Government Intelligence Gathering

Government Intelligence Gathering

Government Intelligence Gathering

Overview of Government Intelligence Gathering in relation to cyber crime: [1]Americans are traditionally suspicious of government, particularly when it comes to their privacy. This distrust is not without merit; along with the many beneficial, legitimate, and justified actions the federal government has taken through the years, there have also been periodic violations of privacy and heavy-handed law enforcement tactics. This has been especially true during periods of war or long-standing fears about threats to national security, as during the Cold War (1950–1990), rising concerns about transnational organized crime (1960–present), and the ''war on terrorism'' (2001–present). Consequently, targets of government surveillance, infiltration, and disruption have included organized crime organizations dating from the end ofWorld War II when hostile governments like the former Union of Soviet Socialist Republics (USSR) posed threats to the United States and allied nations.

Resources

Notes and References

1. By Samuel C. McQuade, III and Eric Walter

See Also

  • Types of Cybercrime
  • Cybercriminal

Further Reading

McCue, C. (2007). Data mining and predictive analysis: Intelligence gathering and crime analysis. Boston, MA: Butterworth-Heinemann; McQuade, S.C. (2006). Understanding and managing cybercrime, 255–259. Boston: Allyn & Bacon; Popp, R.L., and J. Yen, eds. (2006). Emergent information technologies and enabling GOVERNMENT INTELLIGENCE GATHERING 85 policies for counter-terrorism. IEEE Press Series on Computational Intelligence. New York: Wiley–IEEE Press; Shulsky, A.N., and G.J. Schmitt. (2002). Silent warfare: Understanding the world of intelligence, 3rd ed. Dulles, VA: Potomac Books Inc.; U.S. Congress. (1976, April 26). Final report of the committee to study governmental operations with respect to intelligence activities. Washington, DC: Government Printing Office.


Posted

in

,

by

Tags:

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *