Trust, but Verify


Book Description

Trust, but Verify uses trust—with its emotional and predictive aspects—to explore international relations in the second half of the Cold War, beginning with the late 1960s. The détente of the 1970s led to the development of some limited trust between the United States and the Soviet Union, which lessened international tensions and enabled advances in areas such as arms control. However, it also created uncertainty in other areas, especially on the part of smaller states that depended on their alliance leaders for protection. The contributors to this volume look at how the "emotional" side of the conflict affected the dynamics of various Cold War relations: between the superpowers, within the two ideological blocs, and inside individual countries on the margins of the East–West confrontation.




Trust But Verify


Book Description

"Bodman's hard-won information and sheer storytelling talent make this a book to remember.” —LEE CHILD, #1 worldwide bestselling author of the Jack Reacher series "Karna Bodman’s Trust But Verify is a riveting page-turner you won’t want to put down!" - CARLA NEGGERS, bestselling author of Imposter's Lure Samantha Reid, the brilliant Director of the White House Office of Homeland Security, is enjoying a rare evening away from Washington at a Florida charity ball when a bomb sends the well-heeled attendees stampeding into the night. Narrowly escaping the blast, Reid returns to the White House, where she has been trailing the massacres and illicit arms sales of a shadowy group of Russian oligarchs... all of whom want her dead. Caught in an ever-tightening spiral of lies and ruthless hitmen, Reid must race the clock against her assassins. But she's not alone. When FBI special agent Brett Keating discovers Samantha was the target of the Florida bomb, he resolves to protect her, while also unravelling a brazen plot that threatens the lives of international financial leaders and stock markets worldwide.




Intelligence Activities in Ancient Rome


Book Description

Professor Sheldon uses the modern concept of the intelligence cycle to trace intelligence activities in Rome whether they were done by private citizens, the government, or the military. Examining a broad range of activities the book looks at the many types of espionage tradecraft that have left their traces in the ancient sources: * intelligence and counterintelligence gathering * covert action * clandestine operations * the use of codes and ciphers Dispelling the myth that such activities are a modern invention, Professor Sheldon explores how these ancient spy stories have modern echoes as well. What is the role of an intelligence service in a free republic? When do the security needs of the state outweigh the rights of the citizen? If we cannot trust our own security services, how safe can we be? Although protected by the Praetorian Guard, seventy-five percent of Roman emperors died by assassination or under attack by pretenders to his throne. Who was guarding the guardians? For students of Rome, and modern social studies too - this will provide a fascinating read.




The Speechwriter


Book Description

From 2007 to 2010 Swaim worked for Mark Sanford, South Carolina's governor, as a communications officer and speechwriter. Everyone knows this kind of politician: a charismatic maverick who goes up against the system and its ways, but thinks he doesn't have to live by the rules. Swaim tells the story of a band of believers who attach themselves to this sort of ambitious narcissist-- and what happens when it all comes crashing down.




Algorithms and Law


Book Description

Exploring issues from big-data to robotics, this volume is the first to comprehensively examine the regulatory implications of AI technology.




Trust and Mistrust in International Relations


Book Description

Trust and international relations -- Fear and the origins of the Cold War -- European cooperation and the rebirth of Germany -- Reassurance and the end of the Cold War -- Trust and mistrust in the post-Cold War era.




Blockchain


Book Description

Richie covers the so what of blockchain as opposed to the crowded area of the what of blockchain. In the 1st half readers self-realize that a trust gap is exponentially expanding in commerce, and humans are carrying the unnecessary burden to always trust but verify with intermediaries. Today, we the human species start every company or transaction with the automatic subliminal assumption that counterparties cannot be trusted. In the 2nd half, Richie re-positions blockchain from a paradigm that is looking for a problem, into a paradigm that would help close the trust gap. Blockchain, mankind’s first opportunity for trusted commerce at global scale. About the Author




Trust But Verify


Book Description




Machine Learning for Auditors


Book Description

Use artificial intelligence (AI) techniques to build tools for auditing your organization. This is a practical book with implementation recipes that demystify AI, ML, and data science and their roles as applied to auditing. You will learn about data analysis techniques that will help you gain insights into your data and become a better data storyteller. The guidance in this book around applying artificial intelligence in support of audit investigations helps you gain credibility and trust with your internal and external clients. A systematic process to verify your findings is also discussed to ensure the accuracy of your findings. Machine Learning for Auditors provides an emphasis on domain knowledge over complex data science know how that enables you to think like a data scientist. The book helps you achieve the objectives of safeguarding the confidentiality, integrity, and availability of your organizational assets. Data science does not need to be an intimidating concept for audit managers and directors. With the knowledge in this book, you can leverage simple concepts that are beyond mere buzz words to practice innovation in your team. You can build your credibility and trust with your internal and external clients by understanding the data that drives your organization. What You Will Learn Understand the role of auditors as trusted advisors Perform exploratory data analysis to gain a deeper understanding of your organization Build machine learning predictive models that detect fraudulent vendor payments and expenses Integrate data analytics with existing and new technologies Leverage storytelling to communicate and validate your findings effectively Apply practical implementation use cases within your organization Who This Book Is For AI Auditing is for internal auditors who are looking to use data analytics and data science to better understand their organizational data. It is for auditors interested in implementing predictive and prescriptive analytics in support of better decision making and risk-based testing of your organizational processes.




Sizing People Up


Book Description

A former FBI agent shares his simple but powerful toolkit for assessing who you can trust--and who you can't. After two decades as a behavior analyst in the FBI, Robin Dreeke knows a thing or two about sizing people up. He's navigated complex situations that range from handling Russian spies to navigating the internal politics at the Bureau. Through that experience, he was forced to develop a knack for reading people--their intentions, their capabilities, their desires and their fears. Dreeke's first book, It's Not All About "Me," has become a cult favorite with readers seeking to build quick rapport with others. His last book, The Code of Trust, was about how to inspire trust in others as a leader. In Sizing People Up, Dreeke shares his simple, six-step system that helps you predict anyone's future behavior based on their words, goals, patterns of action, and the situation at hand. Predicting the behavior of others is an urgent need for anyone whose work involves relationships with others, whether it's leading an organization, collaborating with a teammate, or closing a sale. But predictability is not as simple as good and evil, or truth and fiction. Allies might make a promise with every intention of keeping it, not realizing that they will be unable to do so due to some personal shortcoming. And those seeking to thwart your endeavor may not realize how reliable their malevolent tells have become. Dreeke's system is simple, but powerful. For instance, a colleague might have a strong moral code, but do they believe your relationship will be long-term? Even the most upstanding person can betray your trust if they don't see themselves tied to you or your desired result in the long term. How can you determine whether someone has both the skill and will to do what they've said they're going to do? Behaviors as subtle as how they take notes will reveal their reliability. Using this book as their manual, readers will be able to quickly and easily determine who they can trust and who they can't; who is likely to deliver on promises and who will disappoint; and when a person is vested in your success vs when they are actively plotting your demise. With this knowledge they can confidently embark on anything from a business venture to a romantic relationship to a covert operation without the stress of the unknown.