Search: nato knowledge development handbook

What an interesting search, thank you.  Here are some links that came up in a broader search that we import to Phi Beta Iota with a tip of the hat to the anonymous searcher. Cross-Domain Collaboration Takes Center Stage at NATO Network-Enabled Capability (NNEC) Conference (Intelligence and Knowledge Development, March 12, 2010) IMPLEMENTATION OF NATO …

Journal: Pentagon as VERY Slow Learner….

Time.com    March 18, 2010 To Battle Computer Hackers, The Pentagon Trains Its Own By Mark Thompson, Washington “More than 100 foreign intelligence organizations are trying to hack into U.S. systems,” Deputy Defense Secretary William Lynn warned last month. “Some governments already have the capacity to disrupt elements of the U.S. information infrastructure.” So the Pentagon …

Worth a Look: Recent Additions

Phi Beta Iota dates materials such as handbooks to their date of original publication.  When warranted, we will highlight new additions that are not visible to visitors because of our practice. See for instance: Handbook: Criminal Justice Responses to Terrorism (UNODC, April 2009) Handbook: Open Source Intelligence Professional Handbook, Joint Military Intelligence Training Center, Defense …

Worth A Look: Posted from the Past Including Jack Davis on Leadership in Intelligence Analysis

1993 War and Peace in the Age of Information–Superintendent’s Guest Lecture, Naval Postgraduate School (NPS) 1994 ACCESS: The Theory and Practice of Competitor Intelligence (Journal of the Association for Global Strategic Information, July 1994) 1994 Private Enterprise Intelligence: It’s Potential Contribution to National Security (Canada, 29 October 1994) 1995 Open Sources and the Virtual Intelligence …

MILNET Headlines, 1 March 2010

Cyber-Control:  How Britain is using classical music as a form of social control Cyber-Control:  Major ACTA Leak: Internet and Civil Enforcement Chapters Cyber-Hype:  Cyberwar Hype Intended to Destroy the Open Internet Cyber-Security:  New Era for Internet Security Cyber-World:  Striving to Map the Shape-Shifting Net Homeland Security:  Dirty Bomb Recovery Plans Lacking Media:  Understanding the participatory …