National Defense Intelligence College Paper: Managing the Private Spies: The Use of Commercial Augmentation for Intelligence Operations - Pinkerton to Abu Ghraib

Nonfiction, Social & Cultural Studies, Political Science
Cover of the book National Defense Intelligence College Paper: Managing the Private Spies: The Use of Commercial Augmentation for Intelligence Operations - Pinkerton to Abu Ghraib by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310192852
Publisher: Progressive Management Publication: January 27, 2014
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310192852
Publisher: Progressive Management
Publication: January 27, 2014
Imprint: Smashwords Edition
Language: English

This unique and informative paper was produced by the National Intelligence University / National Defense Intelligence College. Topics and subjects include: private military companies, Executive Outcomes (EO), Sandline International, military professional resources, Pinkerton, privatized personnel security investigations, Indian Wars, Indian Scouts, NextView, Project Clearview, commercial remote sensing, Abu Ghraib, War on Terror.

The Abu Ghraib prison scandal cast a spotlight on the use of contractors to perform functions normally associated with military personnel, and all the contracting, control, discipline, and training issues associated therewith. The sometimes-overheated rhetoric of the press created an impression that the use of contractor personnel to perform functions traditionally considered to be the realm of uniformed personnel was something new and extraordinary. It is neither, though the number of intelligence-related functions performed by contractors during combat operations in Iraq and Afghanistan may, indeed, be unprecedented.

The extensive use of contractor personnel to augment military intelligence operations is now an established fact of life and, occasional contracting "scandals" notwithstanding, any effective and efficient design for intelligence support to operating forces must provide for their use. The civilian sector can respond to rapidly changing requirements of the Global War on Terror with flexibility and speed that the government sector does not possess. And, in a number of cases, the civilian sector possesses technology, equipment, and technological know-how that the government sector could not acquire in any reasonable amount of time. Add to this the problem of end-strength limitations and recruiting and retention problems, and it is apparent that contractors are a permanent part of the intelligence landscape. But this dependence on contractors comes with its own set of problems, most of which stem from inadequate planning and from lack of training of deployed uniformed personnel in the intricacies of contracting for and administering contractor personnel.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This unique and informative paper was produced by the National Intelligence University / National Defense Intelligence College. Topics and subjects include: private military companies, Executive Outcomes (EO), Sandline International, military professional resources, Pinkerton, privatized personnel security investigations, Indian Wars, Indian Scouts, NextView, Project Clearview, commercial remote sensing, Abu Ghraib, War on Terror.

The Abu Ghraib prison scandal cast a spotlight on the use of contractors to perform functions normally associated with military personnel, and all the contracting, control, discipline, and training issues associated therewith. The sometimes-overheated rhetoric of the press created an impression that the use of contractor personnel to perform functions traditionally considered to be the realm of uniformed personnel was something new and extraordinary. It is neither, though the number of intelligence-related functions performed by contractors during combat operations in Iraq and Afghanistan may, indeed, be unprecedented.

The extensive use of contractor personnel to augment military intelligence operations is now an established fact of life and, occasional contracting "scandals" notwithstanding, any effective and efficient design for intelligence support to operating forces must provide for their use. The civilian sector can respond to rapidly changing requirements of the Global War on Terror with flexibility and speed that the government sector does not possess. And, in a number of cases, the civilian sector possesses technology, equipment, and technological know-how that the government sector could not acquire in any reasonable amount of time. Add to this the problem of end-strength limitations and recruiting and retention problems, and it is apparent that contractors are a permanent part of the intelligence landscape. But this dependence on contractors comes with its own set of problems, most of which stem from inadequate planning and from lack of training of deployed uniformed personnel in the intricacies of contracting for and administering contractor personnel.

More books from Progressive Management

Cover of the book Questions and Answers About Swine Flu: 2009 H1N1 Pandemic Influenza - Medical Data with Information on Symptoms, Treatment, Vaccine Safety and Drugs by Progressive Management
Cover of the book Marines in World War II Commemorative Series: Cape Gloucester: The Green Inferno, Major General WIlliam Rupertus, New Britain, Borgen Bay, Volupai-Talasea, LCMs, DUKWs by Progressive Management
Cover of the book 21st Century FEMA Study Course: Coordinating Environmental and Historic Preservation Compliance (IS-253) - Historic Property Laws, Preservation Issues, STATEX and CATEX by Progressive Management
Cover of the book Complete Guide to Distracted Driving: Cell Phones, Texting, Electronic Device Usage, Accidents, New Guidelines for Car Devices, Commercial Vehicle Operators, Laws and Programs by Progressive Management
Cover of the book Armed with Information: Evolving Public Affairs to Deliver Operational Effects - Military Implications of Globalization, Changing Nature of Military Conflict, Evolving War Character, Battle of Ideas by Progressive Management
Cover of the book National Defense Intelligence College Paper: Intelligence Professionalism in the Americas - Mexico, Argentina, Brazil, Peru, Chile, Uruguay, Colombia, Bolivia, FARC, Russian Mafia, Submersibles by Progressive Management
Cover of the book Case Studies in the Use of Land-Based Aerial Forces in Maritime Operations, 1939-1990: Battle of the Atlantic, Arctic Convoys, Dunkirk, Pacific, Repulse Sinking, Falklands War, Cold War, Tanker War by Progressive Management
Cover of the book Computers Take Flight: A History of NASA's Pioneering Digital Fly-By-Wire Project - Apollo and Shuttle Computers, Airplanes, Software and Reliability (NASA SP-2000-4224) by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Protection - ADRP 3-37 (FM 3-37), Support of Unified Land Operations, Assessment (Professional Format Series) by Progressive Management
Cover of the book 21st Century FEMA Study Course: Emergency Support Function #11 Agriculture and Natural Resources (IS-811) - USDA, APHIS, Nutrition Assistance, Household Pets, Historic Preservation by Progressive Management
Cover of the book Conduct of the Persian Gulf War: Final Report To Congress - Invasion of Kuwait, Saddam Hussein, Operation Desert Shield and Desert Storm, Maritime Interception, Air and Ground Campaign by Progressive Management
Cover of the book Art of War Paper: Closing the Security Gap - Building Irregular Security Forces, Iraq, Dhofar Region of Oman, North-West Frontier, Host Nation Decisions by Progressive Management
Cover of the book The Economic Impact of Terrorism in the Near East: Understanding the Threats Posed by Militant Groups - Role of Counterinsurgency, Counterterrorism, Guerilla Warfare, Defense Strategy Implications by Progressive Management
Cover of the book A Comprehensive Approach to Improving U.S. Security Force Assistance (SFA) Efforts - DoD Programs to Train, Advise, and Assist Foreign Partners' Security Establishments by Progressive Management
Cover of the book Chinese Cyber Warfare: China's Cyber Incursions, Strategic Method, Information Warfare Threat - Mandiant Report, Unit 61398, Henry Kissinger, Quantum Computing by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy