|
Showing 1 - 6 of
6 matches in All Departments
This book builds on the six years of hands-on experience that the
author had while working in the North Atlantic Treaty Organization.
It provides an overview and history of NATO, looks at the political
and military components of the Alliance, as well as the military
command from the perspective of real-world contemporary NATO
operations and planning. The author also looks at the military
training, lessons, and exercise components and how it prepares
forces to support upcoming NATO Response Force (NRF) rotations to
ensure that NATO is a viable threat deterrent and responsive
organization to both Article 5 and non-Article 5 operations. This
book will serve as a primer into the world's longest enduring
Alliance and one that has made an impact on real world operations
over the last 20 years in Europe (Bosnia and Kosovo), Africa
(Libya), Asia (Afghanistan and Pakistan), and the Middle East
(Iraq).
This book analyzes intelligence relations in an unsecure world and
provides contributions on intelligence processes, interstate
intelligence relations and hybrid warfare. Tactical, operational
and strategic intelligence relations, both within and between
intelligence agencies, and between states, are essential to support
decision makers. This book ties together how intelligence adapts to
security changes, global power shifts and the trend from
globalization to a more nationalistic approach. During such
changes, there is a need to analyze intelligence sharing
relationships. Bringing together practitioners and academics, the
book presents a plurality of approaches relative to intelligence
relations that seek to advance the debate in the field.
One of the prevailing issues regarding security to North America
and more pointedly, the United States, gravitates on the topic of
cyber threats confronting this nation. These threats are becoming
more disruptive and destructive and many nations' infrastructure is
vulnerable to them. This book makes use of a qualitative research
methodology looking at a conventional understanding of the four
instruments of power that include diplomacy, information, military
and economic (D.I.M.E.) efforts through the use of the York
Intelligence Red Team Model-Cyber (Modified) and seeing how
adversaries are using them against the United States. Moreover,
this project uses secondary data and makes use of the Federal
Secondary Data Case Study Triangulation Model to ensure a balance
of sources to dissect the problem.
This book analyzes intelligence relations in an unsecure world and
provides contributions on intelligence processes, interstate
intelligence relations and hybrid warfare. Tactical, operational
and strategic intelligence relations, both within and between
intelligence agencies, and between states, are essential to support
decision makers. This book ties together how intelligence adapts to
security changes, global power shifts and the trend from
globalization to a more nationalistic approach. During such
changes, there is a need to analyze intelligence sharing
relationships. Bringing together practitioners and academics, the
book presents a plurality of approaches relative to intelligence
relations that seek to advance the debate in the field.
Threats to peace and stability are real and will likely continue
into the foreseeable future. Likewise, globalization and its
proliferation has made it increasingly difficult in knowing whether
one is a friend or foe. This is particularly true when turning to
the relationship of the five permanent members of the United
Nations Security Council (UNSC); the relationships are not as clear
as was the case two decades ago. Intelligence professionals the
world over would be remiss in their assessments if they fail to
take into account the position of each in the context of
contemporary issues. Countries can be aligned on one issue and yet
diametrically opposed on others. This research looks to enhance
what Ernest Boyer refers to as scholarship of integration and uses
the Federal Qualitative Secondary Data Case Study Triangulation
Model and a variation of a model referred to as the York
Intelligence Red Team Model-Modified (YIRTM-M) to conduct the
analysis. More pointedly, this book looks at issues from the U.S.
perspective to see how the YIRTM-M can be applied to advance its
own interests on the world stage and to better understand when each
can be seen as a friend or foe.
The United States is seemingly confronted with more global issues
now than it has ever experienced. The U.S., under a relatively new
presidential administration, is looking to depart from
globalisation though there are still inextricable linkages among
all countries in the world; in 2018 both the Defense Department and
State Department provided updates to their strategies and security
plans. This book provides an open source intelligence analysis of
regions, countries and non-state actors from around the world that
could have an impact on the United States. These areas and actors
are dissected using predominately qualitative analysis techniques
focusing on secondary data sources in order to provide an open
source intelligence look at threats as seen by the United States
using two models (the York Intelligence Red Team Model and the
Federal Secondary Data Case Study Triangulation Model). The key
audience for this book include the 17 members of the U.S.
intelligence community, members of the U.S. National Security
Council, governments of other countries that share the United
States' assessment of current threats, non-governmental
organisations (NGOs) looking to provide support abroad, and private
sector companies considering expanding their operations overseas.
|
|