You are previewing Strategic Intelligence Management.
O'Reilly logo
Strategic Intelligence Management

Book Description

Strategic Intelligence Management introduces both academic researchers and law enforcement professionals to contemporary issues of national security and information management and analysis. This contributed volume draws on state-of-the-art expertise from academics and law enforcement practitioners across the globe. The chapter authors provide background, analysis, and insight on specific topics and case studies. Strategic Intelligent Management explores the technological and social aspects of managing information for contemporary national security imperatives.

Academic researchers and graduate students in computer science, information studies, social science, law, terrorism studies, and politics, as well as professionals in the police, law enforcement, security agencies, and government policy organizations will welcome this authoritative and wide-ranging discussion of emerging threats.



  • Hot topics like cyber terrorism, Big Data, and Somali pirates, addressed in terms the layperson can understand, with solid research grounding
  • Fills a gap in existing literature on intelligence, technology, and national security

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Acknowledgments
    1. Organizations
    2. People
  6. About the Authors
  7. Foreword
  8. Chapter 1. Introduction: Strategy Formation in a Globalized and Networked Age—A Review of the Concept and its Definition
    1. Introduction
    2. National strategy and strategy formulation process
    3. National security
    4. Strategic intelligence
    5. Interconnected world
    6. National security, ICT, and strategy
  9. Section One: National Security Strategies and Issues
    1. Chapter 2. Securing the State: Strategic Responses for an Interdependent World
      1. A catalyst for change
      2. Lessons learned
      3. Contesting terror
      4. National security frameworks
      5. Strategic responses
      6. National security machinery
      7. Security context today
      8. From threat to threat
      9. Challenges ahead
    2. Chapter 3. We Have Met the Enemy and They Are Us: Insider Threat and Its Challenge to National Security
      1. Introduction
      2. Defining the insider threat
      3. The amerithrax case
      4. Summary
    3. Chapter 4. An Age of Asymmetric Challenges—4th Generation Warfare at Sea
      1. Introduction
      2. Definitions: from naval AW to MIAS
      3. Case study: the indian-pacific and sea lines of communication security
      4. Discussion: from asymmetries and irregularities to 4GW
      5. 3GW reloaded: a caveat
      6. Conclusion: the perils of “swimming in the instantaneousness of postmodernism”
    4. Chapter 5. Port and Border Security: The First and Last Line of National Security Defense
      1. A new era
      2. Second wave
      3. Independent review
      4. Trans-atlantic terror
      5. Securing the border
      6. All hazards approach
  10. Section Two: The Public, Communication, Risk, and National Security
    1. Chapter 6. Risk Communication, Risk Perception and Behavior as Foundations of Effective National Security Practices
      1. Introduction
      2. Risk communication: a pillar of national security
      3. The importance of effective risk communication
      4. Risk perception: a foundation for understanding public responses to extreme events
      5. Behavior: understanding likely public responses to extreme events
      6. Risk communication in practice
    2. Chapter 7. Promoting Public Resilience against Chemical, Biological, Radiological and Nuclear Terrorism
      1. Introduction
      2. Beyond prevention and security in counterterrorism: promoting public resilience and managing risk
      3. Resilience and the role of the public
      4. Public perceptions, risk communication, and the promotion of resilience
      5. Conclusions: public resilience, CBRN, and human factors
    3. Chapter 8. From Local to Global: Community-based Policing and National Security
      1. Introduction
      2. Policing by consent, community, and prevent
      3. Devilry through the dark web: preventing online radicalization
      4. Implications of online behavior for national security
      5. Conclusion
    4. Chapter 9. The Role of Social Media in Crisis: A European Holistic Approach to the Adoption of Online and Mobile Communications in Crisis Response and Search and Rescue Efforts
      1. Introduction
      2. Lessons from past crisis situations
