Free Essay

The Counter Intelligence Community: Adequate Efficiency Within Our Ranks

In:

Submitted By bustamanteri
Words 1735
Pages 7
The Counter Intelligence Community
Adequate Efficiency within Our Ranks
American Military University
Rodolfo Ivan Bustamante
Professor Holden, Richard
February 26, 2013

Counterintelligence is adequate only to those not directly affected by its lack of efficiency. CI adequacy is difficult to measure and its very status seems to be politically protected in secrecy. The American people are allowed to view things from the outside and cannot accurately provide a direct measure nor possess the slightest understanding of what really goes on behind closed doors. Measuring adequacy and efficiency requires benchmarks and detail accounts of mission failure or success. Classified information cannot be utilized in the equation, but at least the definition of the words can provide a basic understanding and from there begin to analyze unclassified information on various cases.
Counterintelligence is defined by law as an embrace of both the collection of information and activities conducted to counter foreign intelligence threats (Cleave, 2007). In other words, it’s the ability to identify, assess, neutralize and exploit foreign intelligence out to cause harm to the United States of America and its citizens. Efficiency in general describes the extent to which time, effort or cost is well used for the intended task or purpose. It is often used with the specific purpose of relaying the capability of a specific application of effort to produce a specific outcome effectively with a minimum amount or quantity of waste, expense, or unnecessary effort. "Efficiency" has widely varying meanings in different disciplines (Merriam-Webster.com, 2013). When the meaning of the word “efficiency” is applied to counterintelligence, a grey area appears as unanswered questions hidden behind classified information. The only true way to measure counterintelligence efficiency is on a case by case basis.
The governments fight against foreign intelligence threats will never end. The threat may not always be a clear and the adversary not always wearing a t-shirt with the words “Bad Guy” printed on it. Foreign counter intelligent threats are devious and not always present themselves in obvious methods. Sometimes may be written in code hiding in dormant hardware, others may be citizens working within our government ranks. Even if force protection is raised to the point where no one can move an inch, adversaries would still find ways to exploit and find vulnerabilities. At this point of exaggeration, “efficiency” would not be a word to describe the intelligence community. The very purpose of counterintelligence is to identify the enemy threat, find adequate measures of protection and ultimately confront the enemy and engage offensively. The United States intelligence agencies such as the FBI, CIA and Department of Defense carry out their agendas to the letter and one cannot question their abilities to do their job when the time counts. Their methods may not always be efficient, but most often than not are proven effective.
Intelligence agencies not only struggle to provide solid proof in productivity, but also to get along inside their own politics thus limiting process to positively advance national security policies. One example are offensive strategic air strikes complements of American unmanned air drones. The White House level of discretion on their utilization on airstrike missions almost canceled the entire program. It is to the point where the C.I.A. cannot longer be effective and missions are halted by its politics. One thing is for certain, the government is good at covering any wrong doing by classifying information to the public in order to keep their job afloat. Combat air support provided by drones has proven effective, but their mission motives and aftermath results on a few unclassified cases make them questionable for future use. The White House has refused to openly share classified information involving the use of unmanned air vehicles and how the mission objective justified targeted killings (Scott Shane, 2013). The White House Administration rightfully refused to openly share the information and their motives behind all the air strikes. Prevention of government secrets is one way to keep ahead of the competition, but it seems to be more about self-preservation and looking out after themselves. The area is obviously gray, and the secrecy around the drone program keeps everyone mal-informed about its current role. The biggest question is, at what exact point does the use of unmanned air vehicles crosses over and violates human right laws and ethical boundaries? Either ways the CI community are forced to deal with the hiccups of its politics and are halted to openly proceed in their offensive attacks. “We have this drone war, and the American public has no idea what the rules are, and Congress doesn’t know much more,” said Virginia E. Sloan, president of the Constitution Project, a civil liberties group in Washington. “YouTube