Index
Frederic Lemieux
(Georgetown University, USA)
Intelligence and State Surveillance in Modern Societies
ISBN: 978-1-78769-172-8, eISBN: 978-1-78769-171-1
Publication date: 3 December 2018
This content is currently only available as a PDF
Citation
Lemieux, F. (2018), "Index", Intelligence and State Surveillance in Modern Societies, Emerald Publishing Limited, Leeds, pp. 247-254. https://doi.org/10.1108/978-1-78769-171-120181011
Publisher
:Emerald Publishing Limited
Copyright © 2019 Frederic Lemieux
INDEX
Action management
, 29
Active mode
, 176
AEGIS
, 197–198
al-Qaeda
, 83
American Civil Liberties Union (ACLU)
, 84
Analysis phase
, 10–11
Analytics management
, 29
Arab world
, 2
AUS/CAN/NZ/UK/US EYES ONLY
, 62
Australia
, 34–39, 100–104
Australian Crime Commission (ACC)
, 129
Australian Criminal Intelligence Commission (ACIC)
, 100
Australian Criminal Intelligence Forum (ACIF)
, 100
Australian Cybercrime Online Reporting Network (ACORN)
, 103
Australian Geospatial-Intelligence Organization (AGO)
, 35
Australian Intelligence Community (AIC)
, 34–39
Australian Secret Intelligence Service (ASIS)
, 34
Australian Security Intelligence Organization (ASIO)
, 34
Australian Signal Directorate (ASD)
, 34
Auxiliarization
, 137
BAE systems
, 198
Big Data analytics
, 184, 185
Black satellites
, 169
Booz Allen Hamilton (BAH)
, 198–199
British Security Industry Association (BSIA)
, 173
CACI International Inc.
, 199
Canada
, 39–45, 104–107
Canadian Forces Intelligence Command (CFIC)
, 44
Canadian Forces Joint Imagery Centre (CFJIC)
, 44
Canadian intelligence community (CIC)
, 40–43
Canadian Security Intelligence Service (CSIS)
, 93
Catholic Church
, 2
CCTV technology
, 173, 174–175
Cellular Analysis and Notification of Antigen Risks and Yields (CANARY)
, 180
Central Intelligence Agency (CIA)
, 28, 75
Chilling effect of secrecy
, 21
Code of conduct
, 227–230
Cold War
, 4
Collation phase
, 10
Collection phase
, 10
Combined DNA Index System (CODIS)
, 178
Communications Security Establishment (CSE)
, 40
Community-based policing model
, 135
CompStat approach
, 98
Compulsive data demand
, 14
Conceptual approaches
, 20–22
Consequentialist approach
, 210
Constructive methods
, 20
Counterterrorism Center
, 79
Counter Terrorism Command (CTC)
, 111
Creation of knowledge
, 28
Criminal intelligence
acceptance
, 95
activities
, 5
basic knowledge
, 96–97
detecting criminal activity
, 97–98
“Five Eyes” countries
, 100–115
functions
, 96–100
guiding decisions
, 99–100
international police cooperation
, 115–119
operations
, 99–100
policy
, 85–86
practice
, 90–92
predicting criminal activity
, 98–99
services
, 130
strategy
, 86–89
structure
, 89–90
structure and integration
, 100–115
targets
, 92–93
Criminal Intelligence Service Canada (CISC)
, 106
Criminal Investigation Branch (CIB)
, 108
CSRA Inc.
