The Open Access Publisher and Free Library
03-crime prevention.jpg

CRIME PREVENTION

CRIME PREVENTION-POLICING-CRIME REDUCTION-POLITICS

Posts tagged homeland security
DHS Innovation, Research & Development Strategic Plan: Fiscal Years 2024-2030

UNITED STATES. DEPARTMENT OF HOMELAND SECURITY

From the document: "Protecting our nation requires timely responses to rapidly evolving dangers while protecting against longer-term homeland security threats and hazards. To meet these complex operational needs, innovation, research and development (IRD) initiatives and investments are critical to ensure the Department of Homeland Security (DHS) has the tools to help secure our nation. [...] While historically DHS has supported research and development (R&D), investments in innovation are newer and growing in scope and number across all DHS Components, whether through technological improvements or process efficiencies. The combination of these innovation and R&D investments will benefit from increased awareness and coordination. The Secretary's Calendar Year (CY) 2023 priorities captured this, seeking to 'ensure R&D across the Department and with external partners are coordinated and integrated.' To accomplish this goal, this coordinated DHS IRD Strategic Plan focuses on current efforts and longer-term Departmental investments. The Plan also highlights complementary efforts underway across the HSE [homeland security enterprise], consisting of federal, state, local, tribal, territorial, nongovernmental, and private sector entities, as well as individuals, families, and communities who share a common national interest in the safety and security of the United States and its people. The Plan inventories current and future IRD efforts within DHS, organized by the DHS Missions and Objectives as articulated in the third 'Quadrennial Homeland Security Review (2023).' By capturing these initiatives in a comprehensive plan, the Department can identify cross-cutting IRD themes that provide opportunities for making impacts towards meeting multiple desired outcomes. These are articulated as Strategic Priority Research Areas (SPRAs)[.]"

UNITED STATES. DEPARTMENT OF HOMELAND SECURITY. MAY, 2024. 44p.

Achieving Equitable Recovery: A Post-Disaster Guide for Local Officials and Leaders

United States. Federal Emergency Management Agency

From the document: "Disaster recovery begins shortly after a disaster when survivors start to rebuild their community. The disaster recovery process creates opportunities for communities to rebuild thoughtfully, equitably, and resiliently. 'Achieving Equitable Recovery: A Post-Disaster Guide for Local Officials and Leaders' (hereafter the 'Guide') helps communities focus their efforts on forming relationships, holding conversations about equity, and prioritizing post-disaster recovery projects and resources that meet the needs of each community member. [...] This Guide identifies eight goals that organize actions to work towards achieving equitable recovery outcomes through an accessible, inclusive, and equitable recovery planning process. These goals are action-oriented to better provide local recovery officials with strategies for implementing focused and system-wide changes to the disaster recovery process."

United States. Federal Emergency Management Agency. 2023. 144p.

Special Report: Common Cybersecurity Weaknesses Related to the Protection of DoD Controlled Unclassified Information on Contractor Networks

United States. Department Of Defense. Office Of The Inspector General

From the document: "This special report provides insight into the common cybersecurity weaknesses identified in DoD Office of Inspector General (OIG) audit reports and through our support to the Defense Criminal Investigative Service and the Department of Justice on Civil Cyber-Fraud Initiative investigations related to DoD contractor compliance with Federal cybersecurity requirements for protecting controlled unclassified information (CUI). CUI is not classified information but is information created or possessed by the Government that requires safeguarding or dissemination controls according to applicable laws, regulations, and Government-wide policies as defined in Executive Order 13526, 'Classified National Security Information,' December 29, 2009. From 2018 through 2023, the DoD OIG issued five audit reports focusing on DoD contractors' inconsistent implementation of Federal cybersecurity requirements for protecting CUI that are contained in National Institute of Standards and Technology (NIST) Special Publication (SP) 800-171. Since 2022, the DoD OIG has provided support for five investigations under the Civil Cyber Fraud Initiative, which targets government contractors and grant recipients suspected of fraudulently attesting their compliance with the NIST SP 800-171 cybersecurity requirements. The common cybersecurity weaknesses identified in this special report provide DoD contracting officers with potential focus areas when assessing contractor performance and DoD contractors and grant recipients with potential focus areas before attesting to their compliance with NIST SP 800-171."

Department of Defense, Office of Inspector General, Report No. DODIG-'2024-'031. 24p.

