Intelligence and national security: the secret world of spies : an anthology
Gespeichert in:
Format: | Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
New York
Oxford Univ. Press
2008
|
Ausgabe: | 2. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and indexes |
Beschreibung: | XVI, 553 S. Ill. 26 cm |
ISBN: | 0195332474 9780195332476 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV023092517 | ||
003 | DE-604 | ||
005 | 20090406 | ||
007 | t | ||
008 | 080122s2008 xxua||| |||| 00||| eng d | ||
010 | |a 2007299830 | ||
015 | |a GBA761141 |2 dnb | ||
020 | |a 0195332474 |c pbk. |9 0-19-533247-4 | ||
020 | |a 9780195332476 |9 978-0-19-533247-6 | ||
035 | |a (OCoLC)163616263 | ||
035 | |a (DE-599)BVBBV023092517 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 |a DE-355 | ||
050 | 0 | |a JK468.I6 | |
082 | 0 | |a 327.12 | |
084 | |a MG 70950 |0 (DE-625)122860:12227 |2 rvk | ||
245 | 1 | 0 | |a Intelligence and national security |b the secret world of spies : an anthology |c ed. with introd. by Loch K. Johnson, James J. Wirtz |
250 | |a 2. ed. | ||
264 | 1 | |a New York |b Oxford Univ. Press |c 2008 | |
300 | |a XVI, 553 S. |b Ill. |c 26 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and indexes | ||
610 | 2 | 4 | |a United States |b Central Intelligence Agency |
650 | 4 | |a Politik | |
650 | 4 | |a Intelligence service | |
650 | 4 | |a Intelligence service |z United States | |
650 | 4 | |a National security | |
650 | 4 | |a National security |x Government policy |z United States | |
650 | 4 | |a Spies | |
650 | 0 | 7 | |a Spionage |0 (DE-588)4056287-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Geheimdienst |0 (DE-588)4019737-2 |2 gnd |9 rswk-swf |
651 | 4 | |a USA | |
651 | 7 | |a USA |0 (DE-588)4078704-7 |2 gnd |9 rswk-swf | |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 0 | 1 | |a Spionage |0 (DE-588)4056287-6 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 1 | 1 | |a Geheimdienst |0 (DE-588)4019737-2 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Johnson, Loch K. |d 1942- |e Sonstige |0 (DE-588)132480220 |4 oth | |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016295367&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-016295367 |
Datensatz im Suchindex
_version_ | 1804137346153578496 |
---|---|
adam_text | Contents
About This Book
..................................
v
About the Editors
.................................xiii
About the Contributors
..............................xiv
Preface and Acknowledgments
...........................xvi
PART I. INTELLIGENCE IN THE UNITED STATES: AN INTRODUCTION
Introduction
.................................1
1.
The Evolution of the U.S. Intelligence Community
—
An Historical Overview
.....5
Phyllis Provost McNeil
Written by an Aspin-Brown Commission staff member, this history of the U.S. intelli¬
gence community traces how today s intelligence institutions, while shaped by the Cold
War, are based on an American tradition of supporting foreign and defense policy with
clandestinely acquired information.
*2. The Study of Intelligence in Theory and Practice
................21
Len
Scott and Peter Jackson
Two British scholars review the state of intelligence research literature.
*3. A Conversation With Richard Helms, a Director of Central Intelligence
.......38
Loch K. Johnson
An interview with Richard Helms in
1990
reveals the perspectives on intelligence of a fa¬
mous U.S. spy chief near the end of the Cold War.
PART II. INTELLIGENCE COLLECTION
Introduction
.................................49
4.
CIA and Its Discontents
..........................56
Patrick R. Riley
A former Directorate of Operations case officer explores whether the CIA can cope with
all the intelligence requirements placed on it since the end of the Cold War and calls for
a more discriminating list of targets for intelligence collection.
5.
Re-examining Problems and Prospects in U.S. Imagery Intelligence
........64
John M. Diamond
A perennial problem of intelligence collection is how to acquire useful knowledge from
the glut of information gathered by spy machines and human agents. This article fo¬
cuses on how to cope with the flood of photographs (or images) that pour back to the
United States from surveillance satellites.
*New in the Second Edition.
*6.
Satellite Surveillance
...........................76
William E.
Burrows
This selection examines the early development of satellite surveillance capabilities in
the United States.
7.
The Time of Troubles: The U.S. National Security Agency in the
Twenty-First Century
............................88
Matthew M. Aid
Americas largest intelligence organization, the National Security Agency, is beset with a
variety of bureaucratic problems according to this expert on signals intelligence, who
recommends improvements in management and outreach, as well as technological
remedies.
8.
CIA s Strategic Intelligence in Iraq
.....................106
Richard L. Russell
This report on the CIA s performance prior to the first Gulf War gives analysts high
marks for accurate estimates of Iraqi intentions and capabilities and the performance
of U.S. forces in battle.
PART III. INTELLIGENCE ANALYSIS
Introduction
................................116
9.
Analysis, War, and Decision: Why Intelligence Failures Are Inevitable
.......122
Richard
K. Betts
This history of diplomatic and military affairs is riddled with instances when intelli¬
gence analysts failed to provide timely warning of what was about to unfold.
Betts
pres¬
ents a strong explanation of why intelligence failures are inevitable, as well as insights
into the myriad challenges that analysts must overcome to offer useful estimates of fu¬
ture events.
10.
Open Source Intelligence
.........................137
Robert D. Steele
Steele describes various types of information available on the World Wide Web and ex¬
plains how these sources can be exploited by intelligence organizations to supplement
the classified information they traditionally rely on as a basis for their estimates.
11.
A Policymaker s Perspective on Intelligence Analysis
..............153
Robert D.
Blackwill
and Jack Davis
Blackwill
provides the reader a glimpse into the lives of policymakers and analysts as
they interact.
12.
Intelligence Estimates and the Decision-Maker
................160
Shlomo Gazit
Gazit highlights the importance of establishing what he describes as a reciprocal rela¬
tionship between analysts and policymakers and ways to bridge the gap that exists be¬
tween them.
13.
Early Warning Versus Concept: The Case of the Yom Kippur War
1973......176
Ephraim
Kahana
This study of Israeli intelligence performance prior to the
1973
Yom Kippur War de¬
scribes how the analytic framework that dominated Israeli perceptions of events in the
fall of
1973
led both analysts and officials to misinterpret information about the threats
they faced.
PART IV. THE DANGER OF INTELLIGENCE POLITICIZATION
Introduction
................................189
14.
The Politicization of Intelligence
......................193
Harry Howe Ransom
This overview of how politicization occurs within the intelligence community suggests
that it is inherent in the production of intelligence, because information is crucial to
gaining and preserving political power.
15.
Intelligence to Please? The Order of Battle Controversy During the Vietnam War
. . 205
James J. Wirtz
In this account of a dispute that occurred within the U.S. intelligence community on the
eve of the
1968
Tet
offensive, Wirtz explores charges made by Samuel Adams, a CIA ana¬
lyst, that a conspiracy existed to prevent accurate information about enemy troop
strength from reaching senior members of the Johnson Administration.
*16. Public Intelligence
............................220
Glenn Hastedt
This chapter explores the role of leaks in the federal government
—
the unauthorized dis¬
closure of information that sometimes occurs as part of the battle over policy advocacy
in Washington, D.C.
PART V. INTELLIGENCE AND THE POLICYMAKER
Introduction
................................232
17.
Intelligence and National Action
......................237
Michael Herman
In this introduction to the role played by intelligence in shaping diplomacy and military
action, Herman suggests that many things can influence the making of policy in peace¬
time and war, not just information.
18.
Tribal Tongues: Intelligence Consumers, Intelligence Producers
.........247
Mark M. Lowenthal
Lowenthal suggests that the different bureaucratic cultures of the policymaking and in¬
telligence communities often form a significant barrier to a close relationship between
the consumers and producers of intelligence.
*19. The Need for Policy Guidance
.......................255
Aspin-Brown Commission
Among the many thoughtful recommendations of the Aspin-Brown Commission were
several related to the improvement of relationships between the consumers and the pro¬
ducers of intelligence, outlined in this chapter.
PART VI: COVERT ACTION
Introduction
................................260
20.
Interfering With Civil Society: CIA and KGB Covert Political Action
During the Cold War
...........................267
Kevin A. O Brien
The Cold War was in large part a subterranean battle between the intelligence services
of the two superpowers, the United States and the Soviet Union, as carried out by their
premier intelligence services: the CIA and the KGB. O Brien examines the political di¬
mension of covert actions undertaken by these two intelligence behemoths.
21.
Covert
Action:
Swampland of
American
Foreign Policy
.............281
Senator Frank Church
The Chairman of the Senate Intelligence Committee that investigated intelligence
abuses in
1975-76
finds in the excesses of the CIA abroad the symptoms of an illusion of
American omnipotence that entrapped and enthralled the nation
s
presidents through¬
out the Cold War.
22.
Covert Action Can Be Just
.........................286
James A. Barry
Exploring the use of covert action from the point of view of just-war theory, Barry estab¬
lishes benchmarks for judging the morality of this controversial form of secret foreign
policy. He eschews highly invasive operations but advances an ethical justification for
certain forms of covert action.
