No More Secrets

Author: Hamilton Bean
Publisher: ABC-CLIO
ISBN: 0313391556
Format: PDF, ePub, Docs
Download Now
This in-depth analysis shows how the high stakes contest surrounding open source information is forcing significant reform within the U.S. intelligence community, the homeland security sector, and among citizen activists. * Critique and commentary from intelligence officials and analysts regarding open source reforms within the intelligence community and homeland security sector * Three interrelated case studies through which post-9/11 U.S. intelligence reform is analyzed and critiqued * Examples of collateral, including official and unofficial photos, from the 2007 and 2008 Open Source Conferences sponsored by the Director of National Intelligence * A timeline of key open source developments, including the establishment of associated commissions and changes in organizational structures, policies, and cultures * Appendices containing excerpts of key open source legislation and policy documents * A bibliography of open source-related scholarship and commentary

Air Power in UN Operations

Author: A. Walter Dorn
Publisher: Routledge
ISBN: 1317183401
Format: PDF, Kindle
Download Now
Air power for warfighting is a story that's been told many times. Air power for peacekeeping and UN enforcement is a story that desperately needs to be told. For the first-time, this volume covers the fascinating range of aerial peace functions. In rich detail it describes: aircraft transporting vital supplies to UN peacekeepers and massive amounts of humanitarian aid to war-affected populations; aircraft serving as the 'eyes in sky' to keep watch for the world organization; and combat aircraft enforcing the peace. Rich poignant case studies illuminate the past and present use of UN air power, pointing the way for the future. This book impressively fills the large gap in the current literature on peace operations, on the United Nations and on air power generally.

Open Source Intelligence in the Twenty First Century

Author: C. Hobbs
Publisher: Springer
ISBN: 1137353325
Format: PDF, ePub, Docs
Download Now
This edited book provides an insight into the new approaches, challenges and opportunities that characterise open source intelligence (OSINT) at the beginning of the twenty-first century. It does so by considering the impacts of OSINT on three important contemporary security issues: nuclear proliferation, humanitarian crises and terrorism.

Essentials of Strategic Intelligence

Author: Loch K. Johnson
Publisher: ABC-CLIO
ISBN: 1440832285
Format: PDF, Docs
Download Now
A highly valuable resource for students of intelligence studies, strategy and security, and foreign policy, this volume provides readers with an accessible and comprehensive exploration of U.S. espionage activities that addresses both the practical and ethical implications that attend the art and science of spying. • Provides a comprehensive, up-to-date examination of all aspects of intelligence by experts in the field, from collection-and-analysis and counterintelligence to covert action and accountability • Probes into how the United States' intelligence agencies attempt to protect the nation from cyberattacks by foreign nations and terrorist groups—and documents the successes and failures • Documents the involvement of the National Security Agency (NSA) in bulk "metadata" collection of information on the telephone records and social media communications of American citizens • Examines the effects that have resulted from major leaks in the U.S. government, from Wikileaks to the NSA Snowden leaks

Fixing Intelligence

Author: William E. Odom
Publisher: Yale University Press
ISBN: 0300103042
Format: PDF, ePub
Download Now
William E. Odom is the highest-ranking member of the United States Intelligence community ever to write a book outlining fundamental restructuring of this vast network of agencies, technology, and human agents. In the wake of 9/11, Odom has revised and updated a powerful critique he wrote several years ago for staffs of the U.S. congressional committee overseeing the vast American intelligence bureaucracy. His recommendations for revamping this essential component of American security are now available for general readers as well as for policymakers.

Enemies of Intelligence

Author: Richard K. Betts
Publisher: Columbia University Press
ISBN: 0231138881
Format: PDF
Download Now
Citing the events of 9/11 and the false assessment of Saddams weapons arsenal, one of the nations foremost political scientists illuminates the paradoxes and problems that frustrate the intelligence process, and outlines strategies for better intelligence gathering and assessment.

The Future Security Environment in the Middle East

Author: Nora Bensahel
Publisher: Rand Corporation
ISBN: 083303619X
Format: PDF, Kindle
Download Now
This report identifies several important trends that are shaping regional security. It examines traditional security concerns, such as energy security and the proliferation of weapons of mass destruction, as well as newer challenges posed by political reform, economic reform, civil-military relations, leadership change, and the information revolution. The report concludes by identifying the implications of these trends for U.S. foreign policy.

Espionage and Intelligence Gathering

Author: Louise I. Gerdes
Publisher: Greenhaven Press, Incorporated
ISBN:
Format: PDF, ePub, Docs
Download Now
Presents a collection of essays covering a variety of topics dealing with intelligence gathering and espionage.

Whole Earth Security

Author: Daniel Deudney
Publisher:
ISBN:
Format: PDF, Kindle
Download Now
The current use and potential of technology for achieving security and peace are explored. Section 1 traces the use of technology for warfare through the mastery of ocean-going sailing, the maturation of the airplane, and the development of nuclear weapons. This section suggests that these developments have led to a loss rather than an increase in security. Section 2 discusses the "transparency revolution," which refers to the military reconnaissance, sensing, command, and communication systems literally wiring the earth with a web of electronic intelligence. Section 3 focuses on current military strategies: mutually assured destruction (MAD), nuclear utilization theories (NUTS), and, according to the author's personal projection, destruction-entrusted automatic devices (DEAD). The differences in these strategies are explained: to start a war in the MAD era would have required a major political misjudgment; in NUTS, a major human error; in DEAD, a major machine malfunction. Section 4 outlines elements of planetary security. It suggests that the same transparent technology now pushing superpower military competition to its most dangerous level can be used to construct an alternative security system. Section 5 promotes good neighbor politics. The final section concludes with the notion that while technology may have overwhelmed human ethical capabilities, it has not overwhelmed our passion for security. (KC)