appearances and speeches are absolutely no substitute for having the actual memos in hand.” She said when referring to the president’s pre-recorded online appearances and remarks. Other comments stated the demand for transparency Elisa Massimino, president of Human Rights First, an advocacy group, expressed how she is not satisfied on the government’s version of transparency “President Obama and Mr. Brennan have both pledged transparency,” she said. “Let’s see it” (Scott Shane, 2013). Forced to deal with human rights advocates in reporting secrecy and meanwhile Elisa does not have the comprehension in just how important it is to maintain some things under water. One of the ways to apply a good counterintelligence offence is not to reveal the secrets of war tactics utilized on the enemy. The White House has the right idea in protecting our government secrets and handling matters internally.
Troops deployed in combat areas are fed up to date information about their area of operation. The information may include anything deemed important to their current mission objectives. Some of the information is collected through unmanned air drones and often proven vital. When operating in combat zones, the windows for air support are very small and even nonexistent. For example, a “set” may have an operation which lasts for several days. The windows for air support are very specific in when and where troops are available to access the assets. Any sort of setbacks will push the troops out of these windows and will be forced to handle enemy encounters without air support. Ever since drones started to operate in combat zones, these air windows have become more accessible and in some months even operate around the clock around forward operating bases. Even though Air Drones do not carry air strike capabilities, the eye in the sky provide troops with important reconnaissance information. The role of the drone has progressed from a recon/patrol asset to an offensive strike weapon. Unfortunately combat mission friendly casualties and tragedies become high profile within the world media. Mission success often relies on judgment of inexperienced combat troops or government agents. To save face, the chain of command has to maintain a political balance and even forced to waste their time to defend their actions and even maintain afloat their long careers. The lack of focus within counterintelligence tactics and operations, more often than not, causes a waste of time and strain on governments vital resources.
Foreign Intelligence threats take advantage of any gray area, and may utilize high profile mistakes. The enemy utilizes these kinds of unfortunate events not only to force Americans to reveal their secrets, but also to publically embarrass and sway the public against its own government. The offensive efforts against the United States are aggressive and tactically sophisticated. Government agencies are under constant surveillance and penetration attacks and have had to defend against spies working within their own ranks. Even foreign partners have fallen prey to attacks from foreign intelligence in an attempt to sway and intimidate important classified information from them. How exactly does counterintelligence adequacy begin to balance itself or provide any sort of ranking system in order to measure the level of performance? The grey area remains and no one really knows except that the answer lies on the shoulders of a few top ranked individuals.
Some of the problems to adequately measure counterintelligence efficiency may be in direct connection on how the leadership roles are structured (Hass, 1996). The intelligence community top leadership structure is often considered to be more of an influential role instead of an executive authority figure. The Director of Central Intelligence is the main adviser to the president on matters of intelligence. Other key intelligence organizations consider the DCI more of a colleague than a boss, thus his only tool to provide leadership to other intelligence leaders (NSA, DIA, and so on) is a persuasive approach. The efficiency comes all these leaders come together to decide how to control, utilize, spend resources and provide new policies (Hass, 1996). Leaders within the Department of Defense are considered priority for these kinds of assets, and naturally possess most of the influence and are often biases on their decisions to receive most of those benefits. Leaders from the intelligence community end up to be advisors and colleges among one another without anyone having direct power on anyone else. This sort of leadership forces CI leadership into a more influential political role.
The American Government preaches about checks and balances, but true realization reflects the opposite. There is an imbalance of power within our own leaders (Hass, 1996). A constant struggle to get that piece of the pie has always been a problem for everyone involved. In the end, efficiency from the intelligence community may not be measured by its successes and failures, but by the power to sway decisions, policy and political influence.

