The GISES Model for Counteracting Organized Crime and International Terrorism

The international environment is complex and unpredictable. Because of this, new ways must be found to assess security and other risks adequately, and eliminate them when necessary. The elimination of risks and the reduction of uncertainty is not the priority of a few. Societies, and especially those of developed countries, must take an increased interest in developments that are likely to cause disruption and which may, unchecked, result in the quality and safety of life being eroded. An erosion of the quality of life will leave fewer choices to people, and possibly breed social discontent. Clearly therefore, more attention must be paid by governmental policymakers and their advisors to the many issues associated with international security, and new ways found to develop and integrate the various intelligence activities presently existing. Chris Donnelly, a former Special Adviser at the North Atlantic Treaty Organization (NATO), in his keynote address at the European Telecommunications Resilience and Recovery Conference in June 2003, spoke on the theme of ‘‘New threats to security and responses.’’ He stated that the world was going through a period of change, that it was necessary to recognize that change was occurring, and that the process of change had to be dealt with in a constructive manner. While this seems to be both

[1]  R. Orr Governing when chaos rules: Enhancing governance and participation , 2002 .

[2]  Kimberley L. Thachuk Terrorism's Financial Lifeline: Can It Be Severed? Strategic Forum. Number 191, May 2002 , 2002 .

[3]  Patrice M. Franko Toward a New Security Architecture in the Americas: The Strategic Implications of the FTAA , 2000 .

[4]  Peter R.J. Trim,et al.  An integrative approach to disaster management and planning , 2004 .

[5]  John Arquilla,et al.  Networks, netwar, and information-age terrorism , 1999 .

[6]  Susan L. Hodgett,et al.  Conceptualising community: policy implications for Atlantic Canada , 2003 .

[7]  Stéphane Lefebvre,et al.  The Difficulties and Dilemmas of International Intelligence Cooperation , 2003 .

[8]  William J. Lahneman Knowledge-Sharing in the Intelligence Community After 9/11 , 2004 .

[9]  Thomas M. Sanderson,et al.  Transnational Terror and Organized Crime: Blurring the Lines , 2004 .

[10]  Malcolm Higgs Building an effective team , 1996 .

[11]  Jason D. Ellis The best defense: Counterproliferation and U.S. national security , 2003 .

[12]  Dan Verton,et al.  Black Ice: The Invisible Threat of Cyber-Terrorism , 2003 .

[13]  R. Pech Developing a leadership knowledge architecture: a cognitive approach , 2003 .

[14]  Jean‐François Rischard,et al.  Global issues networks: Desperate times deserve innovative measures , 2002 .

[15]  B. Boxer Providing basic human security , 2003 .

[16]  Michael A. Turner A Distinctive U.S. Intelligence Identity , 2004 .

[17]  Vana Prewitt,et al.  Leadership development for learning organizations , 2003 .

[18]  William J. Lahneman Outsourcing the IC's Stovepipes? , 2003 .

[19]  Anthony H. Cordesman,et al.  Cyber-Threats, Information Warfare, and Critical Infrastructure Protection: Defending the U.S. Homeland , 2001 .

[20]  Ray Takeyh,et al.  Do terrorist networks need a home? , 2002 .

[21]  Maria L. Banda,et al.  Congruence, Conflict, and Continental Governance: Canada's and Mexico's Responses to Paradigm Shift in the United States , 2004 .

[22]  R. McMahon Changing the organization but maintaining the culture: The centrality of organizational mission to the reform process. An overview of the United States Environmental Protection Agency and the Environment Agency for England and Wales , 2004 .

[23]  Roy Rempel Canada's Parliamentary Oversight of Security and Intelligence , 2004 .

[24]  Ronald J. Deibert Deep Probe: The Evolution of Network Intelligence , 2003 .

[25]  John J. Maresca A new concept of business , 2000 .

[26]  Peter R.J. Trim,et al.  Disaster management and the role of the intelligence and security services , 2003 .

[27]  Kostas S. Metaxiotis,et al.  Knowledge and information management in e-learning environments; the user agent architecture , 2002, Inf. Manag. Comput. Secur..

[28]  Stéphane Lefebvre,et al.  A Look at Intelligence Analysis , 2004 .

[29]  Peter R. J. Trim Public and Private Sector Cooperation in Counteracting Cyberterrorism , 2003 .

[30]  John Sterling,et al.  Translating strategy into effective implementation: dispelling the myths and highlighting what works , 2003 .

[31]  M. Moore Creating public value : strategic management in government , 1995 .

[32]  Stephen Marrin Preventing Intelligence Failures by Learning from the Past , 2004 .

[33]  Kurt M. Campbell Nuclear proliferation beyond rogues , 2002 .

[34]  P. J. Kennedy,et al.  Scenario planning after 9/11: managing the impact of a catastrophic event , 2003 .

[35]  Nick Bontis,et al.  Transformational leadership : an examination of cross-national differences and similarities , 2003 .

[36]  S. Borins,et al.  Leadership and innovation in the public sector , 2002 .

[37]  S. Weintraub Disrupting the financing of terrorism , 2001 .

[38]  J. H. Hansen U.S. Intelligence Confronts the Future , 2004 .

[39]  F. P. Hitz,et al.  Helping the CIA and FBI Connect the Dots in the War on Terror , 2004 .

[40]  David H. Mason,et al.  Scenarios and strategies: making the scenario about the business , 2003 .

[41]  P. Strachan Managing transformational change: the learning organization and teamworking , 1996 .

[42]  Philip B. Heymann,et al.  Terrorism, Freedom, and Security: Winning Without War , 2003 .

[43]  The use and limits of U.S. intelligence , 2001 .

[44]  Jerry Yoram Wind,et al.  Driving Change: How the Best Companies Are Preparing for the 21st Century , 1998 .