per211RIEAS presents a valuable book for security and intelligence scholars titled: “Hybrid Warfare: Security and Asymmetric Conflict in International Relations” by Mikael Weissmann, Niklas Nilsson, Per Thunholm and Bjorn Palmertz (eds). Hybrid Warfare refers to a military strategy that blends conventional warfare, so-called 'irregular warfare' and cyber-attacks with other influencing methods, such as fake news, diplomacy and foreign political intervention. As Hybrid Warfare becomes increasingly commonplace, there is an imminent need for research bringing attention to how these challenges can be addressed in order to develop a comprehensive approach towards Hybrid Threats and Hybrid Warfare. Read more 

 

ccespionage1RIEAS presents a book titled: Chinese Communist Espionage, An Intelligence Primer by Peter Mattis and Matthew Brazil (eds). This is the first book of its kind to employ hundreds of Chinese sources to explain the history and current state of Chinese Communist intelligence operations. It profiles the leaders, top spies, and important operations in the history of China's espionage organs, and links to an extensive online glossary of Chinese language intelligence and security terms. Peter Mattis and Matthew Brazil present an unprecedented look into the murky world of Chinese espionage both past and present, enabling a better understanding of how pervasive and important its influence is, both in China and abroad. Read more

darya9RIEAS presents a book titled: “Terrorism and Advanced Technologies in Psychological Warfare: New Risks, New Opportunities to Counter the Terrorist Threat by Darya Bazarkina, Evgeny N. Pashentsev, and Greg Simons (eds). The book focus on the advanced technologies in the contemporary society enable many social problems to be resolved. However, due to the imperfect nature of social relations in human society, these technologies are very often used against human security and public interest. One of the most obvious and dangerous expressions of such usage is the activity of terrorist. Read more

intelcultures9RIEAS presents the Book titled: Intelligence Communities and Cultures in Asia and the Middle East: A Comprehensive Reference by Bob de Graaff, editor, Professor of intelligence and security studies at the University of Utrecht, the Netherlands.

Description of the Book
How are intelligence systems structured in countries across Asia and the Middle East—from Russia to India, from Turkey to China and Japan, from Kazakhstan to Saudi Arabia? In what ways did decolonization and the Cold War influence their organization? What is their mission, and to what extent do they come under public scrutiny?

The authors of this comprehensive reference delve into these questions, and more, to provide a unique, systematic survey of intelligence practices and cultures in 22 countries. Read more

erik9RIEAS presents the book titled: “Intelligence Operations: Understanding Data, Tools, People, and Processes” helps readers understand the various issues and considerations an intelligence professional must tackle when reviewing, planning, and managing intelligence operations, regardless of level or environment.

The book opens by introducing the reader to the many defining concepts associated with intelligence, as well as the main subject of intelligence: the threat. Additional chapters examine the community of intelligence, revealing where intelligence is actually practiced, as well as what defines and characterizes intelligence operations. Readers learn about the four critical components to every intelligence operation—data, tools, people, and processes—and then explore the various operational and analytic processes involved in greater detail. Throughout, the text encourages discovery and discussion, urging readers to first understand the material, then break it down, adapt it, and apply it in a way that supports their particular operations or requirements.

Unique in approach and designed to assist professionals at all levels, Intelligence Operations is an excellent resource for both academic courses in the subject and practical application by intelligence personnel. Read more

patrickbook8In 2019, RIEAS presented a book titled on “Intelligence, Biosecurity and Bioterrorism” written by Patrick F. Walsh, a former intelligence analyst who has worked in Australia’s National Security and Law Enforcement. Dr. John M Nomikos met Mr. Patrick F. Walsh in an international conference in Europe. The second chapter of the book focuses on “The Biosecurity Threat Environment” (pages: 21 -57). On page 35, Mr. Patrick F. Walsh emphasizes on “Emerging Biosecurity Threats (2018-2023). The book is a “must” for any analyst, scholar who focuses his/her research on Biosecurity Threat Environment. His book explores how potential bio-threats and risks may evolve post 9/11 given the rapid changes in biotechnology and synthetic biology. It also explores what role intelligence communities can play in understanding threats and risks. It argues that although bio-threats and risks are largely low probability and high impact in nature, intelligence in ‘Five Eyes’ countries remain insufficiently prepared to understand them. This book identifies key areas where intelligence reforms need to take place including a more strategic and systematic collaboration between national security/law enforcement intelligence and the scientific community. It is aimed at intelligence analysts, those in the scientific community working on health security threats, policy makers and researchers working on biosecurity and bioterrorism threats and risks. Read more