2023 National Preparedness Report

By United States. Federal Emergency Management Agency

From the document: "The 2023 NPR [National Preparedness Report] outlines the nation's progress towards achieving the National Preparedness Goal of 'A secure and resilient nation with the capabilities required across the whole community to prevent, protect against, mitigate, respond to, and recover from the threats and hazards that pose the greatest risk' as well as recommendations for closing remaining gaps. This annual report draws upon various data sources, including open-source data, FEMA and community preparedness data sets, and submissions from federal departments and agencies. FEMA also recognizes critical infrastructure owners and operators as important partners in emergency management and community resilience, but did not collect insights into preparedness from this group, as such research presently extends beyond the scope of this report."

United States. Federal Emergency Management Agency. Dec, 2023. 59p.

CISA Open Source Software Security Roadmap

United States. Cybersecurity & Infrastructure Security Agency

From the document: "The federal government, critical infrastructure, and state, local, tribal, and territorial (SLTT) governments greatly depend upon open source software (OSS). OSS is software for which the human-readable source code is made available to the public for use, study, re-use, modification, enhancement, and re-distribution. OSS is part of the foundation of software used across critical infrastructure, supporting every single critical infrastructure sector [hyperlink] and every National Critical Function [hyperlink]: one study found that 96% of studied codebases across various sectors contain open source code, and 76% of code in studied codebases was open source. Therefore, to fulfill CISA's [Cybersecurity and Infrastructure Security Agency's] mission of understanding, managing, and reducing risks to the federal government and critical infrastructure, we must understand and protect the open source software that we rely upon. [...] CISA recognizes the immense benefits of open source software, which enables software developers to work at an accelerated pace and fosters significant innovation and collaboration. With these benefits in mind, this roadmap lays out how CISA will help enable the secure usage and development of OSS, both within and outside the federal government."

Washington. D.C United States. Cybersecurity & Infrastructure Security Agency . 2023. 8p.

NASA: Unidentified Anomalous Phenomena Independent Study Team Report

United States. National Aeronautics And Space Administration

From the document: "Recently, many credible witnesses, often military aviators, have reported seeing objects they did not recognize over U.S. airspace. Most of these events have since been explained, but a small handful cannot be immediately identified as known human-made or natural phenomena. These events are now collectively referred to as Unidentified Anomalous Phenomena, or UAP [Unidentified Anomalous Phenomena]. A vital part of NASA's mission is exploring the unknown using the rigorous process of the scientific method. This means scrutinizing our assumptions and intuition; transparently and diligently collecting data; reproducing results; seeking independent evaluation; and finally, reaching a scientific consensus about the nature of an occurrence. The scientific method challenges us to solve problems by impartially evaluating our own ideas, by being willing to be wrong, and by following the data. [...] This report offers a vision of how NASA could contribute to understanding the phenomena and how the agency's approach will complement the whole-of-government effort to understand UAP."

Washington. D.C. United States. National Aeronautics And Space Administration 2023. 36p.

Surveillance for Sale: The Underregulated Relationship between U.S. Data Brokers and Domestic and Foreign Government Agencies

