23,718 research outputs found

    Secrecy and Intelligence: Introduction

    Get PDF
    The catalyst for this special issue of Secrecy and Society stems from a workshop titled “Secrecy and Intelligence: Opening the Black Box” at North Carolina State University, April, 2016. This workshop brought together interested scholars, intelligence practitioners, and civil society members from the United States and Europe to discuss how different facets of secrecy and other practices shape the production of knowledge in intelligence work. This dialogue aimed to be reflective on how the closed social worlds of intelligence shape what intelligence actors and intelligence analysts, who include those within the intelligence establishment and those on the outside, know about security threats and the practice of intelligence. The papers in this special issue reflect conversations that occurred during and after the workshop

    Uncovering Latent Archetypes from Digital Trace Sequences: An Analytical Method and Empirical Example

    Get PDF
    The widespread availability of digital trace data provides new opportunities for researchers to understand human behaviors at a large scale. Sequences of behavior, captured when individuals interface with an information system, can be analyzed to uncover behavioral trends and tendencies. Rather than assume homogeneity among actors, in this study we introduce a method for identifying subsets of the population which demonstrate similar behavioral trends. The objective of this analysis would be to identify a finite set of behavioral archetypes, which we define as distinct patterns of action displayed by unique subsets of a population. This study makes a contribution to the literature by introducing a novel methodology for analyzing sequences of digital traces. We apply our technique to data from a lab experiment featuring thirty twenty-person teams communicating over Skype

    Losing the War Against Dirty Money: Rethinking Global Standards on Preventing Money Laundering and Terrorism Financing

    Get PDF
    Following a brief overview in Part I.A of the overall system to prevent money laundering, Part I.B describes the role of the private sector, which is to identify customers, create a profile of their legitimate activities, keep detailed records of clients and their transactions, monitor their transactions to see if they conform to their profile, examine further any unusual transactions, and report to the government any suspicious transactions. Part I.C continues the description of the preventive measures system by describing the government\u27s role, which is to assist the private sector in identifying suspicious transactions, ensure compliance with the preventive measures requirements, and analyze suspicious transaction reports to determine those that should be investigated. Parts I.D and I.E examine the effectiveness of this system. Part I.D discusses successes and failures in the private sector\u27s role. Borrowing from theory concerning the effectiveness of private sector unfunded mandates, this Part reviews why many aspects of the system are failing, focusing on the subjectivity of the mandate, the disincentives to comply, and the lack of comprehensive data on client identification and transactions. It notes that the system includes an inherent contradiction: the public sector is tasked with informing the private sector how best to detect launderers and terrorists, but to do so could act as a road map on how to avoid detection should such information fall into the wrong hands. Part I.D discusses how financial institutions do not and cannot use scientifically tested statistical means to determine if a particular client or set of transactions is more likely than others to indicate criminal activity. Part I.D then turns to a discussion of a few issues regarding the impact the system has but that are not related to effectiveness, followed by a summary and analysis of how flaws might be addressed. Part I.E continues by discussing the successes and failures in the public sector\u27s role. It reviews why the system is failing, focusing on the lack of assistance to the private sector in and the lack of necessary data on client identification and transactions. It also discusses how financial intelligence units, like financial institutions, do not and cannot use scientifically tested statistical means to determine probabilities of criminal activity. Part I concludes with a summary and analysis tying both private and public roles together. Part II then turns to a review of certain current techniques for selecting income tax returns for audit. After an overview of the system, Part II first discusses the limited role of the private sector in providing tax administrators with information, comparing this to the far greater role the private sector plays in implementing preventive measures. Next, this Part turns to consider how tax administrators, particularly the U.S. Internal Revenue Service, select taxpayers for audit, comparing this to the role of both the private and public sectors in implementing preventive measures. It focuses on how some tax administrations use scientifically tested statistical means to determine probabilities of tax evasion. Part II then suggests how flaws in both private and public roles of implementing money laundering and terrorism financing preventive measures might be theoretically addressed by borrowing from the experience of tax administration. Part II concludes with a short summary and analysis that relates these conclusions to the preventive measures system. Referring to the analyses in Parts I and II, Part III suggests changes to the current preventive measures standard. It suggests that financial intelligence units should be uniquely tasked with analyzing and selecting clients and transactions for further investigation for money laundering and terrorism financing. The private sector\u27s role should be restricted to identifying customers, creating an initial profile of their legitimate activities, and reporting such information and all client transactions to financial intelligence units