References;
Merriam-Webster.com. (2013). Retrieved January 03, 2013, from Efficiency: http://www.merriam-webster.com/dictionary/efficiency
Cleave, M. V. (2007, June 12). CIA.com. Retrieved January 2, 2012, from Strategic Counterintelligence: What Is It and What Should We Do About It?: https://cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol51no2/strategic-counterintelligence.html
Hass, R. N. (1996, January). The Future of U.S. Intelligence. Retrieved January 10, 2013, from FAS.org: http://www.fas.org/irp/cfr.html#organization
Scott Shane, M. M. (2013, February 13). White House Tactic for C.I.A. Bid Holds Back Drone Memos. Retrieved February 13, 2013, from NYTimes.com: http://www.nytimes.com/2013/02/21/us/politics/strategy-seeks-to-ensure-bid-of-brennan-for-cia.html?pagewanted=1&ref=centralintelligenceagency

Similar Documents

Premium Essay

Term Paper

...3 COUNTERTERRORISM EVOLVES In chapte r 2, we described the growth of a new kind of terrorism, and a new terrorist organization—especially from 1988 to 1998, when Usama Bin Ladin declared war and organized the bombing of two U.S. embassies. In this chapter, we trace the parallel evolution of government efforts to counter terrorism by Islamic extremists against the United States. We mention many personalities in this report. As in any study of the U.S. government, some of the most important characters are institutions. We will introduce various agencies, and how they adapted to a new kind of terrorism. 3.1 FROM THE OLD TERRORISM TO THE NEW: THE FIRST WORLD TRADE CENTER BOMBING At 18 minutes after noon on February 26, 1993, a huge bomb went off beneath the two towers of the World Trade Center.This was not a suicide attack.The terrorists parked a truck bomb with a timing device on Level B-2 of the underground garage, then departed.The ensuing explosion opened a hole seven stories up. Six people died. More than a thousand were injured. An FBI agent at the scene described the relatively low number of fatalities as a miracle.1 President Bill Clinton ordered his National Security Council to coordinate the response. Government agencies swung into action to find the culprits.The Counterterrorist Center located at the CIA combed its files and queried sources around the world. The National Security Agency (NSA), the huge Defense Department signals collection agency, ramped up its communications...

Words: 17150 - Pages: 69

Premium Essay

Contemplating Realities and Paradoxes in the Global War on Terror

...problematic premises related to the four fundamental approaches to countering terrorism; increased security, eliminating the terrorists, attacking the support infrastructure, and altering conditions that breed discontent. Despite trite, albeit politically popular, commentary proposing those methods, execution of those concepts is extremely difficult, often controversial, and sometimes counterproductive. Section Two of this monograph addresses several other policy decisions that generate problems that are difficult to resolve, but directly impact the forces involved. Among those topics are; roles of contractors, individual loyalties versus national interests, alliances of convenience, foreign response to our policy on preemption of weapons of mass destruction (WMDs), the consequences of our stated objective of spreading democracy, the impact of U.S. presence in the Gulf region, and quandary associated with defining winning. Section Three will offer a few solutions to extremely contentious, often emotional, issues that are strategic in scope. This includes the development of an organization that can predict threat objectives and evolution, thus reducing the probability of continued unanticipated consequences from U.S. actions. Additionally, means of extraction of information from prisoners without...

Words: 28095 - Pages: 113

Free Essay

Empoyment

...THE FUTURE OF EMPLOYMENT: HOW SUSCEPTIBLE ARE JOBS TO COMPUTERISATION?∗ Carl Benedikt Frey† and Michael A. Osborne‡ September 17, 2013 . Abstract We examine how susceptible jobs are to computerisation. To assess this, we begin by implementing a novel methodology to estimate the probability of computerisation for 702 detailed occupations, using a Gaussian process classifier. Based on these estimates, we examine expected impacts of future computerisation on US labour market outcomes, with the primary objective of analysing the number of jobs at risk and the relationship between an occupation’s probability of computerisation, wages and educational attainment. According to our estimates, about 47 percent of total US employment is at risk. We further provide evidence that wages and educational attainment exhibit a strong negative relationship with an occupation’s probability of computerisation. Keywords: Occupational Choice, Technological Change, Wage Inequality, Employment, Skill Demand JEL Classification: E24, J24, J31, J62, O33. We thank the Oxford University Engineering Sciences Department and the Oxford Martin Programme on the Impacts of Future Technology for hosting the “Machines and Employment” Workshop. We are indebted to Stuart Armstrong, Nick Bostrom, Eris Chinellato, Mark Cummins, Daniel Dewey, David Dorn, Alex Flint, Claudia Goldin, John Muellbauer, Vincent Mueller, Paul Newman, Seán Ó hÉigeartaigh, Anders Sandberg, Murray Shanahan, and Keith ...

