¶ … Human interaction provides a roadmap of how we think and process information. The human brain is bipolar with one side, being more feminine, incorporates the emotional and subjective types of data, where the left brain models the scenario and attempts to gather, dissect and disseminate that information for a better purpose. This modeling process can be very helpful in the military intelligence community to help organizations reach better conclusions and hence plan and operate in a more direct and impactful way.
The business world in its attempts to seek and gain a competitive advantage in many different ways and forms provides useful modeling techniques that can be used in any industry or scenario. Relating these business models to the intelligence community requires a strong understanding of the words and phrases used within these models. Once a common language has been established, and all key terms are understood, the models can be used in lieu of other more rigid and fallible military styles. Businessballs (nd) agreed with this idea: "Business Process Modeling is not only carried out in conventional businesses; the methodology is increasingly applicable to all sorts of other organizations, for example government agencies and departments, charities, mutual's and cooperatives, etc..
The SWOT analysis, a common business model is very relevant to intelligence gathering. In the business world, strengths weaknesses, opportunities and threats are examined to help determine an organization's position within an industry. This is no different than paragraph one of most operation orders describing the situation on the battlefield....
Intelligence Community Many divergent global forecasts relating to the Intelligence Community have been fronted where relative harmony dominates market economies and democracies but the use of military force is diminishing among internationally relating nations. This is driven by rising political, military and economic competition along the borders of major culture and civilization, increasing the breakdown of order as states implodes, rogue states arming themselves with unconventional weaponry and competition among multiple
After September 11th, President Bush authorized the use of water boarding, as a way to gain knowledge of terrorist groups and their activities. The problem is that many of the civil rights-based groups believe that this is in violation of American law. When the people, who are interrogated (terrorists), are not American citizens and they want to do as much harm to the country as possible. Given the fact
This would create a reactionary agency which, rather than gathering intelligence to the extension of its security, would approach what would come to be known as the 'containment theory,' using whatever resources and tactics were at its disposal to deflect against the spread of communism. At its time, the 1947 Act would be seen as projecting considerable vision. As one conservative think-tank reports on this idea, "until fairly recently, CIA
Intelligence Community (IC) is the biggest and most multifaceted institution of its kind, consisting of sixteen semi-independent agencies with dissimilar, sometimes corresponding, spheres of accountability. Generally, it has demonstrated problematic to institute integrated direction over the IC. Ensuing major terrorist attacks like that of September 11, 2001, comprehensive intelligence restructurings were sanctioned, including legislature to authorize chief leadership by founding a Director of National Intelligence. Notwithstanding these modifications, opposition to
Intel Organization Pfeffer & Salanick (1978) proposed many important ideas in their examination of management theory's incorporation of external elements and controls. While the information contained in this reading are useful in some manner, their perspective remains incomplete and one sided in many ways. While it is true that the external controls and exchanges between organizations have a direct and almost obvious impact on the cumulative results, the author's ignore the
Homeland Security Intelligence With the advent of new technologies, human lifestyle is improving and people have found better ways to achieve their goals. The impact of technology is found at national level and many security threats are emerged. Keeping in view the possibility of increased security challenges in the time to come, there is serious need to revise the security policies and bring them all together under information communication strategy so
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now