REVIEW on PRESENT, PAST and FUTURE of COMPETITIVE TECHNICAL INTELLIGENCE Shweta Rana Assistant Professor,Amity University Haryana [email protected]

Total Page:16

File Type:pdf, Size:1020Kb

REVIEW on PRESENT, PAST and FUTURE of COMPETITIVE TECHNICAL INTELLIGENCE Shweta Rana Assistant Professor,Amity University Haryana Shweta.Rana8525@Gmail.Com id639728 pdfMachine by Broadgun Software - a great PDF writer! - a great PDF creator! - http://www.pdfmachine.com http://www.broadgun.com International Journal of Latest Research in Science and Technology ISSN (Online):2278-5299 – Volume 7, Issue 2: Page No.34 38 ,March-April 2018 https://www.mnkpublication.com/journal/ijlrst/index.php REVIEW ON PRESENT, PAST AND FUTURE OF COMPETITIVE TECHNICAL INTELLIGENCE Shweta Rana Assistant Professor,Amity University Haryana [email protected] – ’ Abstract Of today s fast paced technological innovations world, Competitive Technological Intelligence has become crucial for most of the business organization. It is one of the most important logical properties for business organization to have an edge in competition. This edge of technical intelligence can be anywhere ranging from products to services, customer acquisition to relationship management, marketing to branding, procurement to selling, product design to R&D and many others. My idea is to understand, how established organization and start-up organizations of academic institutions/e-selling companies are managing their Competitive Technical Intelligence? What is the importance of Technical Intelligence? What is the Past, Present and Future of Competitive Technological Intelligence Keywords: Competitive Technical Intelligence (CTI), Strategic decision making, Business Competitor 1. INTRODUCTION linked to the others by a feedback loop. We are describing — Competitive intelligence (CI)[7] is not a substitute for other them to you which is called as CI cycle bi CI professionals business processes, but rather that it is comprised of a number A. Planning & direction (working with decision makers to of building blocks[2] that hopefully merges the information discover and hone their intelligence needs): CI should only obtained from these processes to create a comprehensive, focus on those business issues that are of critical importance interpretable picture of a company's possible future for a company to know. These issues are known as key competitive environment at any given time. It has many intelligence needs or requirements. Typical topics could aspects of which the following are utilized most often: include tracking new knowledge, potential new players and competitor intelligence [4], technical intelligence, market and potential new technological breakthroughs, assessing current marketing intelligence, financial intelligence, product technology use, emerging technology processes, potential intelligence and customer intelligence. disruptions and new approaches and applications, and CI is a management that enables executives to make assessing new business prospects, market niches and key smarter, more successful decisions, thereby minimizing risk, players' relations. A key decision maker might ask whether avoiding being blind-cited, and getting it right the first time. there are competing or complementary technologies, who the Executives are always surprised when their decisions or competitors are, what role technology plays in their strategies do not produce the desired results. The CI process competitive advantage [1] and what the potential applications enables executives within every area in their firms, from for a new technology are. R&D to divisions that invest in tactics and long term business B. Collection activities (conducted legally and ethically): strategies to make the correct decisions. Furthermore, it is not Collection comes from a variety of different sources and a process that attempts to collect, analyze and convert gathering techniques for examination and verification during information into intelligence and provide management with the CI process. A variety of internal (information specialists, their exact answer they are after, but it attempts to collect legal and patent staff, and specialists in the company, for enough information to draw a reasonable conclusion for example technology forecasters and R&D staff), external immediate action. “ (technical colleagues, industry experts and analysts, Competitive intelligence is the action of defining, gathering, university staff and consultants), primary (verbal) and analyzing, and distributing intelligence about products, secondary (published, written) sources should be used. There customers, competitors, and any aspect of the environment are a innumerable of secondary sources one could access, for needed to support executives and managers making strategic ” example internal databases, R&D plans, project proposals, decisions for an organization . Competitive intelligence – published research and market assessments, patent layers, activities can be basically grouped into two main types 1) databases, annual reports and science publications. In Tactical, which is a shorter-term activity and seeks to provide technical CI, information is rarely available directly from the input into issues such as capturing market share or increasing companies that are being targeted. The CI professional needs revenues; and 2) Strategic, which focuses on longer-term to create a network of sources interacting with the target issues such as key risks and opportunities facing the company, including suppliers of services and goods, diverse enterprise. Competitive intelligence is different from government agencies and customers. This network can help corporate or industrial espionage, which use illegal and provide