Intelligence analysis and threat assessment: towards a more comprehensive model of threat

نویسنده

  • Charles Vandepeer
چکیده

A central focus of intelligence is the identification, analysis and assessment of threat. However, as acknowledged by intelligence practitioners, threat assessment lags behind the related field of risk assessment. This paper highlights how definitions of threat currently favoured by intelligence agencies are primarily based on threatening entities alone. Consequently, assessments of threat are almost singularly concerned with understanding an identified enemy’s intentions and capabilities. This ‘enemy-centric’ approach to intelligence analysis has recently come in for criticism. In particular, the shortcomings of the current approach become apparent where the focus of intelligence analysis is on threats from difficult-to-identify sub-state or non-state actors. This paper argues that a model of threat singularly focussed on threatening entities overly simplifies what is an inherently complex, inter-related phenomenon between multiple entities. A more comprehensive taxonomy of threat is proposed which identifies various entities covered by the concept of threat. This taxonomy provides a starting point for developing a more rigorous approach to threat assessment which better reflects the complexity of the phenomenon of threat.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A novel ranking method for intuitionistic fuzzy set based on information fusion and application to threat assessment

A novel ranking method based on multi-time information fusion is proposed for intuitionistic fuzzy sets (IFSs) and applied to the threat assessment problem, a multi-attribute decision making (MADM) one. This method integrates a designed intuitionistic fuzzy entropy (IFE), the closeness degree of technique for order preference by similarity to ideal solution (TOPSIS), the decision maker¡¯s (DM¡¯...

متن کامل

The Key Questions Remain Unanswered

First, we described an illustrative notional planning magnitude for each threat based on a stylized threat and risk assessment, while noting that a more comprehensive threat and risk assessments could reveal that these illustrative magnitudes were either too high or too low. Our illustrative threat assessments relied on historical data revealing observed frequencies and consequences of each thr...

متن کامل

Strategic and situation analysis of camel herding in Kalkooyi nomads territory in Qom Province

Owing to premium properties such a transformation of forage with low quantity and quality into high quality dairy and meat products, compromising with arid and semi-arid rangeland and resistance against diseases, camel has basic function in extensive grazing systems. These properties have made camel herding as one of the strategies in sustainable development in natural resources management and ...

متن کامل

Understanding the Threat Ecosystem: A Concept for Intelligence Support to Special Warfare

Understanding the Threat Ecosystem: A Concept for Intelligence Support to Special Warfare, by MAJ Douglas W. Zimmerman, US Army, 50 pages. The current US Army operating concept, as described in TRADOC Pamphlet 525-3-1, states that the evolving global operating environment contains diverse enemies, employing traditional, unconventional and hybrid strategies that threaten the security and vital i...

متن کامل

Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence

Threat intelligence sharing has become a growing concept, whereby entities can exchange patterns of threats with each other, in the form of indicators, to a community of trust for threat analysis and incident response. However, sharing threat-related information have posed various risks to an organization that pertains to its security, privacy, and competitiveness. Given the coinciding benefits...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011