To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
In this unprecedented history of intelligence cooperation during the Cold War, Aviva Guttmann uncovers the key role of European intelligence agencies in facilitating Mossad's Operation Wrath of God. She reveals how, in the aftermath of the 1972 Munich Olympics Massacre, Palestinians suspected of involvement in terrorism were hunted and killed by Mossad with active European cooperation. Through unique access to unredacted documents in the Club de Berne archive, she shows how a secret coalition of intelligence agencies supplied Mossad with information about Palestinians on a colossal scale and tacitly supported Israeli covert actions on European soil. These agencies helped to anticipate and thwart a number of Palestinian terrorist plots, including some revealed here for the first time. This extraordinary book reconstructs the hidden world of international intelligence, showing how this parallel order enabled state relations to be pursued independently of official foreign policy constraints or public scrutiny.
The secrecy of intelligence institutions might give the impression that intelligence is an ethics-free zone, but this is not the case. In The Ethics of National Security Intelligence Institutions, Adam Henschke, Seumas Miller, Andrew Alexandra, Patrick Walsh, and Roger Bradbury examine the ways that liberal democracies have come to rely on intelligence institutions for effective decision-making and look at the best ways to limit these institutions’ power and constrain the abuses they have the potential to cause. In contrast, the value of Amy Zegart’s and Miah Hammond-Errey’s research, in their respective books, Spies, Lies, and Algorithms: The History and Future of American Intelligence and Big Data, Emerging Technologies and Intelligence: National Security Disrupted, is the access each of them provides to the thoughts and opinions of the intelligence practitioners working in these secretive institutions. What emerges is a consensus that the fundamental moral purpose of intelligence institutions should be truth telling. In other words, intelligence should be a rigorous epistemic activity that seeks to improve decision-makers’ understanding of a rapidly changing world. Moreover, a key ethical challenge for intelligence practitioners in liberal democracies is how to do their jobs effectively in a way that does not undermine public trust. Measures recommended include better oversight and accountability mechanisms, adoption of a ‘risk of transparency’ principle, and greater understanding of and respect for privacy rights.
This compendium of essential works clarifies that the Australian Army’s force structure is organic and constantly changing. It provides a starting point for quickly acquiring new capabilities at short notice when required to meet emerging threats and challenges. The Army’s response to realising government direction and investment in new capabilities is being examined via a series of options under the Army Objective Force. It involves a careful and deliberate program of analysis that will provide a framework to develop the Army of the future. Readers can be assured that the Australian Army’s future is informed through understanding of its past – understanding that is provided to the Army’s planners today through contributions such as this.
Army has always been faced with the questions of what type of war it should aim to prepare for, and in what context it should prepare. Mobilising the Australian Army explores the rich history of the Australian Army, the challenges of preparing armies for war in uncertain times, and the many possibilities for their continuing strength and future success. Comprising research presented at the 2021 Chief of Army History Conference, this collection examines how contingency and compromise are crucial elements for both the historical and the modern-day Army. Key themes include the mobilisation of resources for war in the first half of the twentieth century, the employment of women in the war effort at a time of rapid force expansion, alliance and concurrency pressures in the Cold War and post–Cold War years, utilisation in crisis and war of the reserve forces, and deployment challenges in the 1990s and beyond. Written by leading Australian and international military historians and practitioners, Mobilising the Australian Army will appeal to both casual history enthusiasts and future Army.
We propose a typology that accounts for current priorities of legal systems and the main mechanisms through which they dispose of cases.
The proposed typology is the result of a five-year empirical study of legal systems, analyzing data from court dockets, court observations, and interviews with legal actors. The study uncovers: (1) legal systems that have reshaped themselves to place an emphasis on pre-filing, creating disincentives to filing cases and trial while promoting settlement; (2) legal systems that place an emphasis on pretrial, allowing filing of cases but introducing incentives to help cases settle before they reach trial; and (3) legal systems that continue to place an emphasis on trial while allowing other forms of dispute resolution.
We show that each family differs in the aim of civil justice, the function of law, the nature of the judicial role, access to justice, and the institutional function of courts. Moreover, a pre-filing emphasis seems conducive to AI-based dispute resolution that may be developed in the future. The typology allows for a dynamic observation of legal systems as they transition from one family to another, and has implications for legal reforms and harmonization.
This chapter introduces readers to the history and concept of social and emotional intelligences. Readers explore the spectrum of social and emotional intelligences that are associated with holistic processes within the organism to understand emotional states, develop social awareness, regulate emotional states, develop empathy, make growth-promoting decisions, and form diverse relationships. The author situates this discussion within a multicultural framework by expanding definitions to be inclusive of diverse cultural perspectives.
