Intelligence

Hemligstämplat – svensk underrättelsetjänst från Erlander till Bildt

Hemlig Stämplat

See more – Adlibris Alla de svenska hemligheterna från det kalla kriget. Boken bygger på tidigare hemligstämplade dokument och mycket berättas för första gången. Vad var det egentligen som hände under det kalla kriget och åren därefter? Vad gjorde landets politiska ledning, öppet och i hemlighet? – Hur gick det egentligen till när spionen Stig Wennerström avslöjades, […]

Police Intelligence Collection and National Security Intelligence

Until 1945, police intelligence remained a key source of national intelligence. Of particular importance for counterespionage and counterterrorism, police networks also provided strategic intelligence on countries with which police cooperation took place and, in times of war, facilitated operations on enemy territory. From 1929, for instance, the Cairo Police coordinated a global intelligence network ranging […]

Briefing the Swedish policy maker: the analyst-policy maker relationship in a small country

Policy makers tend to pick and choose among conclusions presented to them. This can result in politicization, which ultimately might result in intelligence being blamed for policy failures. This has a negative impact on intelligence analysis, transforming it in an ever more cautious direction which negates its utility in the policy process. Swedish intelligence learnt […]

Hybrid Threats, the Gerasimov Doctrine, Nonlinear Warfare – or Indirect and Asymmetric Operations?

Rightly or wrongly, many observers who discuss present national security threats emanating from Russia will refer to the so-called Gerasimov Doctrine as essential reading. The Gerasimov Doctrine, as it is explained in most media reports, purports to be a new Russian military doctrine that combines military, technological, information, diplomatic, economic, cultural, and other tactics, which […]

Understanding Lone Actor Terrorism

This volume examines the lone actor terrorist phenomenon, including the larger societal trends which may or may not have led to their acts of terrorism. With lone actor terrorism becoming an increasingly common threat, the contributors to this volume aim to answer the following questions: What drives the actions of individuals who become lone actor […]

Power Projection by Pipeline: Russia, Sweden, and the Hybrid Threat from the Nord Stream Project, 2005-2009

By late 2005, Sweden suddenly faced what it perceived as a hard security threat, in the unexpected form of a Russian pipeline project across the Baltic Sea which, it was suspected, could be used as a sensor platform for Russian military intelligence. The pipeline would be ideally located for use as a tripwire sensor chain […]

HIDDEN PLANS OF EMPEROR NAPOLEON III IN THE SECRET ARCHIVES OF THE VATICAN

The Archivio Segreto Vaticano, the Secret Archives, or to use its full and official name, Archivum secretum apostolicum Vaticanum, has handled official Church business for centuries. The modern Archives were established around 1610 but its collections include a very large number of documents that go back much further in time. Exactly how far is unknown; […]

USER REQUIREMENTS FOR LOCALIZATION AND TRACKING TECHNOLOGY: A SURVEY OF MISSION-SPECIFIC NEEDS AND CONSTRAINTS

Current advances in localization and tracking technology have the potential to develop into much-needed tools for the saving of lives in emergency response and rescue missions, and for the safe-keeping of lives in military operations. However, civilian and military users face different environments and consequently have different user requirements. Even within the two broad fields […]

INTELLIGENCE IN COIN OPERATIONS: EXTENDING TARGETING INTO MONITORING IN AFGHANISTAN

The war effort in Afghanistan has focused on kinetic targeting. Since insurgent operations involve few fighters, the intelligence task became to identify and locate perpetrators. Modern network analysis was applied in support of targeting, but intelligence collection and analysis in support of day-to-day relations with Afghan communities have been insufficient to allow intelligence-driven operations to […]

Michael Fredholm © 2022 Frontier Theme