    New Tasks of the Hungarian Military Intelligence Office after NATO Accession

    Get PDF
    The purpose of this article is to discuss the changes in the tasks and roles of the Hungarian Military Intelligence Office (MIO). The introductory paragraphs give a short view of the historical roots of Intelligence, then go on to cite milestones of MIO history, and end with an outline of the organization of the MIO, stressing its strong link to Intelligence gathering and decision making. The major parts of the article explain first, how the MIO has adapted and responded to the challenges facing modern-era Intelligence agencies; and, second, its proposed restructuring, the result of Hungary\u27s NATO accession. The concluding portion contains a summary of the MIO\u27s goals

    A Double Agent Down Under: Australian Security and the Infiltration of the Left

    Get PDF
    Because of its clandestine character, the world of the undercover agent has remained murky. This article attempts to illuminate this shadowy feature of intelligence operations. It examines the activities of one double agent, the Czech-born Maximilian Wechsler, who successfully infiltrated two socialist organizations, in the early 1970s. Wechsler was engaged by the Australian Security Intelligence Organisation. However, he was ‘unreliable’: he came in from the cold and went public. The article uses his exposés to recreate his undercover role. It seeks to throw some light on the recruitment methods of ASIO, on the techniques of infiltration, on the relationship between ASIO and the Liberal Party during a period of political volatility in Australia, and on the contradictory position of the Labor Government towards the security services

    The insider on the outside: a novel system for the detection of information leakers in social networks

    Get PDF
    Confidential information is all too easily leaked by naive users posting comments. In this paper we introduce DUIL, a system for Detecting Unintentional Information Leakers. The value of DUIL is in its ability to detect those responsible for information leakage that occurs through comments posted on news articles in a public environment, when those articles have withheld material non-public information. DUIL is comprised of several artefacts, each designed to analyse a different aspect of this challenge: the information, the user(s) who posted the information, and the user(s) who may be involved in the dissemination of information. We present a design science analysis of DUIL as an information system artefact comprised of social, information, and technology artefacts. We demonstrate the performance of DUIL on real data crawled from several Facebook news pages spanning two years of news articles

    Actionable Intelligence-Oriented Cyber Threat Modeling Framework

    Get PDF
    Amid the growing challenges of cybersecurity, the new paradigm of cyber threat intelligence (or CTI) has gained momentum to better deal with cyber threats. There, however, has been one fundamental and very practical problem of information overload organizations face in constructing an effective CTI program. We developed a cyber threat intelligence prototype that automatically and dynamically performs the correlation of business assets, vulnerabilities, and cyber threat information in a scoped setting to remediate the challenge of information overload. Conveniently called TIME (for Threat Intelligence Modeling Environment), it repeats the cycle of: (1) collect internal asset data; (2) gather vulnerability and threat data; (3) correlate vulnerabilities with assets; and (4) derive CTI and alerts significant internal asset-related vulnerabilities in a timely manner. For this, it takes advantage of CTI reports produced by online sites and several NIST standards intended to formalize vulnerability and threat management

    Dynamic Organizations: Achieving Marketplace and Organizational Agility with People

    Get PDF
    Driven by dynamic competitive conditions, an increasing number of firms are experimenting with new, and what they hope will be, more dynamic organizational forms. This development has opened up exciting theoretical and empirical venues for students of leadership, business strategy, organizational theory, and the like. One domain that has yet to catch the wave, however, is strategic human resource management (SHRM). In an effort to catch up, we here draw on the dynamic organization (DO) and human resource strategy (HRS) literatures to delineate both a process for uncovering and the key features of a carefully crafted HRS for DOs. The logic is as follows. DOs compete through marketplace agility. Marketplace agility requires that employees at all levels engage in proactive, adaptive, and generative behaviors, bolstered by a supportive mindset. Under the right conditions, the essential mindset and behaviors, although highly dynamic, are fostered by a HRS centered on a relatively small number of dialectical, yet paradoxically stable, guiding principles and anchored in a supportive organizational infrastructure. This line of reasoning, however, rests on a rather modest empirical base and, thus, is offered less as a definitive statement than as a spur for much needed additional research
    corecore