, 199–200
Cuban missile crisis
, 13
Cyber Action Team (CAT)
, 157
Cyber insecurity
, 160
Cyber intelligence
cybersecurity risk
, 159–161
defensive
, 139
intensity
, 146–148
law enforcement
, 156–159
offensive
, 139
private and public entities
, 140
strategic form
, 140
technical form
, 140
Cyber threats
actors
, 140
cyberspace
, 143–146
evolution
, 140
landscape
, 140–143
modus operandi
, 143
Dark Web
, 146
DCSNET
, 176
Decision-making process
, 20
Defense Intelligence Agency (DIA)
, 194
Defense Intelligence Organization (DIO)
, 34–35
Deontological approach
, 210–211
Detecting criminal activity
, 97–98
Digital divide
, 13
Directorate of Defence Intelligence and Security (DDIS)
, 46
Director of Central Intelligence (DCI)
, 79
Dissemination phase
, 11
“Diversion Team,” 104
Drug Enforcement Administration (DEA)
, 85
Dual conceptualizations of intelligence
, 4–7
Echelon program
, 62
Efficiency
, 71
Electronic Frontier Foundation (EFF)
, 171
Embedded knowledge
, 28
Environmental Protection Agency (EPA)
, 183
Espionage
, 2
Ethics
analysis
, 212
code of conduct
, 227–230
consequentialist approach
, 210
deontological approach
, 210–211
immoral intelligence collection techniques
, 207
intelligence analysis
, 218–220
intelligence collection
, 212
intelligence collection methods
, 217–218
intelligence management
, 213
just intelligence approach
, 211–212
Just War Theory
, 211
realist approach
, 209–210
secrecy violation
, 220–227
truth approach
, 209
utilitarian approach
, 208
whistleblowing
, 220–227
Ethics of risk
, 71
European Cyber Crime Center
, 158
Explicit knowledge
, 27
Exploitative methods
, 20
Export Administration Regulations (EAR)
, 161
Facebook
, 151
Facial Analysis, Comparison, and Evaluation (FACE)
, 179
Federal Bureau of Investigation (FBI)
, 28, 156
Five Eyes countries
Australia
, 34–39
Canada
, 39–45
New Zealand
, 45–49
United Kingdom
, 49–54
United States
, 54–61
“Five Eyes” countries
Australia
, 100–104
Canada
, 104–107
New Zealand
, 107–109
United Kingdom
, 109–112
United States
, 112–112
FlexiSPY
, 177
Foodborne Disease Outbreaks Surveillance System (FDOSS)
, 183
Foreign Intelligence Surveillance Act Court (FISA)
, 23
Geospatial intelligence (GEOINT)
, 7
Geosynchronous orbit (GEO)
, 168
Global Hawk
, 170
Government Accountability Office (GAO)
, 23
Government Communications Headquarters (GCHQ)
, 175
Government Communications Security Bureau (GCSB)
, 46
Government policy
, 73
Great Firewall
, 146
Greece
, 2
Guardian of Peace (GOP)
, 147
Gunwalking Scandal
, 21
Hacktivists
, 227
Hard surveillance technology
, 167
hearing
, 175–178
scent
, 180–181
sight
, 167–175
software surveillance technology
, 184–186
taste
, 182–184
touch
, 178–180
Her Majesty’s Inspectorate of Constabulary (HMIC)
, 111
High policing activity
, 5
Homeland Security Act
, 79
Horizontal communication
, 132
House Permanent Select Committee on Intelligence (HPSCI)
, 56
Human intelligence (HUMINT)
, 7
HUMINT
, 218
Identification of knowledge
, 28
ILP model
, 99
Imagery intelligence (IMINT)
, 7
Immoral intelligence collection techniques
, 207
Independent Police Complaints Commission (IPCC)
, 111
Industrial revolution
, 3
Information gap
, 13
Information overload
, 14
Inspector General of the Intelligence Community (IGIC)
, 204
Institutional friction
, 14
Integrated National Security Enforcement Teams (INSETs)
, 105–106
Integrated Terrorism Assessment Centre (ITAC)
, 45
Intelligence. See also Ethics
analysis
, 218–220
collection
, 212
collection disciplines
, 7, 8
collection methods
, 217–218
cycle
, 8, 9
dual conceptualizations
, 4–7
historical evolution
, 2–4
intelligence collection disciplines
, 7
limitations
, 11–14
process
, 7–11
Intelligence Community (IC)
, 77
Intelligence Coordination Group (ICG)
, 46
Intelligence knowledge management
conceptual approaches
, 20–22
limitations
, 31–32
risk management
, 25–27
state intelligence and surveillance
, 22–25
and surveillance activities
, 27–31
Intelligence-led policing (ILP)
, 95
criminal intelligence activities
, 130–131
environmental contingencies
, 124
criminal environment
, 124–125
evolution
, 121–124
hostility
, 125–127
legal environment
, 127–130
organizational contingencies
, 130
organizational culture
, 134–138
organizational structure
, 131–134
structuring intelligence activities
, 130
Intelligence management
, 213
Intelligence outsourcing
civil liberties threat
, 203
lack of accountability
, 202–203
loss of stateness
, 203