the elusive pieces of data and information. In unethical methods to gain an unfair competitive advantage. addition, network analysis can reveal experts who will be The CI process is usually divided into five basic phases, each helpful in interpreting the findings. Publication History MISaSnuNsc:r2ip2t 7R8ec-e5iv2ed9 9 : 9 M a r c h 2 0 1 8 34 Manuscript Accepted : 28 March 2018 Revision Received : 30 April 2018 Manuscript Published : 30 April 2018 International Journal of Latest Research in Science and Technology. time of turmoil of the Spring and Autumn period around the C. Analysis (interpreting data and compiling recommended sixth century B.C. Sun Tzu is one of the first to have actions): During this phase, information is turned into mentioned that a source of competitive advantage (in this intelligence through a process of interpretation and the results case against military enemies) could be acquired by superior should be useable in strategic decision-making. CTI is most knowledge of information. Whether they were aware of Sun valuable to guide and support various business decisions. To ’ Tzu s work or not, various States throughout history set up understand the competitor's ongoing activities and plans, systems of espionage and information gathering which could diverse signals have to be reviewed and interpreted to provide help decision makers in achieving victory. This trend clues about R&D, manufacturing and product rollout continued and was reinforced up until today, when most approaches. For example, a specific company's new research countries have set up intelligence programs for military and collaborations and scientist hiring can shed light on likely diplomatic purposes. Until recently, pre-eminence was given development priorities. The popular analysis tools used are to this side of intelligence, though evidence of intelligence scenario analysis, cost analysis (product, process and gathering for economic purposes has also existed. technology), trend analysis and technological assessments, and the popular Porter Five Forces, strengths, weaknesses, In 1986, the Society of Competitive Intelligence opportunities and threats (SWOT) analysis and Professionals (SCIP) [8][5] was created to promote “ competitor/persons profiling. education and networking opportunities for business professionals working in the rapidly growing field of D. Dissemination (presenting findings to decision makers): competitive intelligence (the legal and ethical collection and The results of the CI process are communicated to those with analysis of information regarding the capabilities, the authority and responsibility to act on the findings in an ” vulnerabilities, and intentions of business competitors) . By appropriate format and at the right time. offering a chance for CI experts around the world to E. Feedback (taking into account the response of decision exchange ideas, this organization has enabled CI to become a makers and their needs for continued intelligence): CI more recognized field of corporate strategy.CI has from the requires appropriate policies, procedures and an infrastructure start been reinforced by the knowledge of intelligence experts so that employees may contribute effectively to the CI system from other fields. A good example of that is the CI unit of as well as gain the benefits from the CI process. Motorola where the former director of Intelligence was previously an intelligence officer for the CIA. The end of the I. CTI PAST: Cold War similarly liberated many intelligence experts who The traditional CTI process has become known as the were seeking new opportunities, further increasing the “ ” Herring Model of competitive intelligence after its most development of competitive intelligence. The 1990s also elegant articulator, Jan Herring. This is by now, quite familiar represent the development of competitive intelligence and consists of a five step process: throughout the world as SCIP extended its activities in the United Kingdom, Sweden and France. A. NEEDS ASSESSMENT: What is it that the decision “ makers need to know? What problem do they need to In 1997, France
Recommended publications
  • Open Source Intelligence (OSINT)
    ATP 2-22.9 Open-Source Intelligence July 2012 DISTRIBUTION RESTRICTION: Unlimited Distribution Headquarters, Department of the Army *ATP 2-22.9 Army Techniques Publication Headquarters No. 2-22.9 (FMI 2-22.9) Department of the Army Washington, DC, 10 July 2012 Open-Source Intelligence Contents Page PREFACE.............................................................................................................. iv INTRODUCTION .................................................................................................... v Chapter 1 OPEN-SOURCE INTELLIGENCE (OSINT) FUNDAMENTALS ........................ 1-1 Definition and Terms .......................................................................................... 1-1 Characteristics .................................................................................................... 1-1 The Intelligence Warfighting Function ................................................................ 1-2 The Intelligence Process .................................................................................... 1-3 The Planning Requirements and Assessing Collection Process ........................ 1-4 The Military Decisionmaking Process ................................................................ 1-4 Intelligence Preparation of the Battlefield ........................................................... 1-5 Chapter 2 PLANNING AND PREPARATION OF THE OSINT MISSION ............................. 2-1 Section I – Planning OSINT Activities ...........................................................
