Skip to main content
Top
Published in:
Cover of the book

2018 | OriginalPaper | Chapter

Introduction

Authors : Margaret E. Kosal, Alaina Totten

Published in: Technology and the Intelligence Community

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Technology has become a cornerstone for gathering effective intelligence to combat threats to national security. Rapid technological development in the twentieth century enabled the intelligence community to gather, analyze, and disseminate information at a pace and magnitude that was never before possible. Examples of this include the role of radio technology in revolutionizing communication intelligence as well as aircraft and satellite reconnaissance that provided much-needed intelligence on Soviet weapons capabilities and enabled an increase in intelligence gathering from denied areas across the world. More recent examples that demonstrate the prominence of technology in intelligence gathering include the operation of Unmanned Aerial Vehicles for surveillance of Iran’s weapons capabilities and of Osama bin Laden’s complex in Pakistan. The advent of the information age has further revolutionized these processes. According to the testimony of then-Director of National Intelligence, James Clapper to the Senate Armed Services Committee on worldwide threat assessment, “The consequences of innovation and increased reliance on information technology in the next few years on both our society’s way of life in general and how we in the Intelligence Community specifically perform our mission will probably be far greater in scope and impact than ever” (Clapper 2016).

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Azuma, R. T. (1997, August). A survey of augmented reality. Presence: Teleoperators & Virtual Environments, 6(4), 355–385.CrossRef Azuma, R. T. (1997, August). A survey of augmented reality. Presence: Teleoperators & Virtual Environments, 6(4), 355–385.CrossRef
go back to reference Benes, L. (2013). OSINT, New technologies, education: Expanding opportunities and threats. A new paradigm. Journal of Strategic Security, 6(3.) Supplement. Benes, L. (2013). OSINT, New technologies, education: Expanding opportunities and threats. A new paradigm. Journal of Strategic Security, 6(3.) Supplement.
go back to reference Betts, R. K. (1978). Analysis, War, and Decision: Why intelligence failures are inevitable. World Politics, 31(1), 61–89. Web.CrossRef Betts, R. K. (1978). Analysis, War, and Decision: Why intelligence failures are inevitable. World Politics, 31(1), 61–89. Web.CrossRef
go back to reference Central Intelligence Agency. (2014, September). North Korea: Potential for Nuclear Weapons Development. Central Intelligence Agency. (2014, September). North Korea: Potential for Nuclear Weapons Development.
go back to reference City Protocol Society. (2015). City anatomy: A framework to support city governance, Evaluation and transformation. City Protocol Agreement (CPA-I_001-v2). City Protocol Society. (2015). City anatomy: A framework to support city governance, Evaluation and transformation. City Protocol Agreement (CPA-I_001-v2).
go back to reference Diamond, J. (2008). The CIA and the culture of failure: US intelligence from the end of the Cold War to the Invasion of Iraq. Stanford: Stanford Security Series. Print. Diamond, J. (2008). The CIA and the culture of failure: US intelligence from the end of the Cold War to the Invasion of Iraq. Stanford: Stanford Security Series. Print.
go back to reference Harris, M., Dixon, R., Melin, N., Hendrex, D., Russo, R., & Bailey, M. (2014). Megacities and the United States Army: Preparing for a Complex and Uncertain Future. Arlington: Chief of Staff of The Army Strategic Studies Group. Harris, M., Dixon, R., Melin, N., Hendrex, D., Russo, R., & Bailey, M. (2014). Megacities and the United States Army: Preparing for a Complex and Uncertain Future. Arlington: Chief of Staff of The Army Strategic Studies Group.
go back to reference Heilig, G. K. (2012). World urbanization prospects: The 2011 revision. United Nations, Department of Economic and Social Affairs (DESA), Population Division, Population Estimates and Projections Section, New York. Heilig, G. K. (2012). World urbanization prospects: The 2011 revision. United Nations, Department of Economic and Social Affairs (DESA), Population Division, Population Estimates and Projections Section, New York.
go back to reference Johnson, L. K. (2006). Ethics of covert operations. In J. Goldman (Ed.), Ethics of spying a reader for intelligence professionals. Lanham: Scarecrow Press, Inc.. Johnson, L. K. (2006). Ethics of covert operations. In J. Goldman (Ed.), Ethics of spying a reader for intelligence professionals. Lanham: Scarecrow Press, Inc..
go back to reference Montgomery, A. H., & Mount, A. (2014). Misestimation: Explaining US failures to predict nuclear weapons programs. Intelligence and National Security, 29(3). Montgomery, A. H., & Mount, A. (2014). Misestimation: Explaining US failures to predict nuclear weapons programs. Intelligence and National Security, 29(3).
go back to reference United States Agency for International Development. (2013). Sustainable service delivery in an increasingly urbanized world, USAID Policy. United States Agency for International Development. (2013). Sustainable service delivery in an increasingly urbanized world, USAID Policy.
go back to reference US Congress. (2004). Senate Select Committee on Intelligence, Report on the US Intelligence Community’s Prewar Intelligence Assessments in Iraq. US Congress. (2004). Senate Select Committee on Intelligence, Report on the US Intelligence Community’s Prewar Intelligence Assessments in Iraq.
go back to reference Wallace, R., & Melton, H. K. (2009). Spycraft: The secret history of the CIA’s Spytechs, from communism to Al-Qaeda. Plume. Wallace, R., & Melton, H. K. (2009). Spycraft: The secret history of the CIA’s Spytechs, from communism to Al-Qaeda. Plume.
go back to reference Westad, O. A. (2000). The New International History of the Cold War: Three (Possible) Paradigms. Diplomatic History, 24(4), 551–565.CrossRef Westad, O. A. (2000). The New International History of the Cold War: Three (Possible) Paradigms. Diplomatic History, 24(4), 551–565.CrossRef
go back to reference “Why The FISA Court Is Not What It Used To Be.” NPR.org. (2013). Web. 6 Nov. 2017. “Why The FISA Court Is Not What It Used To Be.” NPR.org. (2013). Web. 6 Nov. 2017.
Metadata
Title
Introduction
Authors
Margaret E. Kosal
Alaina Totten
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-75232-7_1