public analyst jobs threat
, 204–205
public safety threat
, 203
reputational concerns
, 204
Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA)
, 60, 79
Intelligence Services Commissioner
, 53
Interception of Communications Commissioner’s Office (IOCCO)
, 53
International police cooperation
, 115–119
International terrorist groups
, 1
International Traffic Arms Regulations (ITAR)
, 161
Internet Crime Complaint Center
, 157
Internet Mass surveillance programs
national cyber surveillance programs
, 149–155
transnational cyber surveillance programs
, 155–156
Internet Organized Crime Threat Assessment (IOCTA)
, 156
Interpol
, 118
Interpretation management
, 29
Intrusive cyber intelligence operations
, 147
Investigatory Powers Act
, 54
Investigatory Powers Tribunal (IPT)
, 53
Islamic State (ISIS)
, 148
Islamic terrorism organizations
, 83
Joint Cybercrime Action Taskforce (J-CAT)
, 158
Joint Terrorism Task Forces (JTTFs)
, 115
Judiciary model
, 6
Just War Theory
, 211
KH-11
, 168
“Kill list,” 82
“Knowledge workers,” 96
Labor organizations
, 3
Law enforcement
, 130
agencies
, 1, 172
intelligence
, 24–25
Legality
, 71
Levitation
, 149
Linear Approach Program
, 89
Linkage blindness
, 13
Local law enforcement
, 7
London Metropolitan Police
, 95
Low earth orbit (LEO)
, 168
Low-intensity conflict
, 1
Low policing activity
, 5
Matrix organizations
, 132
Measurement and signature intelligence (MASINT)
, 7
Merida Initiative
, 88
Middle Ages
, 2
Militarization
conceptualizing
, 69–72
criminal intelligence
, 85–93
national security intelligence
, 72–85
operationalizing
, 69–72
policy
, 73
practice
, 80–82
strategy
, 73–76
structure
, 77–80
targets
, 83–85
Military industrial complex
, 70
Military Intelligence Program (MIP)
, 56
Ministry of Science, Technology, and Innovation (MCTI)
, 160
Muscular program
, 155
Napoleon Bonaparte
, 4
National Assessments Bureau (NAB)
, 46
National Biosurveillance Integration Center (NBIC)
, 180–181
National Counterterrorism Center (NCTC)
, 79
National Criminal Intelligence Service (NCIS)
, 129
National Criminal Investigation DNA Database (NCIDD)
, 179
National Cyber Crime Unit (NCCU)
, 158
National Defense Radio Establishment (RFA)
, 150
National Disruption Group (NDG)
, 103
National Geospatial-Intelligence Agency (NGA)
, 78, 202
National Imagery and Mapping Agency (NIMA)
, 78
National Intelligence Model (NIM)
, 109, 129
National Intelligence Program (NIP)
, 56
National Reconnaissance Office (NRO)
, 168
National security
, 72
National Security Agency (NSA)
, 4, 21, 71, 175
National security intelligence
, 5, 22–24
Australia
, 34–39
Canada
, 39–45
clandestine/covert operations
, 33
cooperation
, 61–66
New Zealand
, 45–49
United Kingdom
, 49–54
United States
, 54–61
New York City Police Department (NYPD)
, 97
New Zealand
, 45–49, 107–109
New Zealand Intelligence Community (NZIC)
, 45–48
New Zealand Police (NZP)
, 107
Next Generation Identification (NGI)
, 179
Noise
, 14
Nontraditional threats
, 1
Northern Atlantic Treaty Organization (NATO)
, 199
Northrop Grumman
, 201
NSA surveillance programs
, 23
Office of Management and Budget (OMB)
, 23
Office of National Assessment (ONA)
, 34
Office of National Drug Control Policy (ONDCP)
, 86
Onyx program
, 151
Open source intelligence (OSINT)
, 7
Operation Fast and Furious
, 21
Organizational culture
cultural differences
, 136
definition
, 134–135
government priorities
, 135
intellectual resources
, 138
lack of trust
, 137
managerial approach
, 137
multilateralization
, 136
occupational differentiation
, 137
roles
, 134–138
statuses
, 134–138
structural asymmetry
, 136
Organization for Economic Cooperation and Development (OECD)
, 160
Organization of American States (OAS)
, 160
Organized and Financial Crime Agency of New Zealand (OFCANZ)
, 107
Organized Crime Drug Enforcement Task Forces (OCDETF)
, 114
Overclassification
, 216
PANTHER device
, 180
Passive mode
, 176
Pearl Harbor
, 13
Plan Mexico
, 88
Police and Custom Cooperation Centre (PCCC)
, 118
Police organizations
, 133, 134
crime
, 133
criminal intelligence agencies
, 134
decentralization
, 130
decision-making process
, 133
Policy-maker influence
, 218
Predicting criminal activity
, 98–99
Priorities and intelligence requirements (PIRs)
, 9–10
Privacy and Civil Liberties Oversight Board
, 60
Private intelligence sector
actors and services
, 197
AEGIS
, 197–198
BAE systems
, 198
Booz Allen Hamilton (BAH)
, 198–199
CACI International Inc.
