1,264
Views
1
CrossRef citations to date
0
Altmetric
Policing Crimes

A new methodology for strategic assessment of transnational threats

ORCID Icon &
Pages 40-56 | Received 09 Aug 2019, Accepted 27 Nov 2019, Published online: 09 Dec 2019

References

  • Atwood, C. P. (2015). Activity-based intelligence revolutionizing military intelligence analysis. Joint Force Quarterly, 77(2nd Quarter), 24–33.
  • Babuta, A. (2017, September). Big data and policing an assessment of law enforcement requirements, expectations and priorities. RUSI Occasional Paper.
  • Baginski, M. (2014). Domestic Intelligence Analysis. In R. George & J. Bruce (Eds.), Analyzing intelligence: National security practitioners’ perspectives (Second ed.) (pp. 265–286). Washington, DC.: Georgetown University Press.
  • Best, R. A. (2001). Intelligence and law enforcement: Countering transnational threats to the U.S. Washington, D.C.: Congressional Research Service Report for Congress.
  • Buzan, B., Waever, O., & Wilde, J. D. (1998). Security: A new framework for analysis. Boulder, Colo: Lynne Rienner Publisher.
  • Chainey, S., & Chapman, J. (2013). A problem‐oriented approach to the production of strategic intelligence assessments. Policing: An International Journal of Police Strategies & Management, 36(3), 474–490.
  • Colvin, A. (2017, Thursday December 14). AFP futures launch. Canberra, Australia: Australian Strategic Policy Institute.
  • Commonwealth of Australia (2017). Australian Criminal Intelligence Management Strategy, 2017–20. Australian Criminal Intelligence Commission, Canberra, Australia.
  • Commonwealth of Australia, D. o. t. P. M. a. C. (2017). 2017 Independent Intelligence Review (ISBN 978-1-925362-54-1 2017 Independent Intelligence Review (PDF))
  • Coyne, J. (2014). Strategic intelligence in law enforcement: Anticipating transnational organised crime (PhD). Queensland University of Technology.
  • Coyne, J., & Bell, P. (2011). Strategic intelligence in law enforcement: A review. Journal of Policing, Intelligence and Counter Terrorism, 6(1), 23–39.
  • Coyne, J., & Bell, P. (2014). The role of strategic intelligence in law enforcement: Policing transnational organized crime in Canada, the United Kingdom and Australia. London, UK: Palgrave Macmillan.
  • Coyne, J., Neal, S., & Bell, P. (2014). Reframing intelligence: Challenging the cold war intelligence doctrine in the information age. International Journal of Business and Commerce, 3(5), 53–68.
  • Davies, P. (2009). Theory and intelligence reconsidered. In P. Gill., S. Marrin., & M. Phythian, (Eds.), Intelligence Theory (pp. 186–207). New York, NY: Routledge.
  • Davies, P. H. J. (2010). Intelligence and the machinery of government: Conceptualizing the intelligence community. Public Policy and Administration, 25(1), 29–46.
  • Davies, P., Gustafson, K., & Rigden, I. (2013). The intelligence cycle is dead, long live the intelligence cycle: Rethinking intelligence fundamentals for a new intelligence doctrine. In M. Phythian (Ed.), Understanding the intelligence cycle, (pp. 56–75). New York, NY: Routledge.
  • Davis, J. (2015). Intelligence Analysts and Policymakers. In L. K. Johnson (Ed.), Essentials of Strategic Intelligence. Santa Barbara, CA: Praeger.
  • Degaut, M. (2015). Spies and policymakers: Intelligence in the information age. Intelligence and National Security, 31(4), 509–531.
  • Ferguson, A. G. (2017). Policing predictive policing. Washington University Law Review, 94(5), 1113–1195.
  • Fingar, T. (2011). Reducing Uncertainty: Intelligence analysis and national security. Stanford, CA: Stanford University Press.
  • Fishbein, W., & Treverton, G. (2004). Making Sense of Transnational Threats. In Number 1. Occasional Papers, 3(1). Sherman Kent Center for Intelligence Analysis, Central Intelligence Agency.
  • George, R. Z. (2010). Fixing the problem of analytical mind-sets: Alternative analysis. International Journal of Intelligence and CounterIntelligence, 17(3), 385–404.
  • George, R. Z., & Bruce, J. B. (ed.). (2014). Analyzing intelligence: National security practitioners’ perspectives (Second ed.). Washington, DC: Georgetown University Press.
  • Gookins, A. J. (2008). The role of intelligence in policy making. SAIS Review, 28(1 Winter–Spring), 65–73.