By Caitlin Chin

Ten years ago, when whistleblower Edward Snowden revealed that U.S. government agencies had intercepted bulk telephone and internet communications from numerous individuals around the world, President Barack Obama acknowledged a long-standing yet unsettled dilemma: “You can’t have 100 percent security and also then have 100 percent privacy and zero inconvenience. There are trade-offs involved.” Snowden’s disclosures reignited robust debates over the appropriate balance between an individual’s right to privacy and the state’s interest in protecting economic and national security—in particular, where to place limitations on the U.S. government’s ability to compel access to signals intelligence held by private companies. These debates continue today, but the internet landscape—and subsequently, the relationship between the U.S. government and private sector—has evolved substantially since 2013. U.S. government agencies still routinely mandate private companies like Verizon and Google hand over customers’ personal information and issue non-disclosure orders to prevent these companies from informing individuals about such access. But the volume and technical complexity of the data ecosystem have exploded over the past decade, spurred by the rising ubiquity of algorithmic profiling in the U.S. private sector. As a result, U.S. government agencies have increasingly turned to “voluntary” mechanisms to access data from private companies, such as purchasing smartphone geolocation history from third-party data brokers and deriving insights from publicly available social media posts, without the formal use of a warrant, subpoena, or court order. In June 2023, the Office of the Director of National Intelligence (ODNI) declassified a report from January 2022—one of the first public efforts to examine the “large amount” of commercially available information that federal national security agencies purchase. In this report, ODNI recognizes that sensitive personal information both “clearly provides intelligence value” but also increases the risk of harmful outcomes like blackmail or harassment. Despite the potential for abuse, the declassified report reveals that some intelligence community elements have not established proper privacy and civil liberties guardrails for commercially acquired information and that even ODNI lacks awareness of the full scope of data brokerage contracts across its 18 units. Critically, the report recognizes that modern advancements in data collection have outpaced existing legal safeguards: “Today’s CAI [commercially available information] is more revealing, available on more people (in bulk), less possible to avoid, and less well understood than traditional PAI [publicly available information].” The ODNI report demonstrates how the traditional view of the privacy-security trade-off is becoming increasingly nuanced, especially as gaps in outdated federal law around data collection and transfers expand the number of actors and risk vectors involved. National Security Adviser Jake Sullivan recently noted that there are also geopolitical implications to consider: “Our strategic competitors see big data as a strategic asset.” When Congress banned the popular mobile app TikTok on government devices in the 2023 National Defense Authorization Act (NDAA), it cited fears that the Chinese Communist Party (CCP) could use the video-hosting app to spy on Americans. However, the NDAA did not address how numerous other smartphone apps, beyond TikTok, share personal information with data brokers—which, in turn, could transfer it to adversarial entities. In 2013, over 250,000 website privacy policies acknowledged sharing data with other companies; since then, this number inevitably has increased. In a digitized society, unchecked data collection has become a vulnerability for U.S. national security—not merely, as some once viewed, a strength. The reinvigorated focus on TikTok’s data collection practices creates a certain paradox. While politicians have expressed concerns about Chinese government surveillance through mobile apps, U.S. government agencies have purchased access to smartphone geolocation data and social media images related to millions of Americans from data brokers without a warrant. The U.S. government has simultaneously treated TikTok as a national security risk and a handy source of information, reportedly issuing the app over 1,500 legal requests for data in 2021 alone. It is also important to note that national security is not the only value that can come into tension with information privacy, as unfettered data collection carries broader implications for civil rights, algorithmic fairness, free expression, and international commerce, affecting individuals both within and outside the United States.

Washington, DC: The Center for Strategic and International Studies (CSIS) 2023. 60p.

2023 National Intelligence Strategy

By United States. Office Of The Director Of National Intelligence; Intelligence Community (U.S.)

From the document: "Following the attacks of September 11, 2001, and in the wake of the Intelligence Reform and Terrorism Prevention Act passed by Congress in 2004, Director of National Intelligence John D. Negroponte signed out the Intelligence Community's (IC) first National Intelligence Strategy. The strategy explained that the Intelligence Community's clear charge was to: [1] Integrate the domestic and foreign dimensions of U.S. intelligence so that there are no gaps in our understanding of threats to our national security; [2] Bring more depth and accuracy to intelligence analysis; and [3] Ensure that U.S. intelligence resources generate future capabilities as well as present results. Now, almost twenty years after our first strategy was issued, the Intelligence Community's charge remains just as clear, even as the strategic environment has changed dramatically. The United States faces an increasingly complex and interconnected threat environment characterized by strategic competition between the United States, the People's Republic of China (PRC), and the Russian Federation, felt perhaps most immediately in Russia's ongoing aggression in Ukraine. In addition to states, sub-national and non-state actors--from multinational corporations to transnational social movements--are increasingly able to create influence, compete for information, and secure or deny political and security outcomes, which provides opportunities for new partnerships as well as new challenges to U.S. interests. In addition, shared global challenges, including climate change, human and health security, as well as emerging and disruptive technological advances, are converging in ways that produce significant consequences that are often difficult to predict. [...] The six goals outlined in this National Intelligence Strategy have emerged as our understanding of the kinds of information, technology, and relationships needed to be effective in the future has expanded."

Washington. United States. Office of the Director of National Intelligence. Intelligence Community (U.S.). 2023.

