排序方式: 共有73条查询结果,搜索用时 15 毫秒
31.
32.
33.
Ross W. Bellaby 《Journal of Military Ethics》2016,15(4):299-319
The surge in threats aided by or carried out through cyberspace has placed significant pressure on the intelligence community to adapt or leave itself open to attack. Indeed, many in both political and intelligence circles argue for access to ever greater amounts of cyber information in order to catch potential threats before they become real. By collecting all our digital information, the intelligence community argues that it is not only able to detail what people have done or are currently doing but also predict what their next move might be. However, the ethical implications are unclear and the backlash following Edward Snowden’s revelations have shown that such activities are not without controversy. This leaves the debate stuck between the important, ethical role that intelligence can play and the potential for its unrestrained use to cause undue harm. This paper will resolve this by giving greater detail to cyber-intelligence practices, highlighting the different levels of harm that the various intelligence operations can cause. The essence of this paper is not that cyber-intelligence should be banned outright, but that it can be justified given the necessary circumstances. Therefore, the paper will develop a specialised set of Just Cyber-Intelligence Principles, built on the just war tradition, to outline if and when such activities are justified. 相似文献
34.
The anchoring effect is a well-studied subject. This article connects the effect with the rules-in-use within a military intelligence institution. Particularly the rules-in-use that dictate that an analyst takes his or hers starting point from recently conducted assessments of the specific area or threat. The threat assessment as well as the written assessment were affected. The results show that officers have an aversion to lower a previous given threat assessment. This gives that to understand risk assessment we not only need to understand the methods used, we also need to understand the institutions in which they are used. This is especially relevant for military intelligence as the assessments are conducted in an environment of high uncertainty. 相似文献
35.
论全资产可视性与通用装备保障创新 总被引:3,自引:2,他引:1
提出了多兵种合同作战和联合作战条件下 ,通用装备保障应实现“全谱支持”的新思路。结合对台军事斗争中对通用装备保障的需求 ,提出了必须在器材请领、储存处理、在运资产、战区内装备管理等四个领域达到联合全资产可视性的要求 ,并给出了联合全资产可视性建设的效益分析 相似文献
36.
37.
Secure second strike nuclear forces are frequently held to be easy to procure. Analysts have long argued that targeting intelligence against relocatable targets like submarine launched and land mobile ballistic missiles is difficult to obtain. However, the scholarly consensus on intelligence for counterforce operations is seriously overdrawn. Both during and after the Cold War, the United States developed substantial intelligence capabilities to track and target submarines and mobile missiles. These efforts achieved important and under-appreciated success. Second strike forces have been far more vulnerable than most analysts are willing to credit. 相似文献
38.
In the late 1950s, as intercontinental ballistic missiles (ICBMs) replaced bombers, the development of Soviet ICBMs prompted fears of strategic vulnerability in the West. The Eisenhower administration's decision to deploy Intermediate Range Ballistic Missiles (IRBMs) on the territory of NATO allies sought to redress the perceived vulnerability until American ICBMs were ready. British deception planners considered how to enhance the threat posed by the IRBMs. An outline plan codenamed ‘Celestial’ was intended to persuade the Soviets that the otherwise vulnerable missiles could not be readily neutralised. This article explores this deception and how such planning also sought to convey accurate information alongside disinformation. It also suggests that deception planners appear to have given little heed to the potentially counterproductive consequences of such an operation. 相似文献
39.
Alexander Ovodenko 《战略研究杂志》2013,36(1):119-144
As the January 1968 Tet holiday approached, CIA analysts and American commanders in South Vietnam developed more accurate conclusions about communist military strategy than did intelligence analysts at CIA headquarters. Besides valuing different types of intelligence, General William Westmoreland, Lieutenant General Frederick Weyand, and CIA analysts in Saigon also placed greater emphasis on new information about communist military strategy than did CIA analysts at Langley. These different reactions to information highlight reasons why military commanders and intelligence analysts stationed in the theater of operations might develop more accurate conclusions about enemy military strategy than intelligence analysts stationed at their national headquarters. 相似文献
40.
Erik J Dahl 《战略研究杂志》2013,36(1):31-55
Many scholars and analysts have studied intelligence failure and surprise and developed theories to explain disasters such as the attack on Pearl Harbor. Others, especially since the 9/11 attacks, have examined the rising threat of terrorism and see it as posing a particularly difficult challenge for the intelligence community. But little work has been done to integrate the earlier literature on intelligence failure with the newer threat of terrorist attack. This article attempts such an integration, by examining the bombing of the US Marine Barracks in Beirut in 1983; it concludes that most studies of the Beirut bombing are mistaken in their assessment of the role played by intelligence in that disaster, and suggests that our understanding of intelligence failure against surprise attacks needs to be revised in the age of terrorism. 相似文献