This chapter reviews the principle domains assessed by clinical neuropsychologists when conducting a cognitive assessment and the utility of assessment in diagnosis and clinical management. It provides an overview of methods for estimating prior functioning, the non-specific nature of patients’ subjective neurological complaints, validity and base rate issues, and some of the difficulties and complicating issues that arise when interpreting neuropsychological data. Those interested in succinct summaries of clinical presentations and “bedside” measures may find Hodges [1] and Larner [2] useful further reading, and those interested in detailed reviews of cognitive tests can do no better than to consult Lezak, Howieson, Bigler and Tranel’s [3] authoritative text.
Onodera Makoto (1897–1987) served as the Japanese military attaché in Stockholm 1941–45. His accomplishments during WWII made him instantly famous when they became known to the public in 1985 with a documentary about him on NHK based on a memoir by his wife, Yuriko. One of his famous deeds took place in mid-February 1945 when he allegedly sent a telegram to the Japanese General Staff shortly after the Yalta Conference in February 1945 warning that Stalin during the conference had promised that the USSR would attack Japan three months after the German surrender. After the German capitulation on 7 May, the Soviet Union joined the war against Japan on 9 August, precisely as Onodera had predicted. The problem is that no one has been able to trace this telegram. However, wartime documents, most of them traced in Swedish archives, show that the famous story of ‘the lost Yalta telegram’ is invented.
This paper presents the main topics, arguments, and positions in the philosophy of AI at present (excluding ethics). Apart from the basic concepts of intelligence and computation, the main topics of artificial cognition are perception, action, meaning, rational choice, free will, consciousness, and normativity. Through a better understanding of these topics, the philosophy of AI contributes to our understanding of the nature, prospects, and value of AI. Furthermore, these topics can be understood more deeply through the discussion of AI; so we suggest that “AI philosophy” provides a new method for philosophy.
This chapter reviews findings about the structural changes to the brain, considering effects on both gray matter and white matter and relationships between these measures and behavior. It also reviews research on changes with age to the connectivity of the brain and the default mode network. Findings related to effects of aging on perception and sensation as well as neurotransmitters are presented. The chapter ends with extensive coverage of individual difference factors, including genetic influences, intelligence, cognitive reserve, bilingualism, personality, and stress.
Decision-makers rely on intelligence to make targeting decisions that comply with international humanitarian law (IHL), yet the relationship between intelligence and the law is not frequently discussed. This article explores crucial elements of intelligence and intelligence analysis that decision-makers should understand to increase their compliance with IHL, focusing on three crucial decision points: (1) the determination of whether a potential target is a military objective, (2) proportionality in attack analysis, and (3) the taking of effective precautions.
This article challenges the perception of Open-Source Intelligence (OSINT) as a revolutionary shift driven by the explosion of publicly accessible data. Instead, we argue that the rise of OSINT reflects an evolution of traditional intelligence practices: the collection, processing, analysis and dissemination of vast amounts of information. While the exponential growth of open–source data is reshaping the intelligence landscape, it is neither revolutionizing nor democratizing intelligence. Rather, it is prompting both state and non–state actors to explore how best to integrate OSINT practices and enhance digital literacy within their communities. Core OSINT challenges – information overload, reliability, and legal and ethical concerns – remain consistent with broader intelligence issues. Addressing these challenges provides a foundation for consolidating OSINT as a community of practice, and linking it to debates on the disputed role of security expertise in the public debate.
Since its founding in 1987, the political and ideological dimensions of the terror organization Hamas have been well discussed by scholars. In contrast, this innovative study takes a new approach by exploring the entire scope of Hamas’s intelligence activity against its state adversary, Israel. Using primary sources in Arabic, Hebrew, and English, the author analyzes the development of Hamas’s various methods for gathering information, its use of this information for operational needs and strategic analysis, and its counterintelligence activity against the Israeli intelligence apparatus. The Hamas Intelligence War against Israel explores how Hamas’s activity has gradually become more sophisticated as its institutions have become more established and the nature of the conflict has changed. As the first full-length study to analyze the intelligence efforts of a violent non-state actor, this book sheds new light on the activities and operations of Hamas, and opens new avenues for intelligence research in the wider field.
Since its founding in 1987, the political and ideological dimensions of the terror organization Hamas have been well discussed by scholars. In contrast, this innovative study takes a new approach by exploring the entire scope of Hamas’s intelligence activity against its state adversary, Israel. Using primary sources in Arabic, Hebrew, and English, the author analyzes the development of Hamas’s various methods for gathering information, its use of this information for operational needs and strategic analysis, and its counterintelligence activity against the Israeli intelligence apparatus. The Hamas Intelligence War against Israel explores how Hamas’s activity has gradually become more sophisticated as its institutions have become more established and the nature of the conflict has changed. As the first full-length study to analyze the intelligence efforts of a violent non-state actor, this book sheds new light on the activities and operations of Hamas, and opens new avenues for intelligence research in the wider field.
