2007
DOI: 10.1080/02684520701200772
|View full text |Cite
|
Sign up to set email alerts
|

Intelligence to counter terror: The importance of all-source fusion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…14 Yet, reflecting a wider set of cultural dispositions, it has been noted in the literature how open source intelligence is often regarded as 'less equal' than other, covert sources of intelligence; when, it is argued, it should be considered complimentary to such clandestine sources (Gibson, 2014b: 11-12). Irrespective of disparate occupational tendencies to favour one particular intelligence stream over another, in the organisational context of a move towards a pluralistic and synergetic 'all-source fusion' approach to intelligence work (see Russell, 2007;Sims, 2007;Day, Gibson and Ramwell, 2017) the ethical, proportionate, efficient, and effective use of informants will still remain important in tackling increasingly complex crimes (see Gioe, 2017). In other words, within a system that seeks to develop and exploit a plurality of sources, intelligence from informants will remain of considerable value.…”
Section: Discussionmentioning
confidence: 99%
“…14 Yet, reflecting a wider set of cultural dispositions, it has been noted in the literature how open source intelligence is often regarded as 'less equal' than other, covert sources of intelligence; when, it is argued, it should be considered complimentary to such clandestine sources (Gibson, 2014b: 11-12). Irrespective of disparate occupational tendencies to favour one particular intelligence stream over another, in the organisational context of a move towards a pluralistic and synergetic 'all-source fusion' approach to intelligence work (see Russell, 2007;Sims, 2007;Day, Gibson and Ramwell, 2017) the ethical, proportionate, efficient, and effective use of informants will still remain important in tackling increasingly complex crimes (see Gioe, 2017). In other words, within a system that seeks to develop and exploit a plurality of sources, intelligence from informants will remain of considerable value.…”
Section: Discussionmentioning
confidence: 99%
“…The intelligence state combines the essential features of the security state and the surveillance state, protecting the homeland from internal and external threats through pervasive data collection and proactive policies aimed at counterterrorism and countering violent extremism [77]. It extends the reach of the security apparatus further by incorporating a broad range of analytical tools which enable analytical modelling and predictive analytics which stretch existing boundaries of surveillance [3].…”
Section: Introductionmentioning
confidence: 99%
“…mental illness, criminal history, substance misuse, extremes of personality, and personality disorder) are not so clear in the case histories of persons identified as terrorists (Monahan, 2012;Silke, 1998). Given these technical and epistemological concerns, critics claim the development of screening instruments for risk of violent extremism (and the technology and systems of governance and control they require or may set in motion) is unethical, potentially leading to illegal activity and human rights abuse by the State (Monahan, 2011;Sims 2007).…”
Section: Can Risk Assessment Paradigms Be Applied To Risk Of Violent mentioning
confidence: 99%