PART
VII. COUNTERINTELLIGENCE
Introduction
................................295
23.
Cold War Spies: Why They Spied and How They Got Caught
...........302
Stan A. Taylor and Daniel Snow
Why do some people commit treason against their own country? Taylor and Snow ex¬
amine this question and find that the answer is simple enough: for money.
*24. Treachery Inside the CIA
.........................312
Senate Select Committee on Intelligence
The Senate intelligence oversight committee reports on the Ames counterintelligence
failure, the most significant act of treachery inside the CIA since its founding in
1947.
25.
Counterintelligence: The Broken Triad
....................324
Frederick L.
Wettering
An expert on counterintelligence formerly with the
CIA, Wettering
sees U.S. counterin¬
telligence as a discipline in disarray and in need of radical reform.
PART
VIII.
ACCOUNTABILITY AND CIVIL LIBERTIES
Introduction
................................341
26.
Intelligence: Welcome to the American Government
..............347
Gregory F. Treverton
Treverton explores the merits of viewing intelligence organizations as a regular part of
Americas government, as subject to constitutional safeguards as any other department
or agency.
27.
Unleashing the Rogue Elephant: September
11
and Letting the CIA Be the CIA
. . . 366
Frederick P. Hitz
In hopes of maintaining accountability without stifling the effectiveness of intelligence
officers, intelligence reformers and anti-reformers have debated the proper level of su¬
pervision of the CIA. Hitz argues that the leash on the CIA is too tight and suggests ways
to improve effectiveness without eroding civil liberties.
28.
Ethics and Intelligence
..........................374
E. Drexel Godfrey, Jr.
Godfrey maintains that even in the dark domain of intelligence one must have certain
limits of restraint
—
at least in nations like the United States that have long displayed a
concern for morality in the making of foreign policy.
*
29.
Another System of Oversight: Intelligence and the Rise of Judicial Intervention.
. . 384
Frederic F.
Manget
The judicial branch of government is a latecomer to the world of intelligence, but, as
Manget
notes, it is now very much a part of that world as the courts provide yet another
check on intelligence abuse.
30.
Congressional Supervision of America s Secret Agencies: The Experience and
Legacy of the Church Committee
......................391
Loch K. Johnson
A former assistant to Senator Frank Church, who led the Senate inquiry into alleged
CIA abuses of power in
1975,
Johnson reviews the experiences of that investigation and
gauges the contribution made by the Church Committee.
31.
Warrantless Wiretaps
...........................404
Yale University School of Law Symposium (Alan Dershowitz, Senator Conrad Bums,
John J. Donohue, David B. Rivkin, Jr., Dakota Rudesill, Stephen
A. Vaden,
and
Loch K. Johnson)
This selection presents a range of views on the propriety of NSA warrantless wiretap¬
ping, a subject that became controversial when the second Bush Administration by¬
passed the law that requires warrants for electronic eavesdropping.
PART IX. INTELLIGENCE ACTIVITIES IN THE AFTERMATH OF THE
9/11
AND WMD INTELLIGENCE FAILURES
Introduction
................................413
*32.
9/11
Intelligence Failure
..........................417
Kean Commission
The
9/11
Commission, led by former New Jersey Governor Thomas H. Kean, wrote a
rare best-selling government document that highlighted intelligence mistakes made
prior to the
9/11
attacks and suggested how to improve Americas security against ter¬
rorism.
*33. WMD Intelligence Failure
.........................459
Silberman-Robb Commission
A second federal commission, led by a U.S. senator and a judge, surveyed the intelli¬
gence errors associated with the faulty prediction of WMDs in Iraq and offered recom¬
mendations to improve America s intelligence capabilities.
*34. Institutional Origins of the
9/11
Intelligence Failure
..............479
Amy B. Zegart
Professor Zegart finds that the fragmented nature of the federal government contrib¬
uted significantly to the intelligence failure of September
11, 2001.
*35. The
9/11
Attacks and Iraqi WMD Failures
..................497
Loch K. Johnson
This selection reviews the errors that contributed to the twin intelligence failures re¬
lated to the
9/11
attacks and the incorrect estimates about WMDs in Iraq.
PART X. INTELLIGENCE IN OTHER LANDS
Introduction
................................506
36.
The Heritage and Future of the Russian Intelligence Community
.........510
Robert W. Pringle
In this postmortem of the KGB, Pringle describes how it kept Soviet citizens in line and
protected the regime from both internal and external political threats. He also describes
the difficult task facing the Russian government as it creates new intelligence organiza¬
tions from the remnants of the KGB.