    [Show full text]
  • Considering the Creation of a Domestic Intelligence Agency in the United States
    HOMELAND SECURITY PROGRAM and the INTELLIGENCE POLICY CENTER THE ARTS This PDF document was made available CHILD POLICY from www.rand.org as a public service of CIVIL JUSTICE the RAND Corporation. EDUCATION ENERGY AND ENVIRONMENT Jump down to document6 HEALTH AND HEALTH CARE INTERNATIONAL AFFAIRS The RAND Corporation is a nonprofit NATIONAL SECURITY research organization providing POPULATION AND AGING PUBLIC SAFETY objective analysis and effective SCIENCE AND TECHNOLOGY solutions that address the challenges SUBSTANCE ABUSE facing the public and private sectors TERRORISM AND HOMELAND SECURITY around the world. TRANSPORTATION AND INFRASTRUCTURE Support RAND WORKFORCE AND WORKPLACE Purchase this document Browse Books & Publications Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Homeland Security Program RAND Intelligence Policy Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND PDFs to a non-RAND Web site is prohibited. RAND PDFs are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity.
    [Show full text]
  • Perspectives and Opportunities in Intelligence for U.S. Leaders
    Perspective EXPERT INSIGHTS ON A TIMELY POLICY ISSUE September 2018 CORTNEY WEINBAUM, JOHN V. PARACHINI, RICHARD S. GIRVEN, MICHAEL H. DECKER, RICHARD C. BAFFA Perspectives and Opportunities in Intelligence for U.S. Leaders C O R P O R A T I O N Contents 1. Introduction ................................................................................................. 1 2. Reconstituting Strategic Warning for the Digital Age .................................5 3. Unifying Tasking, Collection, Processing, Exploitation, and Dissemination (TCPED) Across the U.S. Intelligence Community ...............16 4. Managing Security as an Enterprise .........................................................25 5. Better Utilizing Publicly Available Information ..........................................31 6. Surging Intelligence in an Unpredictable World .......................................44 7. Conclusion .................................................................................................56 Abbreviations ................................................................................................57 References ....................................................................................................58 Acknowledgments ........................................................................................64 About the Authors .........................................................................................64 The RAND Corporation is a research organization that develops solutions to public policy challenges to help make
    [Show full text]
  • Espionage and Intelligence Gathering Other Books in the Current Controversies Series
    Espionage and Intelligence Gathering Other books in the Current Controversies series: The Abortion Controversy Issues in Adoption Alcoholism Marriage and Divorce Assisted Suicide Medical Ethics Biodiversity Mental Health Capital Punishment The Middle East Censorship Minorities Child Abuse Nationalism and Ethnic Civil Liberties Conflict Computers and Society Native American Rights Conserving the Environment Police Brutality Crime Politicians and Ethics Developing Nations Pollution The Disabled Prisons Drug