
Epistemology of Intelligence Analysis
In intelligence, epistemology is the study of the threat awareness and the way the threat is understood in the field of intelligence analysis. Most definitions of intelligence do not consider the fact that the epistemic normative status of the intelligence … Read More

Ontology of Intelligence
In intelligence, the ontological problem is related to the nature and characteristics of entities that threaten and are threatened. Developing a threat ontology requires a taxonomy. An ontology for threat analysis and action must be able to shape ontological distinctions … Read More

Epistemic Intelligence Communities. Counterintelligence
Epistemic communities are informal networks of knowledge-based experts who influence decision-makers in defining issues they face, identifying different solutions, and evaluating results. Epistemic communities have the greatest influence in conditions of political uncertainty and visibility, usually following a crisis or … Read More

Intelligence Analysis
The analysts are in the field of “knowledge”. Intelligence refers to knowledge and the types of problems addressed are knowledge problems. So, we need a concept of work based on knowledge. We need a basic understanding of what we know … Read More

Knowledge Engineering and Intelligence Gathering
A process of intelligence gathering begins when a user enters a query into the system. Several objects can match the result of a query with different degrees of relevance. Most systems estimate a numeric value about how well each object … Read More

Intelligence cycle
The intelligence cycle is a set of processes used to provide useful information for decision-making. The cycle consists of several processes. The related counter-intelligence area is tasked with preventing information efforts from others. A basic model of the process of … Read More

The Intelligence Community
Intelligence services are currently focusing on the fight against terrorism, leaving relatively little resources to monitor other security threats. For this reason, they often ignore external information activities that do not pose immediate threats to their government’s interests. Extremely few … Read More