37.
Controlling Intelligence in New Democracies
.................516
Thomas C.
Brumau
Bruneau describes an issue that is often overlooked in the literature on transitions to
democracy: the reform of intelligence organizations and their role in fledgling democ¬
racies.
*38. The British Experience With Intelligence Failure
...............526
Butler Panel of Inquiry
A British investigation into intelligence failures regarding Iraqi WMD estimates pro¬
duced several recommendations for reform, outlined here.
U.S. Intelligence Leadership,
1947-2007....................... 537
The Organization of the U.S. Intelligence Community
................. 538
Intelligence Websites
............................... 539
Select Bibliography
................................ 541
Name Index
................................... 544
Subject Index
.................................. 548
xii
|
adam_txt |
Contents
About This Book
.
v
About the Editors
.xiii
About the Contributors
.xiv
Preface and Acknowledgments
.xvi
PART I. INTELLIGENCE IN THE UNITED STATES: AN INTRODUCTION
Introduction
.1
1.
The Evolution of the U.S. Intelligence Community
—
An Historical Overview
.5
Phyllis Provost McNeil
Written by an Aspin-Brown Commission staff member, this history of the U.S. intelli¬
gence community traces how today's intelligence institutions, while shaped by the Cold
War, are based on an American tradition of supporting foreign and defense policy with
clandestinely acquired information.
*2. The Study of Intelligence in Theory and Practice
.21
Len
Scott and Peter Jackson
Two British scholars review the state of intelligence research literature.
*3. A Conversation With Richard Helms, a Director of Central Intelligence
.38
Loch K. Johnson
An interview with Richard Helms in
1990
reveals the perspectives on intelligence of a fa¬
mous U.S. spy chief near the end of the Cold War.
PART II. INTELLIGENCE COLLECTION
Introduction
.49
4.
CIA and Its Discontents
.56
Patrick R. Riley
A former Directorate of Operations case officer explores whether the CIA can cope with
all the intelligence requirements placed on it since the end of the Cold War and calls for
a more discriminating list of targets for intelligence collection.
5.
Re-examining Problems and Prospects in U.S. Imagery Intelligence
.64
John M. Diamond
A perennial problem of intelligence collection is how to acquire useful knowledge from
the glut of information gathered by spy machines and human agents. This article fo¬
cuses on how to cope with the flood of photographs (or images) that pour back to the
United States from surveillance satellites.
*New in the Second Edition.
*6.
Satellite Surveillance
.76
William E.
Burrows
This selection examines the early development of satellite surveillance capabilities in
the United States.
7.
The Time of Troubles: The U.S. National Security Agency in the
Twenty-First Century
.88
Matthew M. Aid
Americas largest intelligence organization, the National Security Agency, is beset with a
variety of bureaucratic problems according to this expert on signals intelligence, who
recommends improvements in management and outreach, as well as technological
remedies.
8.
CIA's Strategic Intelligence in Iraq
.106
Richard L. Russell
This report on the CIA's performance prior to the first Gulf War gives analysts high
marks for accurate estimates of Iraqi intentions and capabilities and the performance
of U.S. forces in battle.
PART III. INTELLIGENCE ANALYSIS
Introduction
.116
9.
Analysis, War, and Decision: Why Intelligence Failures Are Inevitable
.122
Richard
K. Betts
This history of diplomatic and military affairs is riddled with instances when intelli¬
gence analysts failed to provide timely warning of what was about to unfold.
Betts
pres¬
ents a strong explanation of why intelligence failures are inevitable, as well as insights
into the myriad challenges that analysts must overcome to offer useful estimates of fu¬
ture events.
10.
Open Source Intelligence
.137
Robert D. Steele
Steele describes various types of information available on the World Wide Web and ex¬
plains how these sources can be exploited by intelligence organizations to supplement
the classified information they traditionally rely on as a basis for their estimates.
11.
A Policymaker's Perspective on Intelligence Analysis
.153
Robert D.
Blackwill
and Jack Davis
Blackwill
provides the reader a glimpse into the lives of policymakers and analysts as
they interact.
12.
Intelligence Estimates and the Decision-Maker
.160
Shlomo Gazit
Gazit highlights the importance of establishing what he describes as a "reciprocal rela¬
tionship" between analysts and policymakers and ways to bridge the gap that exists be¬
tween them.
13.
Early Warning Versus Concept: The Case of the Yom Kippur War
1973.176
Ephraim
Kahana
This study of Israeli intelligence performance prior to the
1973
Yom Kippur War de¬
scribes how the analytic framework that dominated Israeli perceptions of events in the
fall of
1973
led both analysts and officials to misinterpret information about the threats
they faced.