      3. The role of ICT tools and social media in crisis
      4. The iSAR + Way: approaching a multidimensional problem
      5. Conclusion
      6. About the contributors
    5. Chapter 10. Emerging Technologies and the Human Rights Challenge of Rapidly Expanding State Surveillance Capacities
      1. Introduction
      2. A brief survey of emerging surveillance technologies
      3. Nongovernmental organization policy research: intervention and accountability on surveillance
      4. Human rights and surveillance technologies
      5. Conclusions
  11. Section Three: Technologies, Information, and Knowledge for National Security
    1. Chapter 11. User Requirements and Training Needs within Security Applications: Methods for Capture and Communication
      1. User requirements elicitation
      2. Conducting user requirements elicitation
      3. Security case study
      4. Identifying training needs
      5. Discussion
      6. Conclusion
      7. Acknowledgments
    2. Chapter 12. Exploring the Crisis Management/Knowledge Management Nexus
      1. Introduction
      2. Crisis management
      3. Knowledge management
      4. Concluding reflections: implications for CM
    3. Chapter 13. A Semantic Approach to Security Policy Reasoning
      1. Introduction
      2. Current approaches
      3. Best practice
      4. Business rules
      5. Enterprise architecture frameworks
      6. Threats, vulnerabilities, and security concepts in cgs
      7. Financial trading case study
      8. Security reasoning with the ft transaction graph
      9. Business rule and evolving security policy
      10. Concluding remarks
    4. Chapter 14. The ATHENA Project: Using Formal Concept Analysis to Facilitate the Actions of Responders in a Crisis Situation
      1. Introduction
      2. The athena vision
      3. Architecture narrative
      4. Formal concept analysis
      5. Formal concept analysis for deriving crisis information
      6. Building on prior projects
      7. Conclusion
    5. Chapter 15. Exploiting Intelligence for National Security
      1. Big data: challenges and opportunities
      2. Discussion
    6. Chapter 16. Re-thinking Standardization for Interagency Information Sharing
      1. Introduction
      2. Situation awareness and intelligence gathering
      3. Sources of intelligence data
      4. Creating value-added information
      5. Recognizing developing threats
      6. The benefits of structured data
      7. The limitations of data structuring
      8. The particular problems of natural language information
      9. An agency is not an island
      10. A nation is not an island…
      11. Specific problems in with natural language information
      12. Finding a common representation
      13. A solution for security and law enforcement out of nato
      14. C2LG: A solution for security and law enforcement
      15. C2LG Variant: a language for intelligence and law enforcement
      16. C2LG Variant: crisis management language
      17. Conclusions
  12. Section Four: Future Threats and Cyber Security
    1. Chapter 17. Securing Cyberspace: Strategic Responses for a Digital Age
      1. Cyber terror
      2. Cyber threats
      3. Strategic responses
      4. A new approach
      5. UK Cyber security guiding principles
      6. Cyber collaboration
    2. Chapter 18. National Cyber Defense Strategy
      1. Introduction
      2. Training cyber defense professionals
      3. Types of cyber warrior
      4. Acknowledgments
    3. Chapter 19. From Cyber Terrorism to State Actors’ Covert Cyber Operations
      1. Introduction
      2. Conclusion
    4. Chapter 20. Cyber Security Countermeasures to Combat Cyber Terrorism
      1. Introduction
      2. Cyberphysical attacks
      3. Malware candidates for cyber terrorism
      4. The insider threat
      5. Countermeasures to combat cyber terrorism
      6. The future
      7. Key issues
    5. Chapter 21. Developing a Model to Reduce and/or Prevent Cybercrime Victimization among the User Individuals
      1. Introduction
      2. Crime prevention theories
      3. Crime prevention models
      4. Challenges facing preventive measures
      5. Conclusion
      6. Acknowledgments
    6. Chapter 22. Conclusion: National Security in the Networked Society
      1. National security today and in the future
      2. The public, threats, and new media
      3. Deploying network technologies for national security
      4. Threats to the infrastructure of the networked society
      5. Conclusion
  13. References
  14. Index