2023 Biodefense Posture Review

By United States. Department Of Defense

From the document: "The Department of Defense (DoD) is at a pivotal moment in biodefense as it faces an unprecedented number of complex biological threats (biothreats). This inaugural DoD Biodefense Posture Review (BPR) initiates key reforms--built on the foundations of the 2022 National Defense Strategy (NDS), the October 2022 National Biodefense Strategy and Implementation Plan for Countering Biological Threats, Enhancing Pandemic Preparedness, and Achieving Global Health Security (NBS); and lessons learned from the coronavirus disease 2019 (COVID-19) pandemic response--to posture DoD to counter biothreats through 2035. Developments in biological technology (biotechnology) are driving an increase in the scope and diversity of biothreats that DoD could face in the next decade. Additionally, as the planet's climate continues to change and its population grows, emerging infectious diseases are expected to develop and spread more frequently and potentially threaten DoD's readiness to achieve and maintain its national defense goals. The COVID-19 pandemic response presented opportunities for DoD to both improve its overall preparedness and posture, as well as to reinforce and reimagine its role in support of the broader U.S. Government and our allies and partners."

Washington D.C. United States. Department of Defense. 2023. 56p.

CISA Cybersecurity Strategic Plan, FY2024-2026

By UNITED STATES. CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCY

From the document: "Our nation is at a moment of opportunity. The '2023 U.S. National Cybersecurity Strategy' outlines a new vision for cybersecurity, a vision grounded in collaboration, in innovation, and in accountability. Now is the moment where our country has a choice: to invest in a future where collaboration is a default rather than an exception; where innovation in defense and resilience dramatically outpaces that of those seeking to do us harm; and where the burden of cybersecurity is allocated toward those who are most able to bear it. We must be clear-eyed about the future we seek, one in which damaging cyber intrusions are a shocking anomaly, in which organizations are secure and resilient, in which technology products are safe and secure by design and default. This is a shared journey and a shared challenge, and CISA [Cybersecurity and Infrastructure Security Agency], as America's cyber defense agency, is privileged to serve a foundational role in the global cybersecurity community as we achieve measurable progress to our shared end state. [...] We must change how we design and develop technology products, such that exploitable conditions are uncommon and secure controls are enabled before products reach the market. We must quickly detect adversaries, incidents, and vulnerabilities, and enable timely mitigation before harm occurs. We must help organizations, particularly those that are 'target rich, resource poor,' take the fewest possible steps to drive the most security impact."

United States. Cybersecurity & Infrastructure Security Agency. 2023. 36p.

Beyond Policing: Investing in Offices of Neighborhood Safety

By Betsy Pearl

  In recent years, a series of high-profile cases of police violence—from Michael Brown, Tamir Rice and Eric Garner to George Floyd, Breonna Taylor, and Jacob Blake—has brought to the national consciousness concerns that have been prevalent among many activists, researchers, and policymakers: What should we expect of the police? Who is responsible for public safety? And what does it mean to invest in safety beyond policing? The traditional understanding of public safety in the United States has revolved almost exclusively around policing, which is demonstrated by the size of the footprint of police agencies and their corresponding budgets. For example, the number of police officers nationwide has grown by 36 percent in two decades—from less than 700,000 officers in 1990 to more than 950,000 in 2012. As the size of American police forces grew, so too did their role in the community. “Efforts to address underlying community problems through social investment took a backseat [to] policing strategies,” noted political scientists Joe Soss and Vesla Weaver. The duties of the modern police force now extend well beyond enforcing the law, to include tasks from treating overdoses and de-escalating behavioral health crises to addressing homelessness and responding to disciplinary concerns in schools. Law enforcement now spends only a fraction of their time responding to issues of violence: American police officers make more than 10 million arrests each year, less than 5 percent of which are for serious violent crimes. The impact of police force expansion on community safety is debatable at best. While determining the cause of crime rate fluctuations is a notoriously difficult task, an analysis from the Brennan Center for Justice finds that the increase in officers had only a modest effect on crime rates in the 1990s, accounting for between 0 percent and 10 percent of the total crime reduction. Police growth continued between 2000 and 2012, with no discernible effect on crime rates. Instead, societal factors, such as growth in income, likely played a more important part in reducing crime rates during the 1990s and 2000s. Sociologist Patrick Sharkey has also analyzed factors contributing to crime reductions between 1990 and 2012, concluding that community-based organizations likely played a “substantial role in explaining the decline in violence” during this time period. In a city of 100,000 people, every new nonprofit focused on neighborhood safety and wellness was associated with an estimated 1 percent reduction in violent crime and homicide. ...

Washington, DC: Center for American Progress, 2020. 37p.

