Intelligence and Security

THE HUNT FOR THE STOROZHEVOY – The 1975 Soviet Navy Mutiny in the Baltic

THE HUNT FOR THE STOROZHEVOY

In 1975, Lieutenant Commander Valeriy Sablin led his crew in a mutiny on the Soviet warship Storozhevoy. The ship was then located in Riga, Soviet Latvia. Sablin’s avowed intention was to foment a new communist revolution by taking the warship to Leningrad, where he expected to receive the support of the navy and the masses. […]

FROM 9/11, 2001, TO 8/15, 2021: REGIME CHANGE IN AFGHANISTAN

The 9/11 terrorist attacks shaped American politics for decades. In 2021, the Biden Administration’s timetable for withdrawal of military forces from Afghanistan was for domestic political reasons firmly tied to the 20th anniversary of 9/11. The problem was, nobody thought to remind President Joe Biden that the Taliban government also had a 20th anniversary to […]

Hemligstämplat – svensk underrättelsetjänst från Erlander till Bildt

Hemlig Stämplat

See more – Adlibris Alla de svenska hemligheterna från det kalla kriget. Boken bygger på tidigare hemligstämplade dokument och mycket berättas för första gången. Vad var det egentligen som hände under det kalla kriget och åren därefter? Vad gjorde landets politiska ledning, öppet och i hemlighet? – Hur gick det egentligen till när spionen Stig Wennerström avslöjades, […]

Police Intelligence Collection and National Security Intelligence

Until 1945, police intelligence remained a key source of national intelligence. Of particular importance for counterespionage and counterterrorism, police networks also provided strategic intelligence on countries with which police cooperation took place and, in times of war, facilitated operations on enemy territory. From 1929, for instance, the Cairo Police coordinated a global intelligence network ranging […]

Briefing the Swedish policy maker: the analyst-policy maker relationship in a small country

Policy makers tend to pick and choose among conclusions presented to them. This can result in politicization, which ultimately might result in intelligence being blamed for policy failures. This has a negative impact on intelligence analysis, transforming it in an ever more cautious direction which negates its utility in the policy process. Swedish intelligence learnt […]

Transnational Organized Crime and Jihadist Terrorism

This book describes and analyzes the convergence of transnational organized crime and jihadist terrorism that has taken place within Russian-speaking social networks in Western Europe. Studies have shown that while under certain circumstances links between criminal organizations and terrorist groups appear, these are usually opportunistic and temporary in nature. Only rarely do they develop into […]

Hybrid Threats, the Gerasimov Doctrine, Nonlinear Warfare – or Indirect and Asymmetric Operations?

Rightly or wrongly, many observers who discuss present national security threats emanating from Russia will refer to the so-called Gerasimov Doctrine as essential reading. The Gerasimov Doctrine, as it is explained in most media reports, purports to be a new Russian military doctrine that combines military, technological, information, diplomatic, economic, cultural, and other tactics, which […]

Understanding Lone Actor Terrorism

This volume examines the lone actor terrorist phenomenon, including the larger societal trends which may or may not have led to their acts of terrorism. With lone actor terrorism becoming an increasingly common threat, the contributors to this volume aim to answer the following questions: What drives the actions of individuals who become lone actor […]

The Hybrid Threat Capability of the Afghan Taliban Movement, 2001- 2014

When the Afghan Taliban leaders withdrew into Pakistan in late 2001, they had no intention of surrendering the struggle against the U.S.-led international coalition which had forced them out of Afghanistan. Yet, with a substantial international military presence firmly entrenched in Afghanistan, there was no way that the Taliban could regain power by conventional military […]

Power Projection by Pipeline: Russia, Sweden, and the Hybrid Threat from the Nord Stream Project, 2005-2009

By late 2005, Sweden suddenly faced what it perceived as a hard security threat, in the unexpected form of a Russian pipeline project across the Baltic Sea which, it was suspected, could be used as a sensor platform for Russian military intelligence. The pipeline would be ideally located for use as a tripwire sensor chain […]

HIDDEN PLANS OF EMPEROR NAPOLEON III IN THE SECRET ARCHIVES OF THE VATICAN

The Archivio Segreto Vaticano, the Secret Archives, or to use its full and official name, Archivum secretum apostolicum Vaticanum, has handled official Church business for centuries. The modern Archives were established around 1610 but its collections include a very large number of documents that go back much further in time. Exactly how far is unknown; […]

USER REQUIREMENTS FOR LOCALIZATION AND TRACKING TECHNOLOGY: A SURVEY OF MISSION-SPECIFIC NEEDS AND CONSTRAINTS

Current advances in localization and tracking technology have the potential to develop into much-needed tools for the saving of lives in emergency response and rescue missions, and for the safe-keeping of lives in military operations. However, civilian and military users face different environments and consequently have different user requirements. Even within the two broad fields […]

INTELLIGENCE IN COIN OPERATIONS: EXTENDING TARGETING INTO MONITORING IN AFGHANISTAN

The war effort in Afghanistan has focused on kinetic targeting. Since insurgent operations involve few fighters, the intelligence task became to identify and locate perpetrators. Modern network analysis was applied in support of targeting, but intelligence collection and analysis in support of day-to-day relations with Afghan communities have been insufficient to allow intelligence-driven operations to […]

Michael Fredholm © 2024 Frontier Theme