Abuse Racism Drug Legalization The Rights of Animals Drug Trafficking Sexual Harassment Ethics Sexually Transmitted Diseases Family Violence Smoking Free Speech Suicide Garbage and Waste Teen Addiction Gay Rights Teen Pregnancy and Parenting Genetic Engineering Teens and Alcohol Guns and Violence The Terrorist Attack on Hate Crimes America Homosexuality Urban Terrorism Illegal Drugs Violence Against Women Illegal Immigration Violence in the Media The Information Age Women in the Military Interventionism Youth Violence Espionage and Intelligence Gathering Louise I. Gerdes, Book Editor Daniel Leone,President Bonnie Szumski, Publisher Scott Barbour, Managing Editor Helen Cothran, Senior Editor CURRENT CONTROVERSIES San Diego • Detroit • New York • San Francisco • Cleveland New Haven, Conn. • Waterville, Maine • London • Munich © 2004 by Greenhaven Press. Greenhaven Press is an imprint of The Gale Group, Inc., a division of Thomson Learning, Inc. Greenhaven® and Thomson Learning™ are trademarks used herein under license. For more information, contact Greenhaven Press 27500 Drake Rd. Farmington Hills, MI 48331-3535 Or you can visit our Internet site at http://www.gale.com ALL RIGHTS RESERVED. No part of this work covered by the copyright hereon may be reproduced or used in any form or by any means—graphic, electronic, or mechanical, including photocopying, recording, taping, Web distribution or information storage retrieval systems—without the written permission of the publisher.
    [Show full text]
  • WMD Commission Request # 74 (Oct
    COLLECTION Chapter seven collection Summary & Recommendations The collection of information is the foundation for everything that the Intelli- gence Community does. While successful collection cannot ensure a good analytical product, the failure to collect information—as our Iraq study demon- strated—turns analysis into guesswork. And as our review demonstrates, the Intelligence Community’s human and technical intelligence collection agen- cies have collected far too little information on many of the issues we care about most. This chapter sets forth our recommendations for improving the collection capabilities of our Intelligence Community so that it is better equipped to con- front today’s diffuse, elusive, and ever-changing intelligence challenges. These recommendations fall into two categories: those focused on improving the performance of particular collection agencies, and those aimed at integrat- ing the management of collection across the Intelligence Community. Among other suggestions, we recommend that the DNI: ■ Create an “integrated collection enterprise”—that is, a management struc- ture that ensures that the Intelligence Community’s decentralized collec- tion capabilities are developed in a manner that is consistent with long- term strategic intelligence priorities, and are deployed in a coordinated way against today’s intelligence targets; ■ Encourage the development of new and innovative human intelligence col- lection techniques, and empower the CIA to coordinate the full spectrum of human intelligence activities performed in the Intelligence Community; and ■ Establish an Open Source Directorate in the CIA responsible for collecting and storing open source information, and developing or incorporating commercial tools to assist users in data searches—including those in for- eign languages.
