unit3scholarly.docx

2

Unit III Annotated Bibliography

Renica Jones

HLS 6320

Columbia Southern University

11/29/22

Types of Intelligence Collection Activities

Al-Khawaja, A., & Sadkhan, S. B. (2021, August). Intelligence and Electronic Warfare: Challenges and Future Trends. In  2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM) (pp. 118-123). IEEE.

According to Al-Khawaja and Sadkhan (2021), multiple corporate bodies have acknowledged the subjective judgments of digital intelligence and combat as a quantitative analysis for evaluating the abilities of military equipment. There is an urgent need to properly examine a methodology that is both qualified and competent for scientifically analyzing the influence of intelligence and electronic warfare technology on combat involvement efficiency. This paper mentions the principal capabilities of digital intelligence and combat technologies. These qualities are required to ensure a military mix and a higher probability of success on the ground, and they are explored in length in this document. Nonetheless, the problem of the endless battle is to analyse vast amounts of electronic warfare (EW) data in a relatively short period of time. In the study, an information system is suggested based on the creation of an Electronic Warfare Intelligent Information System (EWIIS) that integrates cyber warfare processing, telecommunications, sensors, maps, and combat missions. Thus, the system was designed to achieve optimal performance despite adverse factors.

Dokman, T., & Ivanjko, T. (2020). Open source intelligence (OSINT) issues and trends.  The Future of Information Sciences1(2020), 191.

This study indicates that open-source intelligence gives people specific information they can use in their work and decisions. Intelligence has been seen as a government activity for centuries. Still, a new postmodern surveillance framework, new security issues, and improvements in technology for information and communication have changed how knowledge and open-source intelligence are seen. Some experts estimate that up to 80% of data comes from source materials that are open to the public. This shows that this highly specialized intelligence knowledge can be learned beyond the classic intelligence setting. The good things about publicly available data are that it is simple to get and moves quickly, covers a wide range of topics, has an ethical element, and is cheap to collect. The negative things about it are that it can be used to manipulate people and spread false information, pieces of the truth, contradictions, and mistrust. Multiple people in the public domain are trying to change the information, which makes it hard to look at, compare, and understand. In intelligence operations, researchers look at open-source intelligence's main pros and cons..

Fishel, K. L. (2022).  Presidential Use of Strategic Intelligence to Combat Islamist Terrorism in the Post-9/11 Era: A Comparative Case Study of the William J. Clinton, George W. Bush, and Barack H. Obama Administrations with Illustrations Using the Trump and Biden Administrations (Doctoral dissertation, American Public University System).

Fishel (2022) investigates how leaders use strategic intelligence in decision-making to defeat Islamist terrorism. According to Fishel's results, this issue remains unsolved. The study takes a broad stance and offers the deductive study questions. How did presidents effectively employ strategic intelligence to defeat Islamist terrorism? Bureaucratic Politics model is applied to perform a contrasting case study evaluation of the Bush, Clinton, and Obama governments by describing each in detail. It identifies patterns of efficient intelligence exploitation and proposes guiding principles for potential presidential decisions. It concludes with a tentative adaptation of the case study's findings to the Trump and Biden governments in an effort to improve understanding of the decision-making process. Regulations for the efficacious use of intelligence require presidents to recognize the constraints of intelligence, be cognizant of presidency viewpoint and how it may sway judgment, be sparing in quasi use of the Intelligence Community, ascertain who is in control of the Intelligence Community at the NSC level, and recognize that the balance between safety and freedom is a continuous system.

Hwang, Y. W., Lee, I. Y., Kim, H., Lee, H., & Kim, D. (2022). Current Status and Security Trend of OSINT.  Wireless Communications and Mobile Computing2022.

According to Hwang et al. (2022), users have recently employed open-source intelligence (OSINT) to collect and acquire data-related information. The benefit of utilizing OSINT data is that cyberspace-based security concerns can be handled. However, suppose an operator uses OSINT data for despicable purposes. In that case, information about the goal of an attack can be gleaned, which can result to cybercrimes such as hacking, virus dissemination, and denial-of-service attacks. Therefore, it is essential, from a cybersecurity perspective, to utilize OSINT data beneficially. It is necessary to establish measures that can reduce the harm triggered by cybercrimes if they are utilized negatively. The authors outline security issues and cybercrimes that may result from malicious individuals exploiting OSINT data. They suggest OSINT-environment-applicable security needs. The recommended security standards are necessary for the secure collection and storage of data in the OSINT environment and the secure access and use of the data. The objective of the projected security necessities is to lessen the impact of cybercrimes in the OSINT environment.

Moffett, L., Oxburgh, G. E., Dresser, P., Watson, S. J., & Gabbert, F. (2022). Inside the shadows: a survey of UK human source intelligence (HUMINT) practitioners, examining their considerations when handling a covert human intelligence source (CHIS). Psychiatry, Psychology and Law, 29(4), 487-505.

According to Moffett et al. (2022), law enforcement agencies in the United Kingdom are adopting evidence-based surveillance and recognizing the significance of human source intelligence (HUMINT) in decision-making. The authors identified six components likely to influence the processing of a covert human intelligence source (CHIS) or an informant based on a review of the relevant literature: (a) handler personality traits, (b) informant motivation; (c) rapport; (d) gaining cooperation; (e) obtaining information, and (f) detecting deception. When preparing and leading a conference with an informant, the researchers wanted to discover which of these criteria HUMINT practitioners consider most frequently. A custom online questionnaire was created and distributed to 34 practitioners using purposive and snowball sampling. They conducted both directed content analysis and thematic content analysis. According to the findings, practitioners are more concerned with garnering cooperation (d) and detecting deceit (f). There was also a correlation between the six categories, with informant handlers frequently needing to reconcile opposing needs.

Reference

Al-Khawaja, A., & Sadkhan, S. B. (2021, August). Intelligence and Electronic Warfare: Challenges and Future Trends. In  2021 7th International Conference on Contemporary Information Technology and Mathematics (ICCITM) (pp. 118-123). IEEE. 10.1109/ICCITM53167.2021.9677877

Dokman, T., & Ivanjko, T. (2020). Open source intelligence (OSINT) issues and trends.  The Future of Information Sciences1(2020), 191. https://doi.org/10.17234/INFUTURE.2019.23

Fishel, K. L. (2022).  Presidential Use of Strategic Intelligence to Combat Islamist Terrorism in the Post-9/11 Era: A Comparative Case Study of the William J. Clinton, George W. Bush, and Barack H. Obama Administrations with Illustrations Using the Trump and Biden Administrations (Doctoral dissertation, American Public University System).

Hwang, Y. W., Lee, I. Y., Kim, H., Lee, H., & Kim, D. (2022). Current Status and Security Trend of OSINT.  Wireless Communications and Mobile Computing2022. https://doi.org/10.1155/2022/1290129

Moffett, L., Oxburgh, G. E., Dresser, P., Watson, S. J., & Gabbert, F. (2022). Inside the shadows: a survey of UK human source intelligence (HUMINT) practitioners, examining their considerations when handling a covert human intelligence source (CHIS).  Psychiatry, Psychology and Law29(4), 487-505.