A model for the assessment, care, and treatment of suicidal risk within the military intelligence community

2021 ◽  
pp. 1-7
Author(s):  
Thomas A. Van Dillen ◽  
Robert L. Kane ◽  
Benjamin S. Bunney ◽  
Seth Feuerstein ◽  
Christopher L. Hopkins ◽  
...  
2019 ◽  
Author(s):  
Gerald W. Hopple ◽  
Bruce W. Watson

Author(s):  
Ephraim Kahana

The State of Israel was established only in 1948, but in its fifty-seven years of existence, its intelligence community has been one of the most professional and effective in the world. The Israel Mossad has become the leading agency in Israel's success in the conflict with the Arab states. Its mission not only includes that of ascertaining the plans and strengths of the Arab military forces opposing Israel but also the work of combating Arab terrorism in Israel and abroad against Israeli and Jewish targets, collecting sensitive technical data, and conducting political-liaison and propaganda operations. The Israel intelligence community is composed of four separate components: the Mossad is responsible for intelligence gathering and operations in foreign countries; the Israeli Security Agency controls internal security and intelligence within the occupied territories; the Military Intelligence is responsible for collecting military, geographic, and economic intelligence, particularly in the Arab world and along Israel's borders; and the Center for Political Research in the Foreign Ministry prepares analysis for government policymakers based on raw intelligence and analytical papers. This article discusses the organization, failures, and successes of the Israeli intelligence. Particular attention is given to the huge mistakes and failures of the Israeli intelligence. Discussions included herein are: the evolution of the Israeli intelligence and the future challenges of the intelligence system.


2019 ◽  
Vol 20 (2) ◽  
pp. 87-119
Author(s):  
Bartosz Kapuściak

The primary task of the military intelligence in the People’s Republic of Poland was to acquire materials on the armament and stationing of NATO troops. However, due to the demand of the communist authorities, it also conducted political activities aimed at, among others, the Catholic Church. The interest of the state authorities increased especially during the pontificate of John Paul II. According to the assessment of military intelligence, the election of Karol Wojtyła as Bishop of Rome stimulated the Catholic Church both in Poland and in the Vatican. In this way, the activities of the Second Directorate of the General Staff of the Polish Army were within the scope of civil intelligence interests. The article aims to show the role played by intelligence officers and informers operating in Rome undercover as military attachés or in civilian institutions. Their actions resulted in the establishment of contacts with the church environment and acquisition of voluntary and involuntary informants. In this way, the Second Directorate of the General Staff of the Polish Army provided the party and political apparatus with interesting news and materials. Following the introduction of martial law in Poland, the church from the Rome area started sending parcels of food, clothes and medicines to Poland. This aid for the country was used to establish contact with the Polish clergy thanks to the initiative of Colonel Franciszek Mazurek.


Author(s):  
V. P. Yahodzinskyi ◽  
O. M. Kisilyuk ◽  
D. P. Polozenko ◽  
O. A. Desyatka ◽  
V. O. Novytskyi ◽  
...  

Power sports have always been very popular among servicemen. This is especially evident in recent times, when such power sports, as armsport, crossfit, kettlebell lifting, powerlifting have received some development. The article presents a comparative analysis of the power capabilities of cadets who specialize in various power sports. The study involved male cadets of the 4th year of various faculties (n=53) of the Military Academy (Odessa), who in the process of training were engaged in power sports: armsport (n=12), crossfit (n=16), kettlebell lifting (n=15), powerlifting (n = 10). In addition, the results of cadets-athletes were compared with the results of cadets of the faculty of training specialists of airborne assault troops and military intelligence and special purpose, who did not attend sports sections of the academy (n=60). Analysis of the power of the cadets was carried out on the following exercises: pull-up, lifting by coup, lifting by strength on the crossbar, 24 kg kettlebell snatch, push-up on the parallel bars, push-up. The conducted researches testified to the high level of development of power qualities of cadets of all sections of academy in power sports. There was no significant difference between the results of cadets of different power sports in most exercises. It is established that the power capabilities of cadets who are engaged in various power sports are significantly better than those of cadets who are not engaged in sports. This suggests that any of the studied power sports can be an effective means of developing and improving the power opportunities of future officers of the Armed Forces of Ukraine


Author(s):  
Antonio Badia

At the end of the Cold War, the intelligence situation (characterized in the past by a confrontation among equals and information scarcity) changed radically to the current situation of today, characterized as an asymmetric threat: On one side, there is still a nation, but on the other, there is a relatively small group of individuals brought together by a common ideology, usually with ethnic and religious elements. These individuals can only confront their opponent by using subterfuge, deception, and terrorist acts. They try to disguise their activities by infiltrating society at large and seeking refuge in anonymity. This kind of conflict has long been analyzed in the military literature under names like low-intensity conflict (LIC) or operation other than war (OOTW; for more on this perspective, the reader is referred to the classic work by Kitson, 1971). The task of the nations under terrorist threat is to detect the group’s individuals and their intentions before they can carry out destructive actions. For this, their intelligence services count with large amounts of raw data obtained from many different sources: signal intelligence, open sources, tips from informants, friendly governments, and so forth. However, this data is not always reliable and almost never complete, and the truly interesting events are usually to be found hidden among large amounts of similar looking facts. To deal with this situation, intelligence officers use sophisticated information technology tools. Several authors have pointed out that this task is not at all dissimilar from the task that strategists in business intelligence (BI) and knowledge management (KM) face: As in KM, in intelligence the challenge is that “the right knowledge must get to the right people at the right time” (Pappas & Simon, 2002). Therefore, intelligence experts may learn something from studying BI and KM, and their history and milestones, while business strategists may also be enlightened by the history and lessons of military intelligence (after all, military intelligence is an ancient discipline; in contrast, KM can be considered a newcomer). In this article, we describe the intelligence analysis cycle and compare it with the KM cycle (we assume the reader is familiar with KM, but not with intelligence tasks). We point out the similarities (and the differences) between the two, and highlight several ways in which military intelligence may benefit from the hindsights and techniques developed by KM practitioners. We also briefly describe tools and methods from military intelligence that KM practitioners may find illuminating. We close with a discussion of future trends and some conclusions.


Author(s):  
Timothy P. Hanratty ◽  
E. Allison Newcomb ◽  
Robert J. Hammell II ◽  
John T. Richardson ◽  
Mark R. Mittrick

Data for military intelligence operations are increasing at astronomical rates. As a result, significant cognitive and temporal resources are required to determine which information is relevant to a particular situation. Soft computing techniques, such as fuzzy logic, have recently been applied toward decision support systems to support military intelligence analysts in selecting relevant and reliable data within the military decision making process. This article examines the development of one such system and its evaluation using a constructive simulation and human performance model to provided critical understanding of how this conceptual information system might interact with personnel, organizational, and system architectures. In addition, similarities between military intelligence analysts and cyber intelligence analysts are detailed along with a plan for transitioning the current fuzzy-based system to the cyber security domain.


2010 ◽  
Vol 44 (4) ◽  
pp. 406-423
Author(s):  
O. A. Gokov

AbstractIn the article the review of military secret service of Russia in Africa in the second half of XIX – beginning of XX centuries on the example of activity of officers of the General staff is given. It is showed that military secret service of Russia on the African continent did not carry system character. Russian officers of the General staff in the countries of Africa in the second half XIX – XX beginning of centuries collected the military and political information. They also came forward as researchers, collecting and analysing geographical information about of the probed regions, their population, fauna and flora.


Sign in / Sign up

Export Citation Format

Share Document