    [Show full text]
  • Fm 2-22.3 (Fm 34-52)
    FM 2-22.3 (FM 34-52) HUMAN INTELLIGENCE COLLECTOR OPERATIONS HEADQUARTERS, DEPARTMENT OF THE ARMY September 2006 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. NOTE: All previous versions of this manual are obsolete. This document is identical in content to the version dated 6 September 2006. All previous versions of this manual should be destroyed in accordance with appropriate Army policies and regulations. This publication is available at Army Knowledge Online (www.us.army.mil) and General Dennis J. Reimer Training and Doctrine Digital Library at (www.train.army.mil). *FM 2-22.3 (FM 34-52) Field Manual Headquarters No. 2-22.3 Department of the Army Washington, DC, 6 September 2006 Human Intelligence Collector Operations Contents Page PREFACE ............................................................................................................... vi PART ONE HUMINT SUPPORT, PLANNING, AND MANAGEMENT Chapter 1 INTRODUCTION...................................................................................................1-1 Intelligence Battlefield Operating System .............................................................1-1 Intelligence Process..............................................................................................1-1 Human Intelligence ...............................................................................................1-4 HUMINT Source....................................................................................................1-4 HUMINT Collection and
    [Show full text]
  • Historical Dictionary of International Intelligence Second Edition
    The historical dictionaries present essential information on a broad range of subjects, including American and world history, art, business, cities, countries, cultures, customs, film, global conflicts, international relations, literature, music, philosophy, religion, sports, and theater. Written by experts, all contain highly informative introductory essays on the topic and detailed chronologies that, in some cases, cover vast historical time periods but still manage to heavily feature more recent events. Brief A–Z entries describe the main people, events, politics, social issues, institutions, and policies that make the topic unique, and entries are cross- referenced for ease of browsing. Extensive bibliographies are divided into several general subject areas, providing excellent access points for students, researchers, and anyone wanting to know more. Additionally, maps, pho- tographs, and appendixes of supplemental information aid high school and college students doing term papers or introductory research projects. In short, the historical dictionaries are the perfect starting point for anyone looking to research in these fields. HISTORICAL DICTIONARIES OF INTELLIGENCE AND COUNTERINTELLIGENCE Jon Woronoff, Series Editor Israeli Intelligence, by Ephraim Kahana, 2006. Russian and Soviet Intelligence, by Robert W. Pringle, 2006. Cold War Counterintelligence, by Nigel West, 2007. World War II Intelligence, by Nigel West, 2008. Sexspionage, by Nigel West, 2009. Air Intelligence, by Glenmore S. Trenear-Harvey, 2009. Middle Eastern Intelligence, by Ephraim Kahana and Muhammad Suwaed, 2009. German Intelligence, by Jefferson Adams, 2009. Ian Fleming’s World of Intelligence: Fact and Fiction, by Nigel West, 2009. Naval Intelligence, by Nigel West, 2010. Atomic Espionage, by Glenmore S. Trenear-Harvey, 2011. Chinese Intelligence, by I. C.
    [Show full text]
  • Cyber Espionage
    Die approbierte Originalversion dieser Diplom-/ Masterarbeit ist in der Hauptbibliothek der Tech- nischen Universität Wien aufgestellt und zugänglich. http://www.ub.tuwien.ac.at The approved original version of this diploma or master thesis is available at the main library of the Vienna University of Technology. http://www.ub.tuwien.ac.at/eng Cyber Espionage An analysis of threats from Intelligence Gathering with an emphasis on Industrial Espionage in today’s information society DIPLOMARBEIT zur Erlangung des akademischen Grades Diplom-Ingenieur im Rahmen des Studiums Wirtschaftsinformatik eingereicht von Oleg Denisov Matrikelnummer 0725490 am Fachbereich Rechtswissenschaften der Technischen Universität Wien Betreuung: Ao. Univ.-Prof. Dr. iur. Markus Haslinger Wien, 20.04.2014 (Unterschrift Verfasser) (Unterschrift Betreuung) Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Cyber Espionage An analysis of threats from Intelligence Gathering with an emphasis on Industrial Espionage in today’s information society MASTER’S THESIS submitted in partial fulfillment of the requirements for the degree of Diplom-Ingenieur in Business Informatics by Oleg Denisov Registration Number 0725490 to the department of law at the Vienna University of Technology Advisor: Ao. Univ.-Prof. Dr. iur. Markus Haslinger Vienna, 20.04.2014 (Signature of Author) (Signature of Advisor) Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Erklärung zur Verfassung der Arbeit Oleg Denisov Geerzkamp 7, 22119 Hamburg Hiermit erkläre ich, dass ich diese Arbeit selbständig verfasst habe, dass ich die verwende- ten Quellen und Hilfsmittel vollständig angegeben habe und dass ich die Stellen der Arbeit - einschließlich Tabellen, Karten und Abbildungen -, die anderen Werken oder dem Internet im Wortlaut oder dem Sinn nach entnommen sind, auf jeden Fall unter Angabe der Quelle als Ent- lehnung kenntlich gemacht habe.
