Table 2 - uploaded by Frederic Lemieux
Content may be subject to copyright.
Intelligence Collection Disciplines and Their Application to Intelligence Fields.

Intelligence Collection Disciplines and Their Application to Intelligence Fields.

Source publication
Book
Full-text available
Often described as ‘two solitudes’, law enforcement and national security intelligence agencies engage in intensive collaboration to address both international and domestic threats. This situation has blurred the lines between interior and exterior security; common crime and crime against the state; civil liberties, privacy, and intrusive surveilla...

Similar publications

Article
Full-text available
In this paper, an innovative design model of autonomous aerial vehicle is designed and fabricated with dual rotor setup. Nowadays, innovative unmanned aerial vehicles (UAVs) are widely required for surveillance, monitoring, data collection, reconnaissance and generally in places where humans face hazardous. In this model and design of UAVs, aero dy...

Citations

... (2) Ces résultats sont issus de l'analyse croisée de la littérature internationale sur le sujet de la réintégration sociale et du désengagement en matière d'extrémisme violent, et d'entretiens semi-directifs menés dans le cadre de la recherche ANR TROC (ANR-20-CE39-0007) avec des acteurs de la sécurité, de la justice et du monde associatif, ainsi qu'avec des personnes condamnées pour terrorisme. (Kearns, 2020 ;Perry & Jonathan-Zamir, 2014) est mis en exergue par les attaques et la menace terroristes (Lemieux, 2018). Les acteurs politiques et institutionnels vont passer progressivement d'opérations de remembrement des territoires du renseignement, où chacun cherche à gagner des champs d'investigation plus étendus, à la nécessité de trouver des nouvelles articulations sur des missions ou des compétences transverses (Amadio, 2022). ...
Article
Dans Cahiers de la sécurité et de la justice Cahiers de la sécurité et de la justice 2023/2 (N° 58) 2023/2 (N° 58), pages 20 à 31 Éditions Institut des hautes études du ministère de l'Intérieur Institut des hautes études du ministère de l'Intérieur Distribution électronique Cairn.info pour Institut des hautes études du ministère de l'Intérieur. Distribution électronique Cairn.info pour Institut des hautes études du ministère de l'Intérieur. La reproduction ou représentation de cet article, notamment par photocopie, n'est autorisée que dans les limites des conditions générales d'utilisation du site ou, le cas échéant, des conditions générales de la licence souscrite par votre établissement. Toute autre reproduction ou représentation, en tout ou partie, sous quelque forme et de quelque manière que ce soit, est interdite sauf accord préalable et écrit de l'éditeur, en dehors des cas prévus par la législation en vigueur en France. Il est précisé que son stockage dans une base de données est également interdit.
... 25-26) Since the 2000s, the proliferation of new actors and the succession of terrorist attacks led by external and internal enemies have reinforced intelligence issues, notably by employing a community policing approach (Ratcliffe 2016). The globalised configuration of relations between State and non-State actors makes the borders between foreign and homeland security and intelligence fields more porous (Lemieux 2018). Gradually, an international intelligence community is being created, which is facing up to the rapidly-changing context, which is in turn supported by new technologies and the increasing emergence of financial structures at the cost of productive structures (Gruszczak 2016). ...
Article
In response to new threats, the French Gendarmerie created Intelligence Analysis Groups within criminal units in 2017. The aim of this article is to show how IAGs are shaping a subculture of criminal intelligence through the main dynamics structuring CHIS management. Following a literature review, the first part of this paper contextualises the promotion of human intelligence in criminal units and presents the mixed approach employed. The second part demonstrates how handlers' practices are geared toward two processes-the exploratory gathering of information followed by cleansing of such information-and require high availability, acting via three skills (cognitive, memory and empathy). The third part presents how two dimensions underpinning the handlers' commitment (a shared belief regarding secrecy as being useful and partial autonomy) are directed through use of the 'gray zone' between judicial and administrative actions in order to enable judicial action.
... Die Möglichkeit, Daten freiwillig für Maßnahmen von Public Health zur Verfügung zu stellen, kann auch als Bestandteil der Beteiligung an Forschungsprozessen und einer fundierten Gesundheitspolitik gesehen werden. Gleichzeitig gibt es starke Kritik an der gemeinsamen Datennutzung mit Hilfe KIgetriebener Systeme -insbesondere zu Prognosen und Vorhersagen, die mittels KI-basierter Technologie erstellt werden, da sie scheinbar freie Entscheidungsprozesse in fremdbestimmter Weise bestimmen [11,12]. Verbleibende Unsicherheiten und Restrisiken suggerieren einen permanenten Ausnahmezustand, der nur durch immer weitere Freiheitseinschränkungen kontrolliert werden kann. ...
