4 Matching Results

Results open in a new window/tab.

A Descriptive Study of the Intelligence Community in the United States of America (open access)

A Descriptive Study of the Intelligence Community in the United States of America

This treatise represents a descriptive study of the intelligence community in the United States. It explores the ramifications of terrorism on the intelligence function, post September 11, 2001. In-depth discussions concerning the structure of the U.S. intelligence community are presented as well as a focus on the defined steps of the intelligence process: planning and directions, collection, analysis, production, and dissemination. The final aspect of this study poses questions and issues relating to the restructuring of the U.S. intelligence community in light of the Homeland Security Act of 2002.
Date: May 2003
Creator: Ucak, Hursit
System: The UNT Digital Library
New Surveillance Technologies and the Invasion of Privacy Rights (open access)

New Surveillance Technologies and the Invasion of Privacy Rights

Definition of privacy has changed by the changes and improvements in information and surveillance technologies. These changes and improvement need new legal decisions for new kinds of privacy invasions. This study explores the scope of privacy right, particularly when a technological surveillance has occurred by law enforcement agencies. It focuses in particular on increasing law enforcements' surveillance technologies and devices that have the potential to impact citizens' information privacy. These increasing changes in surveillance technologies have important implications both for law enforcements and citizens. This study also discusses increasing law enforcement surveillance for the public's security, changes of the laws that allow law enforcements to use new surveillance powers as a war on terrorism, and the citizens concerns of information privacy. A particular attention is given to the recent public opinion surveys which show citizens' increasing privacy concerns. Finally, a set of recommendations to figure out security-privacy debate and reduce the privacy concerns of the citizens is offered.
Date: August 2003
Creator: Simsek, Yilmaz
System: The UNT Digital Library

Combating Corruption: A Comparison of National Anti-Corruption Efforts

Access: Use of this item is restricted to the UNT Community
The primary goal of this thesis is to provide a comparative analysis of the institutional and organizational mechanisms designed to monitor and control political corruption at the national level. The paper will provide comparisons of these arraignments and control systems across three nations. The thesis will identify differences across countries in terms of organizational and institutional political corruption control mechanisms, and use the CPI index to suggest and identify those control mechanisms that appear to be present in nations with low CPI measurements. Finally, the thesis will conclude with the discussion concerning the future prospects for controlling political corruption in Turkey based on the comparative analysis described above.
Date: August 2003
Creator: Turer, Ahmet
System: The UNT Digital Library
The Appropriate Use of Human Intelligence in Combating Terrorism (open access)

The Appropriate Use of Human Intelligence in Combating Terrorism

When we looked at different issues in terrorism such as definitions, descriptions and motivations, groups and supporters, tactics, strategies, and victims of terrorists and terrorist activities, we see that terrorism is an issue that can occur at any time, and in any place, and it seems that the terrorism threat will still exist in the future. It is almost impossible to stop all terrorist activities all over the world, but it is possible to formulate an anti-terrorism policy that can keep terrorist activities at a minimum level and prevent planned terror activities by a well developed intelligence network. It seems that to establish a good intelligence collection system an approach in which HUMINT and TECHINT are interdependent with each other is necessary. By using a combination of human and technical intelligence collection methods, intelligence agencies can become more effective and efficient against terrorism.
Date: August 2003
Creator: Koseli, Mutlu
System: The UNT Digital Library