|
|
|
|
LEADER |
05338nam a2200553 4500 |
001 |
978-3-319-75232-7 |
003 |
DE-He213 |
005 |
20191220130313.0 |
007 |
cr nn 008mamaa |
008 |
180319s2018 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319752327
|9 978-3-319-75232-7
|
024 |
7 |
|
|a 10.1007/978-3-319-75232-7
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a JZ5587-6009
|
072 |
|
7 |
|a JPS
|2 bicssc
|
072 |
|
7 |
|a POL012000
|2 bisacsh
|
072 |
|
7 |
|a JPS
|2 thema
|
082 |
0 |
4 |
|a 327.1
|2 23
|
245 |
1 |
0 |
|a Technology and the Intelligence Community
|h [electronic resource] :
|b Challenges and Advances for the 21st Century /
|c edited by Margaret E. Kosal.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2018.
|
300 |
|
|
|a IX, 287 p. 24 illus., 21 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Advanced Sciences and Technologies for Security Applications,
|x 1613-5113
|
505 |
0 |
|
|a Acknowledgements -- Introduction -- Interaction of Technology and Organization: Case Study of US Military COMINT in World War II -- Intelligence Innovation: Sputnik, the Soviet Threat, and Innovation in the US Intelligence Community -- Organizational Process, Leadership, and Technology for Intelligence Gathering: Development of Photo-Reconnaissance Satellites in the United States -- Exploring the Contributing Factors Associated with Intelligence Failures During the Cold War -- The Dragon Lady and the Beast of Kandahar: Bush and Obama-era US aerial drone surveillance policy based on a case study comparison of the 1960 U-2 crash with the 2011 RQ-170 crash. Wiretapping: The Interaction of Policy and Technology -- Nuclear Counterproliferation Intelligence -- Organizational Legitimacy and Open Source Intelligence -- Strategic Offensive Cyber Operations: Capabilities, Limitations, and Role of the Intelligence Community -- Promise and Perils of Big Data Science for Intelligence Community -- Situational Awareness in Megacities -- Augmenting Intelligence: What Augmented Reality Technology Means for the Intelligence Community -- Analyzing Public and State Reactions to Global Surveillance Disclosures: Using Ethical Frameworks to Gain Understanding -- Conclusions.
|
520 |
|
|
|a This volume examines the role of technology in gathering, assimilating and utilizing intelligence information through the ages. Pushing the boundaries of existing works, the articles contained here take a broad view of the use and implementation of technology and intelligence procedures during the cold war era and the space race, the September 2011 attacks, and more recent cyber operations. It looks at the development of different technologies, procedural implications thereof, and the underlying legal and ethical implications. The findings are then used to explore the future trends in technology including cyber operations, big data, open source intelligence, smart cities, and augmented reality. Starting from the core aspects of technical capabilities the articles dig deeper, exploring the hard and soft infrastructure of intelligence gathering procedures and focusing on the human and bureaucratic procedures involved therein. Technology and innovation have played an important role in determining the course of development of the intelligence community. Intelligence gathering for national security, however, is not limited only to the thread of technical capabilities but is a complex fabric of organizational structures, systemic undercurrents, and the role of personnel in key positions of decision making. The book's findings and conclusions encompass not just temporal variation but also cut across a diverse set of issue areas. This compilation is uniquely placed in the interdisciplinary space combining the lessons from key cases in the past to current developments and implementation of technology options.
|
650 |
|
0 |
|a Security, International.
|
650 |
|
0 |
|a System safety.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Technology-Sociological aspects.
|
650 |
|
0 |
|a Computer crimes.
|
650 |
1 |
4 |
|a International Security Studies.
|0 http://scigraph.springernature.com/things/product-market-codes/912120
|
650 |
2 |
4 |
|a Security Science and Technology.
|0 http://scigraph.springernature.com/things/product-market-codes/P31080
|
650 |
2 |
4 |
|a Systems and Data Security.
|0 http://scigraph.springernature.com/things/product-market-codes/I28060
|
650 |
2 |
4 |
|a Science and Technology Studies.
|0 http://scigraph.springernature.com/things/product-market-codes/X22270
|
650 |
2 |
4 |
|a Cybercrime.
|0 http://scigraph.springernature.com/things/product-market-codes/1B7000
|
700 |
1 |
|
|a Kosal, Margaret E.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319752310
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319752334
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030091774
|
830 |
|
0 |
|a Advanced Sciences and Technologies for Security Applications,
|x 1613-5113
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-75232-7
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-POS
|
950 |
|
|
|a Political Science and International Studies (Springer-41174)
|