03765nam 2200553 450 991046612360332120200520144314.00-19-061322-X0-19-061294-0(CKB)3710000000587456(EBL)4413931(MiAaPQ)EBC4413931(PPN)199390347(Au-PeEL)EBL4413931(CaPaEBR)ebr11215101(CaONFJC)MIL895889(OCoLC)938018054(EXLCZ)99371000000058745620160621h20102010 uy 0engur|n|---|||||rdacontentrdamediardacarrierSecuring the state /David OmandNew York, New York :Oxford University Press,2010.©20101 online resource (370 p.)Includes index.0-19-932717-3 Developing the risk management approachThe politics of security; 2. Sapientia: The Public Value of Intelligence; A short dance around the subject and a definition; The uses of intelligence; The nature and types of intelligence reporting; Classic intelligence; Open sources; PROTINT: the electronic traces we all leave behind; The different types of intelligence product; The professionalization of intelligence: The Joint Intelligence Committee; The professionalization of intelligence: The UK Joint Terrorism Analysis Centre; An introduction to secrets, mysteries and complexitiesThe legitimacy of intelligence work3. Fortitudio: The Public Value of Resilience; The fragility of living in cities; Organizing for resilience; The role of good government in managing crises; Critical National Infrastructure: a framework for resilience planning; Into cyberspace; Second generation resilience; Moving on to third generation adaptive resilience; The limits to protection; Paying for the security of the critical national infrastructure; 4. Civitas: The Public Value of Civic Harmony; Living under the shadow; Assessing strategic success; The strategy for maintaining normalityThe first 'P': PursuitThe second 'P': Prevent; The tension between liberty and security; The tension between security and privacy; 5. The Intelligence Cycle: From Whence Owe You This Strange Intelligence?; From whence owe you this strange intelligence?; The intelligence cycle; Access; Elucidation; Dissemination; Need to know or requirement to provide; Action-on; Direction; Spy versus counter-spy: recognizing the race between offence and defence; 6. Elucidation: Ye Shall Know the Truth, and the Truth Shall Set You Free; The validation of single-source reporting; Degrees of truthSharing the outcome of validation with analysts and usersJudging the likely customer interest in a single-source intelligence report; The analysis of single-source reporting; The place of all-source intelligence assessment; A hierarchy of intelligence analysis; The nature of intelligence assessment; On dealing with fragmentary and incomplete information; The inductive fallacy, the Achilles heel of analysis; How to go about solving a problem; Ye shall know the truth, and the truth shall set you free; 7. Analysts and Policy-Makers: Idealists and Realists; The sources of failureIdealists and realistsIntelligence serviceNational securityElectronic books.Intelligence service.National security.355.0335Omand David946684MiAaPQMiAaPQMiAaPQBOOK9910466123603321Securing the state2138890UNINA