, 199
corporations
, 193
CSRA Inc.
, 199–200
Defense Intelligence Agency (DIA)
, 194
general dynamics
, 200–201
growth
, 191–193
income incentives
, 194
Northrop Grumman
, 201
one-stop-shop
, 193
private firms
, 193
private–public interface
, 195
roles
, 193–195
Science Applications International Corporation (SAIC)
, 201–202
Private–public interface
, 195
dynamics
, 195
expansion
, 196
extension
, 195–196
privatization
, 196–197
Privy Council Office (PCO)
, 44
Project 6
, 150
Public management networks
, 30
Pulsenet
, 182
Racketeer Influenced and Corrupt Organizations (RICO) Act, 122
Radical secrecy
, 21
Realist approach
, 209–210
RealTek audio
, 177
Renaissance era
, 2
Responsibility
, 131
Risk imaging
, 13
Risk management
, 25–27
Risk society
, 26
Roman Inquisition
, 2
Royal Canadian Mounted Police (RCMP)
, 44, 104, 105, 172
Science Applications International Corporation (SAIC)
, 201–202
Second Gulf War
, 21
Secrecy
chilling effect of secrecy
, 21
radical secrecy
, 21
violation
, 220–227
Security Intelligence Review Committee (SIRC)
, 40
Senate Select Committee on Intelligence (SSCI)
, 56
September 11
, 2001, 73
Serious Organized Crime Agency (SOCA)
, 110
Severe Acute Respiratory Syndrome (SARS)
, 180
Signals intelligence (SIGINT)
, 7, 218
Singapore Police Force (SPF)
, 126
Sniffing operations
, 147
Sniffing technology
, 180
Social control
constructive
, 20
exploitative
, 20
Somali National Alliance (SNA)
, 78
Source management
, 29
South America
, 2
Soviet Union
, 4
Special Operations Division (SOD)
, 90
Special warfare
, 1
SpyToMobile
, 177
State intelligence and surveillance
law enforcement intelligence
, 24–25
national security intelligence
, 22–24
State’s security mission
, 26
StingRay machine
, 175
Stockholm International Peace Research Institute
, 70
Sub-Saharan African tribal chiefs
, 2
Surveillance technologies
conceptual approach
, 166–167
digital surveillance technology
, 174
disruptive technology
, 187–189
hard surveillance technology
, 167
intelligence
, 165–189
new collection discipline
, 187–189
satellites
, 167–168
Tacit knowledge
, 28, 136, 138
Tactical drone
, 170
Telecommunications data
, 148
Titan Traffic Database
, 150
Total Information Awareness (TIA)
, 23
TrailBlazer program
, 154
UK–USA Agreement
, 62
UK–USA collaborating Commonwealth countries
, 62
United Kingdom
, 49–54, 109–112
United Kingdom intelligence community (UKIC)
, 49–53
United States
, 54–61, 112–112
United States intelligence community (USIC)
, 29, 55–59
Unmanned aircraft vehicles (UAVs)
, 23
US Department of Defense budget
, 70
US Federal Aviation Agency (FAA)
, 170
US Intelligence Community
, 13
Utilitarian approach
, 208
Vertical compartmentalization
, 131
Vulnerability Assessment–Sensor Placement Optimization (TEVA–SPOT)
, 183
War Measures Act
, 71
“War on drugs,” 71
, 85
“War on terror,” 69
, 73
Waterborne Disease and Outbreak Surveillance System (WBDOSS)
, 183
Weapons of mass destruction (WMD)
, 21
Westphalian sovereignty
, 4
Whistleblowing
, 220–227
World War I
, 3
- Prelims
- Nature and Structure of Intelligence: An Introduction
- Chapter 1 “Intelligence Knowledge” Management
- Chapter 2 National Security Intelligence in the Five Eyes Countries
- Chapter 3 Toward a Convergence? Militarization of Intelligence and State Surveillance
- Chapter 4 Criminal Intelligence
- Chapter 5 Intelligence-Led Policing Model: Global Diffusion and Cultural Distinction
- Chapter 6 Cyber Threats, Intelligence Operations, and Mass Surveillance
- Chapter 7 Intelligence and Surveillance Technologies
- Chapter 8 The Rise of the Private Intelligence Sector
- Chapter 9 Ethical Challenges in Intelligence Operations
- References
- Index