    [Show full text]
  • Techint Multi-Service Tactics, Techniques, and Procedures for Technical Intelligence Operations
    TECHINT MULTI-SERVICE TACTICS, TECHNIQUES, AND PROCEDURES FOR TECHNICAL INTELLIGENCE OPERATIONS FM 2-22.401 NTTP 2-01.4 AFTTP(I) 3-2.63 JUNE 2006 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. FOREWORD This publication has been prepared under our direction for use by our respective commands and other commands as appropriate. This publication is available through the ALSA Web site (www.alsa.mil); through the Army at Army Knowledge Online (AKO) (www.us.army.mil) and at the General Dennis J. Reimer Training and Doctrine Digital Library (www.train.army.mil) Web sites; and through the Air Force at the Air Force Publishing Web site (www.e-publishing.af.mil). PREFACE 1. Purpose This publication provides a common set of multi-Service tactics, techniques, and procedures (MTTP) for technical intelligence (TECHINT) operations. It serves as a reference for Service TECHINT planners and operators to build and execute coordinated multi-Service TECHINT operations. It provides guidance to tactical forces on the evacuation of captured materiel that has intelligence value. Additionally, it informs the joint force commanders (JFCs) and their staffs about the missions, requirements, and capabilities of TECHINT forces and essential information to effectively employ and utilize TECHINT capabilities. 2. Scope This publication guides planners through the process of requesting, deploying, and employing the unique, highly specialized, and mission enhancing expertise of multi-Service TECHINT teams. It is designed for planners at all levels and defines methods to ensure TECHINT capabilities are fully integrated and utilized to the maximum extent possible to provide captured enemy equipment identification, assessment, collection, exploitation, and evacuation in support of national technical intelligence requirements.
    [Show full text]
  • History of Technical Intelligence Army General School
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln DOD Military Intelligence U.S. Department of Defense 6-1951 History of Technical Intelligence Army General School Robert Bolin , depositor University of Nebraska - Lincoln, [email protected] Follow this and additional works at: http://digitalcommons.unl.edu/dodmilintel Part of the Defense and Security Studies Commons, Military and Veterans Studies Commons, Other Engineering Commons, Peace and Conflict Studies Commons, and the Soviet and Post-Soviet Studies Commons Army General School and Bolin, Robert , depositor, "History of Technical Intelligence" (1951). DOD Military Intelligence. 102. http://digitalcommons.unl.edu/dodmilintel/102 This Article is brought to you for free and open access by the U.S. Department of Defense at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in DOD Military Intelligence by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. us 251 .U6 H55 1951 ARMY GENERAL SCHOOL ~ FORT RILEY, KANSAS INSTRUCTOR'S FOLDER OF A UNtT OF INSTRUCTION F 0 R I N ST RU CT 0 R~S - 0 NL Y ~ UNCl.ASSIFIED llY A~ty OF DOD DIJ't. 5200. l R !'T /V,:t~-;<f OH1i .lr.t1Y? 5~- HISTORY OF TECHNICAL INTELLIGENCE I-2906 SUBJECT AND FILE NUMBER SUPERVISORY SECTION: INTELLIGENCE--- x TRAINING ---P & A-- June 1951 DATE PREPARED --------- DA TE REVISED : ; ~'.DECLASSIFIED ~ A<my • n.&VA, n. Ril oy. Kono,. H·98': OC/..JCH ~; ?.:24 f OlO(~ DATE HOUR DEPT. (UNIT) DEi-T. NO. 110 minutes) I 2906 c SUBJECT: HISIDRY OF TECHNICAL INTEILIGENCE Organization and operations of technical intelligence during and immediately following World War II.