Article
Zusammenfassung Wie kann das Zusammenspiel von Public Health mit neuen Technologien gelingen? Der Beitrag weist aus ethischer Perspektive auf drei zentrale Herausforderungen in dem Spannungsfeld von individuellen und gesellschaftlichen Gesundheitszielen hin: 1) die Ermöglichung von individuellen Entscheidungen über die eigene Datenweitergabe und Privatsphäre in Public Health Kontexten, 2) Vertrauen als zentrale Bedingung für eine solidarische Gabe von Daten und 3) notwendig institutionell verankerte Möglichkeiten für partielle und kontextsensitive Kompromisse zum Zweck einer gemeinwohlorientierten Public Health Strategie. Abstract How can the interaction of public health with new technologies succeed? From an ethical perspective, this article points to three central challenges in the field of tension between individual and societal health goals: 1) enabling individual decisions about one’s own data disclosure and privacy in public health contexts, 2) trust as a central condition for a solidary gift of data, and 3) necessary institutionally anchored possibilities for partial and context-sensitive compromises for the purpose of a public welfare-oriented public health strategy.
... Western democracies have granted more online surveillance powers to security authorities during recent decades (Lyon 2015;Lemieux 2019). These institutional and legal changes have also pushed policing from criminal investigation to a more ambiguous field of crime control, pre-emptive measures and risk assessment (Ericson and Haggerty 1997). ...
... At the same time, the blurring of the boundaries between foreign and domestic security has expanded the role of secret services (Bauman et al. 2014;Shiraz 2017). The improved surveillance capabilities are justified by their supporters as a necessary security-increasing response against evolving threats, especially terrorism, violent extremism, cyber-attacks and espionage (Leigh and Wegge 2019;Lemieux 2019;Sivan-Sevilla 2019). ...
Article
Full-text available
Authorities' online surveillance powers touch the very core of democracy, human rights and privacy. Thus, the legislation and its implementation must be both sustainable and legitimate in the eyes of the citizenry. We argue that the general elements of legitimate and sustainable online surveillance system can be derived from many international sources, but the crux of the matter is to adjust the general principles into country-specific conditions through well-informed, reasoned and inclusive national legislation preparation and regular follow-up discussions. We explored how 25 key stakeholders from various fields consider 45 statements on online surveillance at the time of preparation of the intelligence legislation in Finland in 2018. Q-factor analysis arranged the stakeholders in three factors indicating distinctive frames that we named Balancing privacy and security, Protecting human rights and Expanding surveillance powers. With regard to enhancing further public discussion towards the interests of stakeholders, we also detected ambiguous issues, deal-breakers and areas of consensus that can be used for finding common ground in future considerations. Our study contributes particularly to research on online surveillance policy. We also demonstrate, along with some earlier findings, that Q-methodological research can provide powerful means to feed public policy discussion in the spirit of deliberative democracy.
... For example, China under his regime [21], is one of the countries that has the most information on its population using various technologies such as biometric registration and facial recognition systems, integrated with databases (includes DNA databases) managed and administered through artificial intelligence. Another example is the National Security Agency (NSA) and the CIA of the United States, which repeatedly violate human rights spying not only on their own community but on the entire world [22], as well as other agencies from other countries [23]. ...
Chapter
Full-text available
Society is increasingly dependent on technology and an example of this is the constant monitoring of large cities, which has become common and the future trend is for it to increase based on what happened with the COVID-19 pandemic. This monitoring brings with it a series of problems at the information security level at different levels or levels. Based on this fact, it addresses how the Internet of Things (IoT) can be subject to potential distributed denial of service (DDoS) attacks and the danger it poses to society. In this sense, other types of vulnerabilities are exposed, such as crypto hacking, advanced persistent threats (APT) and ransomware, which use artificial intelligence to improve their attack techniques. This poses a potential risk to society from cybersecurity regarding the use and manipulation of information , either by governments, the military and organized criminal groups, de facto violating human rights.