  • Hare, N., & Coghill, P. (2016). The future of the intelligence analysis task. Intelligence and National Security, 31(6), 858–870.
  • Heuer, R. J. (1999). Psychology of intelligence analysis. Center for the study of intelligence, Central Intelligence Agency.
  • Heuer, R. J. (2007, January 9–10). The future of “Alternative Analysis”. Paper presented at the Director of National Intelligence conference on Improving Intelligence Analysis: What Works? How Can We Tell? Lessons from Outside the Intelligence Community, Chantilly, VA.
  • Heuer, R. J. (2008). Small group processes for intelligence analysis. Sherman Kent Center for Intelligence Analysis, Central Intelligence Agency.
  • Heuer, R. J., & Pherson, R. (2015). Structured analytic techniques for intelligence analysis (Second ed.). Thousand Oaks, CA: CQ Press.
  • Hulnick, A. S. (2006). What’s wrong with the intelligence cycle. Intelligence and National Security, 21(6), 959–979.
  • Hulnick, A. S. (2011). intelligence producer–consumer relations in the electronic era. International Journal of Intelligence and CounterIntelligence, 24(4), 747–756.
  • Johnson, L. (2009). Sketches for a theory of strategic intelligence. In P. Gill., S. Marrin., M. Phythian, (Eds.), Intelligence Theory (pp. 33–53). New York, NY: Routledge.
  • Kahn, D. (2009). An historical theory of intelligence. In P. Gill., S. Marrin., M. Phythian, (Eds.), Intelligence Theory (pp. 4–15). New York, NY: Routledge.
  • Kent, S. (1966). Strategic intelligence for American world policy. Princeton, N.J.: Princeton University Press.
  • Kimminau, J. A. (2015). five examples of big data analytics and the future of ISR. Joint Force Quarterly, 77(2nd Quarter), 30–31.
  • Kowalick, P., & Connery, D. (2016). Special report. Canberra, Australia: Australian Strategic Policy Institute.
  • Kowalick, P., Connery, D., & Sarre, R. (2018). Intelligence-sharing in the context of policing transnational serious and organized crime: A note on policy and practice in an Australian setting. Police Practice and Research, 19(6), 596–608.
  • Lahneman, W. J. (2010). The need for a new intelligence paradigm. International Journal of Intelligence and CounterIntelligence, 23(2), 201–225.
  • Landon-Murray, M. (2016). Big data and intelligence: Applications, human capital, and education. Journal of Strategic Security, 9(2), 94–123.
  • Laqueur, W. (1993). The uses and limits of intelligence. New Jersey: Transaction Publishers.
  • Liaropoulos, A. N. (2006). A (R)evolution in intelligence affairs? In search of a new paradigm. Athens, Greece: Research Institute for European and American Studies (RIEAS).
  • Lim, K. (2015). Big data and strategic intelligence. Intelligence and National Security, 31(4), 619–635.
  • Lowenthal, M. M. (2012). Intelligence: From secrets to policy (5th ed.). Los Angeles: SAGE/CQ Press.
  • Manget, F. F. (2010). Intelligence and Law Enforcement. In L. K. Johnson (Ed.), The Oxford Handbook of National Security Intelligence. Oxford, UK: Oxford University Press.
  • Marrin, S. (2008). Intelligence analysis and decision-making. In P. Gill, S. Marrin, & M. Phythian (Eds.), Intelligence theory: Key questions and debates (pp. 131–150). New York: Routledge.
  • Marrin, S. (2013a). Rethinking analytic politicization. Intelligence and National Security, 28(1), 32–54.
  • Marrin, S. (2013b). Revisiting intelligence and policy: Problems with politicization and receptivity. Intelligence and National Security, 28(1), 1–4.
  • McDowell, D. (1992). Strategic intelligence and law enforcement [online]. Journal of the Australian Institute of Professional Intelligence Officers, 1(1), 9–20. Retrieved from <ext-link-type="uri" xlink:href="https://search-informit-com-au.ezproxy-b.deakin.edu.au/documentSummary;dn=475685253666319;res=IELHSS> ISSN: 1039-1525“ icporder=“ext-link-type;;xlink:href“>https://search-informit-com-au.ezproxy-b.deakin.edu.au/documentSummary;dn=475685253666319;res=IELHSS> ISSN: 1039-1525
  • McDowell, D. (2008). Strategic intelligence: A handbook for practitioners, managers, and users. Plymouth, UK: Scarecrow Press.
  • Odom, W. E. (2008). Intelligence Analysis. Intelligence and National Security, 23(3), 316–332.
  • Omand, D. (2010). Securing the state. New York: Columbia University Press.
  • Omand, D. (2013). Securing the state: National security and secret intelligence. Prism: A Journal of the Center for Complex Operations, 4, 3.
  • Omand, D., Bartlett, J., & Miller, C. (2012). Introducing Social Media Intelligence (SOCMINT). Intelligence & National Security, 27(6), 801–823.
  • Pherson, K. H., & Pherson, R. H. (2012). Critical thinking for strategic intelligence. Thousand Oaks, CA: CQ Press.
  • Phythian, M. (2013). Understanding the intelligence cycle. Milton Park, Abingdon, Oxon: Routledge.
  • Police, A. F. (2018). AFP: Our organisation. Retrieved from https://www.afp.gov.au/about-us/our-organisation
  • Ratcliffe, J. (2003). Intelligence-led policing. Trends and Issues in Crime and Criminal Justice, 248,1–6.
  • Ratcliffe, J. (2007). Integrated intelligence and crime analysis: Enhanced information management for law enforcement leaders. Washington, DC: Police Foundation (August).
  • Ratcliffe, J. (Ed.). (2009). Strategic thinking in criminal intelligence. (2nd ed.). Annandale, N.S.W: Federation Press.
  • Ratcliffe, J. (2012). Intelligence-led policing. Hoboken: Taylor and Francis.
  • Rogers, K. (1998). Evaluating strategic intelligence assessments: Some sextant readings for law enforcement [online]. Journal of the Australian Institute of Professional Intelligence Officers, 7(3), 23–39.
  • Rogers, K. (2009). Developments in Australian strategic criminal intelligence. In J. Ratcliffe (Ed.), Strategic Thinking in Criminal Intelligence (pp. 13–27). Sydney: The Federation Press.
  • Rolington, A. (2013). Strategic intelligence for the 21st century: The mosaic method. Oxford: Oxford University Press.
  • Rovner, J. (2013). Intelligence in the twitter age. International Journal of Intelligence and CounterIntelligence, 26(2), 260–271.
  • Symon, P. B., & Tarapore, A. (2015). Defense intelligence analysis in the age of big data. Joint Force Quarterly, 79(4), 8.
  • Treverton, G. F. (2003). Terrorism, intelligence and law enforcement: Learning the right lessons. Intelligence and National Security, 18(4), 121–140.
  • Treverton, G. F. (2005). Making sense of transnational threats. Workshop Reports, Santa Monica, CA, RAND Corporation
  • Treverton, G. F. (2010). Addressing “Complexities” in Homeland Security. In L. K. Johnson (Ed.), The Oxford Handbook of National Security Intelligence(pp. 343–358). Oxford, UK: Oxford University Press.
  • US Government. (2009). A tradecraft primer: Structured analytic techniques for improving intelligence analysis. Sherman Kent Center for Intelligence Analysis, Central Intelligence Agency.
  • Vandepeer, C. (2011a, December 5th −7th). Intelligence analysis and threat assessment: Towards a more comprehensive model of threat. Paper presented at the 4th Australian Security and Intelligence Conference, Perth.
  • Vandepeer, C. (2011b). Rethinking threat: Intelligence analysis, intentions, capabilities, and the challenge of non-state actors. Adelaide, Australia: University of Adelaide.
  • Wardlaw, G. (2015). Is the Intelligence Community Changing Appropriately to Meet the Challenges of the New Security Environment? In G. Bammer (Ed.), Change! Combining Analytic Approaches with Street Wisdom (pp. 107–128). Canberra, Australia: ANU Press.
  • Wastell, C. A. (2010). Cognitive predispositions and intelligence analyst reasoning. International Journal of Intelligence and CounterIntelligence, 23(3), 449–460.
  • Waters, G. (2014). Getting it right: Integrating the intelligence, surveillance and reconnaissance enterprise. Kokoda Papers( 18).
  • Weston, C., Bennett-Moses, L., & Sanders, C. (2019). The changing role of the law enforcement analyst: Clarifying core competencies for analysts and supervisors through empirical research. Policing and Society, 1–16. doi:10.1080/10439463.2018.1564751
  • Wirtz, J. J. (2014). The Intelligence-Policy Nexus. In L. K. Johnson (Ed.), Essentials of Strategic Intelligence(pp. 139-154). Santa Barbara, CA: Praeger.
  • Yin, R. K. (2013). Case study research: Design and methods. Thousand Oaks, CA: SAGE Publications.
  • Zedner, L. (2009). Security. London: Routledge.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.