Theory for Homeland Security

By John Comiskey

Abstract: This study identified and analyzed the utilization of theory in college homeland security curricula in the United States. Faculty and program directors with diverse academic and professional backgrounds actively teach theory from multiple fields and disciplines to help prepare students for the field, address homeland security problems, and to grow and mature the field. The most prevalent theories which are taught as part of college homeland security curricula constellate around leadership, risk management, security, social identity, and terrorism themes. Homeland security, however, lacks a grand theory or overarching framework. Essentially, homeland security is an eclectic discipline or field of study that seeks to prevent, protect against, mitigate, respond to, and recover from the threats and hazards that pose the greatest risks to the Nation.

Journal of Homeland Security Education. Volume 7 (2018). 17p.

Third Quadrennial Homeland Security Review

By United States. Department Of Homeland Security

From the document: "This Report reaffirms the five enduring homeland security missions as articulated in the first two QHSR [Quadrennial Homeland Security Review] Reports issued in 2010 and 2014 and focuses on how the Department must adapt and evolve to accomplish them. It also introduces a new homeland security mission, 'Combatting Crimes of Exploitation and Protecting Victims,' reflecting the overriding urgency of supporting victims and stopping perpetrators of such heinous crimes as human trafficking, labor exploitation, and child exploitation, the importance of engaging the public, and the heroic work of the DHS workforce and our homeland security enterprise partners in this mission space. DHS investigates crimes of exploitation, supports victims, trains law enforcement partners, and enforces trade laws related to human trafficking, and we will continue to advocate for additional resources to execute on these lines of effort at an ever-increasing level. U.S. Immigration and Customs Enforcement initiated more than 6,000 child exploitation cases and U.S. Customs and Border Protection seized 3,605 shipments valued at $816.5 million due to forced labor concerns in fiscal year 2022. By elevating this work as a new mission, we are laying the groundwork for further growth in our commitment and capabilities, including planning, increased budget requests, operational cohesion, and partnerships."

United States. Department of Homeland Security. 2023. 92p

Top Risks in Cybersecurity 2023

By Romanoff, Tom; Farshchi, Jamil; Neschke, Sabine; Lord, Ben; Draper, Danielle; Douglas, Ahmad

From the document: "The Bipartisan Policy Center (BPC) convened a working group of leaders to strengthen America's cybersecurity. The group's approach was to identify the nation's top cybersecurity risks to raise awareness so policymakers and businesses can take pragmatic action and invest in countermeasures. In assembling the working group, the co-chairs sought broad inclusivity from strategically important industries, government, and civil society. Every sector with a stake in cybersecurity was included--banking, communications, digital platforms, health, energy, and more. The working group drew from a wide range of important perspectives, including stakeholders representing privacy concerns and digital identities. [...] Identifying cybersecurity risks is the first step in managing them. This report--unlike other, more technical sources that identify cyber risks--frames them for the strategic audience of business and government decision-makers. We intentionally focused on identifying risks, not solutions, because various stakeholders may need to take different approaches. There are no one-size-fits-all fixes. Rather, these top risks must be considered individually by companies and collectively by the nation. Many will require a multifaceted response, across business and government, who will need to work various levers including policy, organizational culture, technology, and processes."

Bipartisan Policy Center 2023. 28p.

Organizational Assessment: The National Counterintelligence and Security Center [Redacted]

By United States. Congress. Senate. Select Committee on Intelligence

From the Document: "(U) The Senate Select Committee on Intelligence (SSCI or the Committee) has long expressed interest in reviewing the United States Government (USG) counterintelligence (CI) enterprise to identify actions needed to enhance its posture, capabilities, and responsibilities in response to contemporary foreign intelligence entity (FIE) threats. The Committee tasked the Audits & Projects Team (Team) with conducting a targeted organizational assessment of the National Counterintelligence and Security Center (NCSC or the Center)--the statutory head of U.S. CI--to understand whether this entity is properly authorized, resourced, and structured to carry out its mission. 'This report seeks to (1) identify the key challenges facing NCSC in carrying out its mission and (2) capture a range of opinions from CI experts on those challenges and potential ways forward.'"

United States. Congress. Senate. Select Committee on Intelligence 2022. 153p.

