Start Reading
  • Create a List

Operationalizing Intelligence Dominance: Consistent with Rule-of-Law Principles, Global Security Environment, Tasking and Coordination Groups, Counterintelligence, Human Intelligence, IRA, CONOPS

Ratings:
Length: 112 pages1 hour

Summary

Professionally converted for accurate flowing-text e-book format reproduction, this unique case study provides a methodology for creating and maintaining intelligence dominance consistent with rule-of-law principles.

In recent decades, globalization has produced both positive trends, such as economic development, enhanced communications, and the dissemination of liberal values, and negative ones, including the globalization of crime, corruption, and terrorism, as well as the uncertainties inherent in a globalized economy, including instability and social unrest. To effectively manage the contemporary security environment, the United States must be able to export local intelligence capabilities to foreign partners. A model of key elements of these capabilities has been developed that can be adapted relatively quickly for use by the U.S. in other countries. It is referred to as "intelligence dominance consistent with rule-of-law principles."
Overall, the global security environment is characterized by several factors that are likely to persist for more than a decade. The first is the plethora of weak, fragile, failing, and failed states. More than half the world's population lives in regions where governments are unable to control their territory. In 1945, there were approximately 50 relatively homogeneous nation-states. By the end of the 1990s, after decolonization and the demise of the Soviet Union, this number had grown to more than 190 heterogeneous states and now reaches approximately 200. Most of these newer, fragile states lack the police, administrative, and economic resources needed to govern effectively, and many cannot provide basic goods and services to significant sectors of their population. Their authority is challenged both within and outside their limited areas of territorial control. Conditions in these states often include border conflicts, diasporas, and other situations that have ramifications for their neighbors or the entire region.

Chapter I * Introduction: The Global Security Environment * A. The Problem * B. The Solution * C. Maps * Chapter II * Principal Elements of an Exportable Model * A. The Local Level * B. The Regional Level: Regional Tasking and Coordination Groups * C. The National Level: National Tasking and Coordination Group * Chapter III * Exporting the Model * A. Exporting the Capability With a Current U.S. Military Presence * B. Exporting the Capability Without U.S. Military Presence * Chapter IV * Bibliography

Read on the Scribd mobile app

Download the free Scribd mobile app to read anytime, anywhere.