Words: 26582 - Pages: 107

Premium Essay

Defeating Daesh

...Defeating the Islamic State: Both Short-term and Long-term Counter Strategies for the Proto-State and its Ideologies Christopher J. Minchin Norwich University FIRST DRAFT SOCI 401A Culture and Anthropology February 16, 2016 Tracey Poirier Source: The Institute for the Study of War (ISW) and the Critical Threats Project (CTP).), Jan, 2016. “If you know the enemy and know yourself you need not fear the results of a hundred battles“ –– Sun Tzu, Chinese philosopher and military strategist, around 500 BC. “Our terrorism against America is blessed terrorism.” –– Osama bin Laden (on video) “The acme of this religion is jihad.” — Osama bin Laden (Bergen, 2001, p. 41) Many have asked, “what can we do to defeat the Islamic State of Iraq and al-Sham (ISIS)? ” There have been a variety of suggestions from airstrikes, isolation , establishing a national unity government in Iraq to the feasibility of a counter-offensive using 'local' militia's and only as a last resort U.S. Boots on the ground. These are all worthy ideas; however, it is imperative to get a fundamental understanding of what has caused this problem because ISIS is growing and becoming stronger (even though current air strikes and counter-offensives have been successful). Before a decision can be made a rigorous analysis is necessary, a sociological analysis, so that the United States and the rest of the world can determine what must be done regarding ISIS and why. (Thesis):...

Words: 20913 - Pages: 84

Free Essay

Budget

...congressional staff. From FY 1969 to FY 2005 OSD published the “Annual Defense Report” (ADR) to meet 10 USC Section 113 requirements. Starting with the President’s FY 2006 Budget, this report was no longer produced. Subsequently, the Overview began to fill this role. This year to ensure compliance with Section 113, new chapters are added to include reports from each Military Department on their respective funding, military mission accomplishments, core functions, and force structure. Key initiatives incorporated in the FY 2014 Defense budget. Our budget is formulated based on aligning program priorities and resources based on the President’s strategic guidance. This year’s budget involves key themes to: achieve a deeper program alignment of our future force structure with resource availability; maintain a mission ready force; continue to emphasize efficiencies by being even better stewards of taxpayer dollars; and continue to take care of our people and their families. Implementing Defense Strategic Guidance. The FY 2014 budget request continues the force structure reductions made in the FY 2013 budget request. Following the President’s National Security Strategy and the January 2012 revisions to that strategy, the Budget continues to make informed choices to achieve a modern, ready, and balanced force to meet the full range of potential military requirements. The restructured force will be balanced by technological advancements to deter and defeat aggression, to maintain flexibility...

Words: 74297 - Pages: 298

Premium Essay

Dress Shop

...Outline: RESEARCH 1) NATURE AND SCOPE OF RESEARCH 1.1) Definition – purposive, systematic and scientific process of gathering, analyzing, classifying, organizing, presenting and interpreting data for the solution of a problem, for prediction, for invention, for the discovery of truth, or for the expansion or verification of existing knowledge, all for the preservation and improvement of the quality of human life. 1.1.1) History of Research Historical records reveal that there is no written document on the beginning of business research as an organized business activity, but this is definitely of modern origin. During the Middle Ages, the merchant families of Fugger and Rothschild prospered in part because their organizations enabled them to get information before their competitors did. These studies were unsystematic, but considered to be well organized during that time. In 1879, more by accident than foresight, N. W. Ayer and Son conducted a crude but formal market survey, to measure markets for agricultural machineries, manufactured by Nicholas-Shepard Company. This market survey is probably the first real attempt at business research in the United States. The Curits Publishing company is generally conceived to have formed the first formal business research department with the appointment of Charles Parlin as manager of the Commercial Research Division of the Advertising Department in 1911. His original idea was that advertising space could be sold more effectively...

Words: 30970 - Pages: 124

Premium Essay

Btec Hnd

...dChapter 2 Methods of Enquiry Psy in Psychology After reading this chapter, you would be able to • • • • • explain the goals and nature of psychological enquiry, understand different types of data used by psychologists, describe some important methods of psychological enquiry, understand the methods of analysing data, and learn about the limitations of psychological enquiry and ethical considerations. Contents Introduction Goals of Psychological Enquiry Steps in Conducting Scientific Research Alternative Paradigms of Research Nature of Psychological Data Some Important Methods in Psychology Observational Method Example of an Experiment (Box 2.1) Experimental Method Correlational Research Survey Research Example of Survey Method (Box 2.2) Psychological Testing Case Study Analysis of Data Quantitative Method Qualitative Method Limitations of Psychological Enquiry Ethical Issues An idea that is developed and put into action is more important than an idea that exists only as an idea. – Gautam Buddha 22 Psychology Key Terms Summary Review Questions Project Ideas Introduction You have read in the first chapter that psychology is the study of experiences, behaviours, and mental processes. You may now be curious to know how psychologists study these phenomena. In other words, what methods are used to study behaviour and mental processes? Like all scientists, psychologists seek to describe, predict, explain and control what they study. For this, psychologists...

