preview

Secondary Literature

Decent Essays

In conducting the Counterinsurgency agent networks and noncombatant-targeted violence study, researchers attempted to identify how and why recruited foreign agents become subjects of violence. The researchers, also attempt to identifying in what manner and why this transpires is crucial for emerging intelligence methods to improve and implement effective Counterinsurgency standard operating procedures.
In conducting the study, researcher Britta Stime utilize the Secondary Method, which discoveries how human rights difficulties involving security and recruited foreign intelligence collection agents. Additionally, secondary literature does not, explore the comprehensive, total incentives of agent networks that may unintentionally encourage …show more content…

The study reflects upon the possible and probable threats and the ways to mitigate those threats.
The study concluded with confirmation of abuse, trickery, and coercion methods in the recruitment process. This study did not focus on the morality of espionage.10 However, the study did, in fact noted the moral difference between the intimidating recruitment of a civilian as opposed to an insurgent.11The study concluded with confirmation of abuse, trickery, and coercion methods in the recruitment process. This study did not focus on the morality of espionage.12 However, the study did, in fact noted the moral difference between the intimidating recruitment of a civilian as opposed to an insurgent.13
Further research regarding the sociological and psychological effects of Counterinsurgency Human Intelligence operations, and how a compulsory may change intelligence guidelines and procedures to modify motivation structures and reduce civilian violence associated with foreign Human Intelligence agent networks. What authority approves recruiters to operate outside the scope of intelligence gathering?

Get Access