terrorism, Pg. 234 • This chapter assess the characteristics, classification and evolution of cyber-terrorism in order to distinguish it from other cyber crime. • The author then goes on to discuss countermeasures that can be taken by various environmental actors, from citizens right through to international and institutional actors.
Section 4: Future Threats and Cyber Security • 21. Developing a Model to Reduce and/or Prevent Cybercrime Victimization among the User Individuals, Pg. 258 • This chapter presents the growing problem of cyber crime and in particular the problem of victimisation of individuals. • The author reflects upon both criminal and user behaviour in this context in order to model these behaviours with a view to preventing cyber-crime victimisation.