Words: 12111 - Pages: 49

Premium Essay

Global Issues.

...internationally has widened due to an increasingly broad geographic scope and the increasing complexity of technology. Strategic issues arise not only through the formal, periodic strategic planning processes in companies but also can, and quite often do arise unpredictably due to new insights, unexpected advances in technology or competitive activities in the market place. All companies have their way of identifying and dealing with these being their most critical strategic questions. However, theprocess of managing emerging strategic issues is typically non-structured, not necessarily optimally suited to enable the effective identification of the most critical questions and the appropriate allocation of top management attention and corporate intelligence support to answer the identified strategic questions. Despite the past research during 1960s, 1970s, and 1980s into the domain of strategic issues (SI), strategic issue management (SIM), and strategic issue management systems (SIMS) there is a scarcity applicable approaches for firms to use in improving their attention focus and distribution in strategic issue management processes. The underpinnings of strategic management hinge on managers gaining an understanding of competitors, markets, prices, suppliers, distributors, governments, creditors, shareholders, and customers worldwide. The price and quality of a firm’s products and services must be competitive on a worldwide basis, not just on a local basis and as such the need to understand...

Words: 4553 - Pages: 19

Free Essay

Ict Thai

...2011 with an authorized and paid up capital of Thai Baht 10 million. The company’s nature of business is container storage, maintenance and repair of containers. ICT (Thai) is a subsidiary of Integrated Container Terminal (M) Sdn Bhd, located in Pelabuhan Tanjung Pelepas, Malaysia. The company was established on the 6th February 2002 and currently is one of the main service providers for container storage in Malaysia’s port. 3 Picture 2 ICT Container Yard Based on good relationship, ICT (M) Sdn Bhd has secured contracts with 25 shipping lines in PTP. This relationship has been continuously done by ICT (Thai) with these reputable shipping companies and as a result, ICT(Thai) has entered into an agreement with 5 reputable shipping companies within less than a year in operation namely; Malaysian Shipping Corp Bhd (MISC),...

Words: 10072 - Pages: 41

Premium Essay

Doc, Docx, Pdf, Wps, Rtf, Odt

...Coping with Continuous Change in the Business Environment CHANDOS KNOWLEDGE MANAGEMENT SERIES Series Editor: Melinda Taylor (email: melindataylor@chandospublishing.com) Chandos’ new series of books are aimed at all those individuals interested in knowledge management. They have been specially commissioned to provide the reader with an authoritative view of current thinking. If you would like a full listing of current and forthcoming titles, please visit our web site www.chandospublishing.com or contact Hannah Grace-Williams on email info@chandospublishing.com or telephone number +44 (0) 1993 848726. New authors: we are always pleased to receive ideas for new titles; if you would like to write a book for Chandos, please contact Dr Glyn Jones on email gjones@chandospublishing.com or telephone number +44 (0) 1993 848726. Bulk orders: some organisations buy a number of copies of our books. If you are interested in doing this, we would be pleased to discuss a discount. Please contact Hannah Grace-Williams on email info@chandospublishing.com or telephone number +44 (0) 1993 848726. Coping with Continuous Change in the Business Environment Knowledge management and knowledge management technology ANTONIE BOTHA DERRICK KOURIE AND RETHA SNYMAN Chandos Publishing Oxford · England Chandos Publishing (Oxford) Limited TBAC Business Centre Avenue 4 Station Lane Witney Oxford OX28 4BN UK Tel: +44 (0) 1993 848726 Fax: +44 (0) 1865 884448 Email:...

Words: 69553 - Pages: 279

Premium Essay

Operations

...MASTER OF BUSINESS LEADERSHIP OPERATIONS MANAGEMENT (MBL912L) | | |Name | |Student Number | | | | | | | | | | | | | | | | | | | | | | ...

