Technology and the Intelligence Community Challenges and Advances for the 21st Century /

This volume examines the role of technology in gathering, assimilating and utilizing intelligence information through the ages. Pushing the boundaries of existing works, the articles contained here take a broad view of the use and implementation of technology and intelligence procedures during the c...

Celý popis

Uloženo v:
Podrobná bibliografie
Médium: Elektronický zdroj E-kniha
Jazyk:angličtina
Vydáno: Cham : Springer International Publishing, 2018.
Vydání:1st ed. 2018.
Edice:Advanced Sciences and Technologies for Security Applications,
Témata:
ISBN:9783319752327
ISSN:1613-5113
On-line přístup: Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!

MARC

LEADER 00000nam a22000005i 4500
003 SK-BrCVT
005 20220618103331.0
007 cr nn 008mamaa
008 180319s2018 gw | s |||| 0|eng d
020 |a 9783319752327 
024 7 |a 10.1007/978-3-319-75232-7  |2 doi 
035 |a CVTIDW14637 
040 |a Springer-Nature  |b eng  |c CVTISR  |e AACR2 
041 |a eng 
245 1 0 |a Technology and the Intelligence Community  |h [electronic resource] :  |b Challenges and Advances for the 21st Century /  |c edited by Margaret E. Kosal. 
250 |a 1st ed. 2018. 
260 1 |a Cham :  |b Springer International Publishing,  |c 2018. 
300 |a IX, 287 p. 24 illus., 21 illus. in color.  |b online resource. 
490 1 |a Advanced Sciences and Technologies for Security Applications,  |x 1613-5113 
500 |a Political Science and International Studies  
505 0 |a Acknowledgements -- Introduction -- Interaction of Technology and Organization: Case Study of US Military COMINT in World War II -- Intelligence Innovation: Sputnik, the Soviet Threat, and Innovation in the US Intelligence Community -- Organizational Process, Leadership, and Technology for Intelligence Gathering: Development of Photo-Reconnaissance Satellites in the United States -- Exploring the Contributing Factors Associated with Intelligence Failures During the Cold War -- The Dragon Lady and the Beast of Kandahar: Bush and Obama-era US aerial drone surveillance policy based on a case study comparison of the 1960 U-2 crash with the 2011 RQ-170 crash. Wiretapping: The Interaction of Policy and Technology -- Nuclear Counterproliferation Intelligence -- Organizational Legitimacy and Open Source Intelligence -- Strategic Offensive Cyber Operations: Capabilities, Limitations, and Role of the Intelligence Community -- Promise and Perils of Big Data Science for Intelligence Community -- Situational Awareness in Megacities -- Augmenting Intelligence: What Augmented Reality Technology Means for the Intelligence Community -- Analyzing Public and State Reactions to Global Surveillance Disclosures: Using Ethical Frameworks to Gain Understanding -- Conclusions. 
516 |a text file PDF 
520 |a This volume examines the role of technology in gathering, assimilating and utilizing intelligence information through the ages. Pushing the boundaries of existing works, the articles contained here take a broad view of the use and implementation of technology and intelligence procedures during the cold war era and the space race, the September 2011 attacks, and more recent cyber operations. It looks at the development of different technologies, procedural implications thereof, and the underlying legal and ethical implications. The findings are then used to explore the future trends in technology including cyber operations, big data, open source intelligence, smart cities, and augmented reality. Starting from the core aspects of technical capabilities the articles dig deeper, exploring the hard and soft infrastructure of intelligence gathering procedures and focusing on the human and bureaucratic procedures involved therein. Technology and innovation have played an important role in determining the course of development of the intelligence community. Intelligence gathering for national security, however, is not limited only to the thread of technical capabilities but is a complex fabric of organizational structures, systemic undercurrents, and the role of personnel in key positions of decision making. The book's findings and conclusions encompass not just temporal variation but also cut across a diverse set of issue areas. This compilation is uniquely placed in the interdisciplinary space combining the lessons from key cases in the past to current developments and implementation of technology options. 
650 0 |a Security, International. 
650 0 |a System safety. 
650 0 |a Computer security. 
650 0 |a Technology-Sociological aspects. 
650 0 |a Computer crimes. 
856 4 0 |u http://hanproxy.cvtisr.sk/han/cvti-ebook-springer-eisbn-978-3-319-75232-7  |y Vzdialený prístup pre registrovaných používateľov 
910 |b ZE11917 
919 |a 978-3-319-75232-7 
974 |a andrea.lebedova  |f Elektronické zdroje 
992 |a SUD 
999 |c 245288  |d 245288