    [Show full text]
  • The Appropriate Use of Human Intelligence in Combating Terrorism
    THE APPROPRIATE USE OF HUMAN INTELLIGENCE IN COMBATING TERRORISM Mutlu Koseli B.A. Thesis Prepared for the Degree of MASTER OF SCIENCE UNIVERSITY OF NORTH TEXAS August 2003 APROVED John Liederbach, Committee Chair D. Kall Loper, Committee Member Chad Trulson, Committee Member Robert W. Taylor, Chair of the Department of Criminal Justice, David W. Hartman, Dean of the School of Community Services C. Neal Tate, Dean of the Robert B. Toulouse School of Graduate Studies Koseli, Mutlu, The Appropriate Use of Human Intelligence in Combating Terrorism. Master of Science (Criminal Justice), August 2003, 93 pp., references, 111 titles. When we looked at different issues in terrorism such as definitions, descriptions and motivations, groups and supporters, tactics, strategies, and victims of terrorists and terrorist activities, we see that terrorism is an issue that can be occur at anytime, and in any place, and it seems that terrorism threat will still be exist in the future. It is almost impossible to stop all terrorist activities all over the world, but it is possible to formulate an anti terrorism policy that can keep terrorist activities at a minimum level and prevent planned terror activities by a well developed intelligence network. It seems that to establish a good intelligence collection system an approach in which HUMINT and TECHINT are interdependent with each other is necessary. By using a combination of human and technical intelligence collection methods, intelligence agencies can become more effective and efficient against terrorism. ACKNOWLEDGMENTS I would like to thank to my committee for their efforts. First I’m Greatful to Dr.
    [Show full text]
  • Activiteitenverslag 2013 Rapport D'activités 2013
    ACTIVITEITENVERSLAG 2013 RAPPORT D’ACTIVITÉS 2013 Quis custodiet ipsos custodes? Quis custodiet ipsos custodes? is een publicatiereeks die een bijdrage wil leveren tot het bevorderen van een geïnformeerde discussie over de werking, de bevoegdheden en de controle op de inlichtingen- en veiligheidsdiensten en op het inlichtingenwerk. In deze reeks worden o.m. wetenschappelijke studies, de activiteitenverslagen van het Vast Comité I en verslagboeken van colloquia opgenomen. Redactie Vast Comité van Toezicht op de inlichtingen- en veiligheidsdiensten, Leuvenseweg 48 bus 5, 1000 Brussel (02 286 29 88). Reeds verschenen in deze reeks 1) D. Van Daele, en B. Vangeebergen, Inlichtingendiensten en strafprocedure in Nederland, Duitsland en Frankrijk, 2006, 166 p. 2) Vast Comité I, Activiteitenverslag 2006, 2007, 147 p. 3) Vast Comité I, Activiteitenverslag 2007, 2008, 87 p. 4) Belgian Standing Committee I (ed.), All Source T reat Assessments in the Fight against Terrorism – Fusion Centres throughout Europe, 2010, 220 p. 5) Vast Comité I, Activiteitenverslag 2008, 2009, 131 p. 6) W. Van Laethem, D. Van Daele en B. Vangeebergen (eds.), De Wet op de bijzondere inlichtingenmethoden, 2010, 298 p. 7) Vast Comité I, Activiteitenverslag 2009, 2010, 127 p. 8) Vast Comité I, Activiteitenverslag 2010, 2011, 119 p. 9) Vast Comité I, Activiteitenverslag 2011, 2012, 134 p. 10) W. Van Laethem en J. Vanderborght (eds), Inzicht in toezicht. Twintig jaar democratische controle op de inlichtingendiensten, 2013, 565 p. 11) Vast Comité I, Activiteitenverslag 2012, 2013, 115 p. 12) Vast Comité I, Activiteitenverslag 2013, 2014, 210 p. ACTIVITEITENVERSLAG 2013 Vast Comité van Toezicht op de inlichtingen- en veiligheidsdiensten Vast Comité van Toezicht op de inlichtingen- en veiligheidsdiensten Antwerpen – Cambridge Voorliggend Activiteitenverslag 2013 werd door het Vast Comité van Toezicht op de inlichtingen- en veiligheidsdiensten goedgekeurd op de vergadering van 24 juli 2014.
    [Show full text]