keshav1RIEAS international Advisor Keshav Mazumdar Antiterrorism Officer CPO CAS CMAS FNWC ASC CRC has singlehandedly created a full Army/paramilitary intelligence architecture configured for low intensity conflict from Battalion to Brigade level on American Army lines.The system is under evaluation in India for Indian Security Forces operating in Kashmir and North East. Mr Mazumdar hold international credentials and is globally respected as an intelligence expert. Read more

National security affairs analyst Ehud Eilam examines the strategy of containment in the Middle East as it is currently pursued. For the United States, containment is a way to avoid war with Iran and thwart its nuclear weapons program. For Israel it has been a way to prevent a confrontation with the Palestinians in both the Gaza Strip and the West Bank. In other cases, containment is meant to weaken a foe without starting a war, as Israel did by bombing shipments of weapons to Hezbollah. Containment was also part of the war in Syria—because the West lacked the ability to overthrow Bashar al-Assad, though it cost the civilian population there dearly. Egypt has been trying to contain both its enormous economic hardships and ISIS, primarily in the Sinai Peninsula. Ultimately Eilam provides important and timely insights into the Middle East’s perennially fluid and volatile political environment. His insights and analyses will be of interest not least in the corridors of power both here and abroad. Read more

The Red Sea is one of the world’s most important trade routes, a theater of power struggle among local, regional and global powers. Military and political developments continue to impact on the geostrategic landscape of the region in the context of its trade thoroughfare for Europe, China, Japan and India; freedom of navigation is a strategic interest for Egypt, and essential for Israel’s economic ties with Asia. Read more

afghanistanintel9Globalisation continues to challenge our world at unprecedented speed. Technological innovations, changing geographical developments, regional rivalries, and destruction of national critical infrastructures in several Muslim states due to the US so called war on terrorism-all transformed the structures and hierarchies of societies. The idea of development of a nation that sounds on tripods that are food, shelter and security failed. The Edward Snowden leaks challenged policy makers and the public understanding. Read more

spywarsThe central intelligence agencies have earned the wrath of the government for failing to sufficiently warn local agencies. Why do our secret intelligence agencies fail repeatedly? Is it because of the lack of adequate intelligence, the dearth of trained manpower in the intelligence sector, failure to apply latest sophisticated technology in surveillance, lack of proper intelligence sharing between the Centre and the states, lack of action on available intelligence, or the lack of sensible intelligence reforms? Read more

strategicintelJohn A. Gentry and Joseph S. Gordon update our understanding of strategic warning intelligence analysis for the twenty-first century. Strategic warning—the process of long-range analysis to alert senior leaders to trending threats and opportunities that require action—is a critical intelligence function. It also is frequently misunderstood and underappreciated. Gentry and Gordon draw on both their practitioner and academic backgrounds to present a history of the strategic warning function in the US intelligence community. In doing so, they outline the capabilities of analytic methods, explain why strategic warning analysis is so hard, and discuss the special challenges strategic warning encounters from senior decision-makers. They also compare how strategic warning functions in other countries, evaluate why the United States has in recent years emphasized current intelligence instead of strategic warning, and recommend warning-related structural and procedural improvements in the US intelligence community. The authors examine historical case studies, including postmortems of warning failures, to provide examples of the analytic points they make. Strategic Warning Intelligence will interest scholars and practitioners and will be an ideal teaching text for intermediate and advanced students. Read more

We use cookies

We use cookies on our website. Some of them are essential for the operation of the site, while others help us to improve this site and the user experience (tracking cookies). You can decide for yourself whether you want to allow cookies or not. Please note that if you reject them, you may not be able to use all the functionalities of the site.