期刊文献+

对反恐情报体系构建中几个问题的思考 被引量:63

Reflections on Several Issues about Counter-terrorism Intelligence System Construction
下载PDF
导出
摘要 为改进和完善我国目前的反恐情报体系,采用定性分析方法,从反恐组织体系、专业情报人员、技术手段等影响因素进行分析,提出了更新反恐情报的理念,建立专门的犯罪数据库,培训专业的反恐情报分析人才,加强技术在反恐情报中的应用等思路与方法,以期为我国反恐情报建设、为预防与打击东突恐怖主义的活动,维护我国的边疆安全与社会稳定提供决策依据。 Counter-terrorism intelligence is very important for counter-terrorism department. It is soul of counter-terrorism. In this pa-per, in order to improve China counter-terrorism intelligence system, qualitative analysis methods are advised to analyze China terrorism threat. Firstly, some effect factors were analyzed, such as counter-terrorism organization system, professional intelligence officers, tech-nology method. These problems have hindered counter-terrorism process of China anti-terrorism efforts. Secondly, to solve these prob-lems, we propose some novel suggestions to improve on our counter counter-terrorism intelligence. So we present some suggestions. Firstly, we must update the concept of counter-terrorism intelligence. Secondly, we can establish specialized crime database. Thirdly, we must train a certain number of counter-terrorism intelligence analysis professionals. Finally, we must strength technology application anal-ysis in counter-terrorism intelligence and so on. These suggestions may provide some background knowledge for the decision-making on the construction of China counter-terrorism intelligence. These methods would be useful in preventing and fighting against the East Turkistan terrorist activities, providing some decision-support in maintenance of our border security and social stability.
出处 《情报杂志》 CSSCI 北大核心 2014年第4期1-5,共5页 Journal of Intelligence
关键词 反恐情报 反恐情报体系 组织架构 反恐数据库 情报人员 counter-terrorism intelligence counter-terrorism intelligence system organization architecture counter-terrorism database intelligence officers
  • 相关文献

参考文献13

  • 1梅建明.反恐情报与危机管理[M].北京:群众出版社,2007.
  • 2梅建明.论反恐情报的特征与作用[J].江西公安专科学校学报,2009(1):52-55. 被引量:37
  • 3李本先,梅建明,李孟军.我国反恐情报及预警系统框架设计[J].中国人民公安大学学报(社会科学版),2012,28(4):117-125. 被引量:56
  • 4Whittaker A G, Smith F C, McKune E. The National Security Policy Process: The National Security Council and Interagency System [ R ]. Industrial Coll of The Armed Forces Washington DC, 2008.
  • 5LaFree G, Dugan L. Introducing the Global Terrorism Database [J].Terrorism and Political Violence, 2007, 19 ( 2 ) : 181-204.
  • 6LaFree G. The Global Terrorism Database: Accomplishments and Challenges[ J]. Perspectives on Terrorism, 2010, 4( 1 ) :1- 7.
  • 7Blair B. G. The Logic of Intelligence Failure[ J/OL]. [ 2006-09 -25 ]. http://www, cdi. org/blair/intel_failure, pdf.
  • 8解倩.边防反恐情报保障问题研究[J].情报杂志,2010,29(B12):104-106. 被引量:8
  • 9靖继鹏,马费成,张向先.情报科学理论[M].北京:科学出版社,2008:414-415.
  • 10Arquilla J, Ronfeldt D F. Networks and Netwars: the Future of Terror, Crime and Military [ M]. Santa Monica, California: RAND, 2001:20-24.

二级参考文献40

共引文献135

同被引文献519

引证文献63

二级引证文献332

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部