... In the last few decades, surveillance technologies have become cheaper and persuasive technologies have become readily available in the market. Surveillance-based persuasion has been normalized by being positioned in the market as a solution to humanity's mental shortcomings, both for individual users who voluntarily adopt these technologies as well as for corporations and governments seeking compliance from their users, employees, clients and citizens (Lemieux, 2018;Zuboff, 2019). ...
Conference Paper
Full-text available
Surveillance-based persuasive technologies have become ubiquitous in the form of fitness trackers, advertisement engines, recommendation systems and birthday reminder applications. They are also being integrated into socio-economic systems such as insurance, health and education. In reported literature, surveillance has raised significant ethical concerns about privacy and persuasive intentions of technology have come under scrutiny for undermining human autonomy. This paper discusses the ethical implications of persuasive technologies from the perspective of human autonomy and freedom. It begins by acknowledging the reported and possible future advantages of surveillance-based persuasive technologies, with an emphasis on the conditions which make them beneficial (the good). It then discusses the ethical trade-offs involved and the problems with how those trade-offs are designed and implemented in technology (the bad). Lastly, the paper discusses severe ethical concerns which involve coercion or manipulation of users into being persuaded for economic or even paternalistic needs of the technology (the ugly). This paper has argued for designers and businesses to employ an ethical approach to persuasive technology design and has presented possible suggestions for such an approach. These suggestions can help design technologies in a manner more conducive to autonomous decision making and freedom of choice for the users.
... http://hrwf.eu/romania-musttake-bold-action-to-tackle-the-legacy-of-corruption-before-assuming-the-presidency-of- (Gershman 2002;Grometstein 2007), "surveillance-led prosecution" (Sklansky 2018), "criminal intelligence" (Lemieux 2018), "deceptive evidence gathering" (Stuntz 1993), "noble cause corruption" (Caldero 2014) and lack of intelligence oversight (Zulean and Şercan 2018;Leigh and Wegge 2018;Glowacka et al 2018;Fuior 2018). ...
Preprint
Full-text available
Romania's criminal prosecution of corruption is a controversial topic. While advocates praise the National Anticorruption Directorate (DNA) for its increasing results, critics voice concerns over the abusive and excessive manner how the fight against corruption is conducted. Is Romania's anti-corruption battle an impressive success or rather a worrisome excess? The article aims to resolve this controversy by assessing anti-corruption activity conceptually and empirically. Firstly, an evaluation scheme of anti-corruption activity-the anti-corruption evaluation chain-is developed, which distinguishes between three stages: 1. Input (Capacity), 2. Process (Fairness, Reasonableness) and 3. Output (Results). Secondly, each dimension is measured empirically by relying on a new set of quantitative indicators and qualitative empirical evidence (e.g. analysis of judicial verdicts by the European Court of Human Rights, interviews with magistrates). The findings indicate that Romania's fight against corruption has resulted in the augmentation of capacity (e.g. number of human and financial resources), the acceleration of results (e.g. increasing number of indicted, prosecuted and convicted persons) and aberration from the fair trial (e.g. deficient evidence gathering, violations of fundamental rights) and from the principle of reasonableness (e.g. excessive reliance on interceptions in penal cases, excessive use of pre-trial detention etc.). Overall, Romania's criminal prosecution of corruption has derailed into an over-zealous struggle for a "noble cause" which itself has violated individual rights, the principles of fair trial and reasonableness, procedural integrity and the rule of law.
Book
Full-text available
This book explores the theoretical and practical implications of a global resurgence of populism on educational leadership. Drawing together a wide range of international authors, it examines how socio-cultural and political populist developments affect educational policies, organisations, and administration around the world. The collection addresses the forms and meanings of populism and examines their influence on education systems and institutions. It includes theoretical perspectives and rich examples from Australia, Brazil, Canada, Finland, France, Hungary, Nicaragua, the UK, and the US, exploring the complex influences and effects of populism on education policy, politics, and institutions in these countries. These include attacks on initiatives promoting equity and inclusion, the repression of academic freedom, the erosion of institutional autonomy from partisan political direction, and the suppression of evidence and expertise in policy and curriculum development. With its international and multidisciplinary outlook, this book will be highly relevant reading for researchers, scholars, and students in the fields of educational leadership and administration, higher education, and education policy, as well as those interested in the contemporary manifestations of populism on education.