Managing Event Places and Viewer Spaces : Security, Surveillance and Stakeholder Interests at the 2010 FIFA World Cup in South Africa

By Simone Eisenhauer


This thesis explores the security risk management and commercial organisation of public urban spaces at the 2010 FIFA World Cup (FWC) in South Africa. Extending knowledge of how commercial interests intersect with security risk management of public urban spaces at sport mega-events, this study examines these concepts in a developing world context. Using a neoliberal theoretical lens and drawing on the concepts of Festivalisation and Disneyisation, the research contributes to academic scholarship in the areas of both sport and event management. This is achieved through a critical examination of security and commercialisation strategies in ‘public spaces’ at a sport mega-event, namely, public viewing areas (PVAs) and commercial restricted zones (CRZs). The research problem was investigated by means of an inductive interpretive qualitative case study approach. The selected event was the 2010 FWC, and within this event an in-depth case study of Cape Town was selected for examination. Multiple sources of evidence included government, management, and media documentation.

Sydney: University of Technology, Sydney: 2013. 364p.

Central America Regional Security Initiative: Background and Policy Issues for Congress

By Peter J. Meyer and Clare Ribando Seelke

Central America faces significant security challenges. Criminal threats, fragile political and judicial systems, and social hardships such as poverty and unemployment contribute to widespread insecurity in the region. Consequently, improving security conditions in these countries is a difficult, multifaceted endeavor. Because U.S. drug demand contributes to regional security challenges and the consequences of citizen insecurity in Central America are potentially far-reaching, the United States is collaborating with countries in the region to implement and refine security efforts.

Washington, DC: U.S. Congressional Research Service, 2012. 40p.

Dealing with the Past in Security Sector Reform

By Alexander Mayer-Rieckh

Security sector reform (SSR) and transitional justice processes often occur alongside each other in societies emerging from conflict or authoritarian rule, involve many of the same actors, are supported by some of the same partner countries and impact on each other. Yet the relationship between SSR and transitional justice, or â dealing with the pastâ (DwP) as it is also called, remains underexplored and is often marked by ignorance and resistance. While SSR and transitional justice processes can get into each otherâ s way, this paper argues that SSR and DwP are intrinsically linked and can complement each other. SSR can make for better transitional justice and vice versa. Transitional justice needs SSR to prevent a recurrence of abuses, an essential element of justice. SSR can learn from transitional justice not only that it is better to deal with rather than ignore an abusive past but also how to address an abusive legacy in the security sector. The validity of these assumptions is tested in two case studies: the police reform process in Bosnia and Herzegovina after 1995 and the SSR process in Nepal after 2006.

London: Ubiquity Press, 2018. 79p.

A "New" Dynamic in the Western Hemisphere Security Environment: The Mexican Zetas and Other Private Armies by Max G. Manwaring

By Max G. Manwaring.

This monograph is intended to help political, military, policy, opinion, and academic leaders think strategically about explanations, consequences, and responses that might apply to the volatile and dangerous new dynamic that has inserted itself into the already crowded Mexican and hemispheric security arena, that is, the privatized Zeta military organization. In Mexico, this new dynamic involves the migration of traditional hard-power national security and sovereignty threats from traditional state and nonstate adversaries to hard and soft power threats from professional private nonstate military organizations. This dynamic also involves a more powerful and ambiguous mix of terrorism, crime, and conventional war tactics, operations, and strategies than experienced in the past. Moreover, this violence and its perpetrators tend to create and consolidate semi-autonomous enclaves (criminal free-states) that develop in to quasi-states—and what the Mexican government calls “Zones of Impunity.” All together, these dynamics not only challenge Mexican security, stability, and sovereignty, but, if left improperly understood and improperly countered, also challenge the security and stability of the United States and Mexico’s other neighbors..

Carlisle, PA: U.S. Army War College Press, 2009. 53p.

National Security Intelligence and Ethics

Edited by Seumas Miller, Mitt Regan, and Patrick F. Walsh. This volume examines the ethical issues that arise as a result of national security intelligence collection and analysis. Powerful new technologies enable the collection, communication, and analysis of national security data on an unprecedented scale. Data collection now plays a central role in intelligence practice, yet this development raises a host of ethical and national security problems, such as: privacy; autonomy; threats to national security and democracy by foreign states; and accountability for liberal democracies. This volume provides a comprehensive set of in-depth ethical analyses of these problems by combining contributions from both ethics scholars and intelligence practitioners. It provides the reader with a practical understanding of relevant operations, the issues that they raise, and analysis of how responses to these issues can be informed by a commitment to liberal democratic values. This combination of perspectives is crucial in providing an informed appreciation of ethical challenges that is also grounded in the realities of the practice of intelligence.

London; New York: Routledge, 2022. 317p.