Words: 17381 - Pages: 70

Free Essay

Cis 500

...Law Enforcement Technology Needs Assessment Law Enforcement Technology Needs Assessment: Future Technologies to Address the Operational Needs of Law Enforcement In partnership with the Lockheed Martin Corporation By Christopher S. Koper, Bruce G. Taylor, and Bruce E. Kubu With contributions by Eugene Glover, John Anderson, Paul Snabel, Chuck Wexler, Rachael Bambery, Nathan Ballard, Anthony Bellero, David Prothero, Willie Marsh, Mike Schroeder, Mike Taylor, Greg Maultsby, Donnie Gilley and Dave Kier Police Executive Research Forum 1120 Connecticut Ave., N.W., Suite 930 Washington, D.C. 20036 Jan 16, 2009 Report Outline Section Executive Summary Chapter 1: Overview / Introduction Chapter 2: Technology and Law Enforcement: An Overview of Applications, Impacts, and Needs Chapter 3: The PERF Technology Needs Assessment Survey Chapter 4: The PERF-Lockheed Martin Law Enforcement Future Technologies Workshop Chapter 5: Conclusions and Next Steps Pages 3-9 10-11 12-32 33-47 48-64 65-73 Appendix A: References Appendix B: The PERF Technology Needs Assessment Survey Appendix C: Survey Technology Term Definitions Appendix D: Responding Agencies (PERF Survey) Appendix E: Supplementary Survey Tables Appendix F: List of Workshop Attendees 74-79 80-91 92-98 99-102 103-124 125-127 2 Technology and Law Enforcement: Future Technologies to Address the Operational Needs of Law Enforcement EXECUTIVE SUMMARY Background The effects of technology can be seen...

Words: 37391 - Pages: 150

Premium Essay

Recruitment Project

...overall satisfaction level is high. * Job profile communication, evaluation of experience is the factors where Glaxosmithkline is scoring well. * The recruitment is mainly done through print media. * The selection procedures are having three phases. * The executives want the procedure to be future oriented. Following were the suggestions given for the improvement in the procedures. * The process should be made future oriented this can be done by keeping skills, attitude and knowledge in consideration instead of just emphasizing on qualification and experience. * The levels for selection procedures should be minimized for lower level staff selection. * The individual departmental needs should be communicated within the company during general meetings, also the job...

Words: 14022 - Pages: 57

Premium Essay

The Trends

...Trends Shaping Tomorrow’s World By Marvin J. Cetron and Owen Davies Forces in the Natural and Institutional Environments Introduction For nearly half a century, Forecasting International has been tracking the forces that shape our future. Some 20 years ago, we codified our observations into a list of trends that forms the basis for much of our work. For each of our projects, we compare the specific circumstances of an industry or organization with these general trends and project their interactions. This often allows us to form a remarkably detailed picture of what lies ahead. This is Part Two of FI’s periodic trend report. It covers trends in energy, the environment, technology, management and institutions, and terrorism. (Part One, published in the May-June 2010 issue of THE FUTURIST, tracked economic, population, societal, family, and work trends.) Because this forecast project is ongoing, the authors — and the World Future Society — welcome your feedback. 38 THE FUTURIST July-August 2010 © 2010 World Future Society • 7910 Woodmont Avenue, Suite 450, Bethesda, MD 20814, U.S.A. • All rights reserved. JULIEN GRONDIN / ISTOCKPHOTO Energy Trends 40% in 1999 to about 37% in 2020. n Despite efforts to develop alternative sources of energy, oil consumption is still rising rapidly. • The world used only 57 million barrels of oil per day in 1973, when the first major price shock hit. By 2008, it was using 86 million barrels daily...

Words: 12752 - Pages: 52

Premium Essay

International Business

...Quazi Tasnim Hasan ID # 112 111 051 Assignment No. 4 What is economic integration? For the Last 65 years, the world has undergone significant changes. The decade of the 1970s was dominated by the two energy crises. Industrial economies were faced with a new “enemy”: stagflation—a combination of high inflation and unemployment. Developing countries were increasingly becoming more dependent on foreign borrowing and centrally planned economies were unable to secure economic growth. Furthermore, the world witnessed a radical transformation during the past two decades. The greatest economic experiment of the twentieth century was the movement from communism to a market economy, which began in Mikhail Gorbachev’s Russia in the mid-1980s, and then spread to Eastern Europe at the beginning of the 1990s and to China later on during the same decade. Although the transition to a free market has led to disappointing outcomes, most Eastern Europe countries have concentrated on integrating their economies with Europe and on becoming part of the EU. All these events led to the world becoming more and more global in nature and to defining globalization as a closer economic integration among nations through increased trade and capital flows. It also refers to labor movement and technology transfer across international borders as well as cultural and political issues, which are beyond the scope of this chapter. Globalization is the result of technological processes occurring mainly in the...

Words: 8839 - Pages: 36