The conclusion chapter sums up the contribution of Hamas’s intelligence to the organization’s activities associated with its struggle against Israel. It details the strengths and weaknesses of the organization’s efforts to gather intelligence on Israel, counter Israeli intelligence activity, and assess Israel’s intentions and capabilities. This chapter also examines lessons from the case study of Hamas that may be applied to a general understanding of intelligence warfare by VNSAs.
Since its founding in 1987, the political and ideological dimensions of the terror organisation Hamas have been well discussed by scholars. In contrast, this innovative study takes a new approach by exploring the entire scope of Hamas's intelligence activity against its state adversary, Israel. Using primary sources in Arabic, Hebrew and English, Netanel Flamer analyzes the development of Hamas's various methods for gathering information, its use of this information for operational needs and strategic analysis, and its counterintelligence activity against the Israeli intelligence apparatus. The Hamas Intelligence War against Israel explores how Hamas's activity has gradually become more sophisticated as its institutions have become more established and the nature of the conflict has changed. As the first full-length study to analyze the intelligence efforts of a violent non-state actor, this book sheds new light on the activities and operations of Hamas, and opens new avenues for intelligence research in the wider field.
Every philosophy is a celebration of the fact that being can be thought, that the world around us yields to concepts that join together into arguments which can lead us to new thoughts and new ways of thinking. Heidegger's great talent was to never lose his philosophical wonder at philosophy, to never stop thinking about thinking. Heidegger's early work favors a somewhat pragmatic view of thinking as organized by and around our projects, emphasizing tacit skills over articulate conscious thinking. It also explores stepping back from all projects in dread and wonder. His later thinking is reciprocal rather than autonomous, something we do with and for being instead of something we do to or on beings, which can help overcome contemporary nihilism. After the death of God, we may no longer be able to pray to a divinity, but we can still be the thinkers of being.
Positive, negative and disorganised psychotic symptom dimensions are associated with clinical and developmental variables, but differing definitions complicate interpretation. Additionally, some variables have had little investigation.
Aims
To investigate associations of psychotic symptom dimensions with clinical and developmental variables, and familial aggregation of symptom dimensions, in multiple samples employing the same definitions.
Method
We investigated associations between lifetime symptom dimensions and clinical and developmental variables in two twin and two general psychosis samples. Dimension symptom scores and most other variables were from the Operational Criteria Checklist. We used logistic regression in generalised linear mixed models for combined sample analysis (n = 875 probands). We also investigated correlations of dimensions within monozygotic (MZ) twin pairs concordant for psychosis (n = 96 pairs).
Results
Higher symptom scores on all three dimensions were associated with poor premorbid social adjustment, never marrying/cohabiting and earlier age at onset, and with a chronic course, most strongly for the negative dimension. The positive dimension was also associated with Black and minority ethnicity and lifetime cannabis use; the negative dimension with male gender; and the disorganised dimension with gradual onset, lower premorbid IQ and substantial within twin-pair correlation. In secondary analysis, disorganised symptoms in MZ twin probands were associated with lower premorbid IQ in their co-twins.
Conclusions
These results confirm associations that dimensions share in common and strengthen the evidence for distinct associations of co-occurring positive symptoms with ethnic minority status, negative symptoms with male gender and disorganised symptoms with substantial familial influences, which may overlap with influences on premorbid IQ.
In this first comprehensive history of India's secret Cold War, Paul McGarr tells the story of Indian politicians, human rights activists, and journalists as they fought against or collaborated with members of the British and US intelligence services. The interventions of these agents have had a significant and enduring impact on the political and social fabric of South Asia. The spectre of a 'foreign hand', or external intelligence activity, real and imagined, has occupied a prominent place in India's political discourse, journalism, and cultural production. Spying in South Asia probes the nexus between intelligence and statecraft in South Asia and the relationships between agencies and governments forged to promote democracy. McGarr asks why, in contrast to Western assumptions about surveillance, South Asians associate intelligence with covert action, grand conspiracy, and justifications for repression? In doing so, he uncovers a fifty-year battle for hearts and minds in the Indian subcontinent.
Spying in South Asia examines the misguided and self-defeating Cold War interventions undertaken by British and American intelligence and security agencies in post-colonial India. British and American policymakers mounted intelligence operations in the Indian subcontinent on the basis of questionable, and often conflicting assumptions: that covert action could steer Indian opinion in a pro-Western direction; that British and American intelligence agencies could be insulated from Indian antipathy for colonialism and neo-colonialism; that Western intelligence support would corrode India’s relations with the Soviet Union; that controversies surrounding American intelligence practice would not cut through with the Indian public; that the subcontinent’s politicians would not employ the CIA as a lightning rod for India’s domestic travails; and that secret intelligence activity could help to arrest a decline in British and American influence in India. Today, India’s emergence as an economic titan, renewed Sino-Indian tensions, and backwash from the ‘War on Terror’, keep the subcontinent in the global headlines.