PART IV. THE DANGER OF INTELLIGENCE POLITICIZATION
Introduction
.189
14.
The Politicization of Intelligence
.193
Harry Howe Ransom
This overview of how politicization occurs within the intelligence community suggests
that it is inherent in the production of intelligence, because information is crucial to
gaining and preserving political power.
15.
Intelligence to Please? The Order of Battle Controversy During the Vietnam War
. . 205
James J. Wirtz
In this account of a dispute that occurred within the U.S. intelligence community on the
eve of the
1968
Tet
offensive, Wirtz explores charges made by Samuel Adams, a CIA ana¬
lyst, that a conspiracy existed to prevent accurate information about enemy troop
strength from reaching senior members of the Johnson Administration.
*16. Public Intelligence
.220
Glenn Hastedt
This chapter explores the role of leaks in the federal government
—
the unauthorized dis¬
closure of information that sometimes occurs as part of the battle over policy advocacy
in Washington, D.C.
PART V. INTELLIGENCE AND THE POLICYMAKER
Introduction
.232
17.
Intelligence and National Action
.237
Michael Herman
In this introduction to the role played by intelligence in shaping diplomacy and military
action, Herman suggests that many things can influence the making of policy in peace¬
time and war, not just information.
18.
Tribal Tongues: Intelligence Consumers, Intelligence Producers
.247
Mark M. Lowenthal
Lowenthal suggests that the different bureaucratic cultures of the policymaking and in¬
telligence communities often form a significant barrier to a close relationship between
the consumers and producers of intelligence.
*19. The Need for Policy Guidance
.255
Aspin-Brown Commission
Among the many thoughtful recommendations of the Aspin-Brown Commission were
several related to the improvement of relationships between the consumers and the pro¬
ducers of intelligence, outlined in this chapter.
PART VI: COVERT ACTION
Introduction
.260
20.
Interfering With Civil Society: CIA and KGB Covert Political Action
During the Cold War
.267
Kevin A. O'Brien
The Cold War was in large part a subterranean battle between the intelligence services
of the two superpowers, the United States and the Soviet Union, as carried out by their
premier intelligence services: the CIA and the KGB. O'Brien examines the political di¬
mension of covert actions undertaken by these two intelligence behemoths.
21.
Covert
Action:
Swampland of
American
Foreign Policy
.281
Senator Frank Church
The Chairman of the Senate Intelligence Committee that investigated intelligence
abuses in
1975-76
finds in the excesses of the CIA abroad the symptoms of an illusion of
American omnipotence that entrapped and enthralled the nation
s
presidents through¬
out the Cold War.
22.
Covert Action Can Be Just
.286
James A. Barry
Exploring the use of covert action from the point of view of just-war theory, Barry estab¬
lishes benchmarks for judging the morality of this controversial form of secret foreign
policy. He eschews highly invasive operations but advances an ethical justification for
certain forms of covert action.
PART
VII. COUNTERINTELLIGENCE
Introduction
.295
23.
Cold War Spies: Why They Spied and How They Got Caught
.302
Stan A. Taylor and Daniel Snow
Why do some people commit treason against their own country? Taylor and Snow ex¬
amine this question and find that the answer is simple enough: for money.
*24. Treachery Inside the CIA
.312
Senate Select Committee on Intelligence
The Senate intelligence oversight committee reports on the Ames counterintelligence
failure, the most significant act of treachery inside the CIA since its founding in
1947.
25.
Counterintelligence: The Broken Triad
.324
Frederick L.
Wettering
An expert on counterintelligence formerly with the
CIA, Wettering
sees U.S. counterin¬
telligence as a discipline in disarray and in need of radical reform.
PART
VIII.
ACCOUNTABILITY AND CIVIL LIBERTIES
Introduction
.341
26.
Intelligence: Welcome to the American Government
.347
Gregory F. Treverton
Treverton explores the merits of viewing intelligence organizations as a regular part of
Americas government, as subject to constitutional safeguards as any other department
or agency.
27.
Unleashing the Rogue Elephant: September
11
and Letting the CIA Be the CIA
. . . 366
Frederick P. Hitz
In hopes of maintaining accountability without stifling the effectiveness of intelligence
officers, intelligence reformers and anti-reformers have debated the proper level of su¬
pervision of the CIA. Hitz argues that the leash on the CIA is too tight and suggests ways
to improve effectiveness without eroding civil liberties.
28.
Ethics and Intelligence
.374
E. Drexel Godfrey, Jr.
Godfrey maintains that even in the dark domain of intelligence one must have certain
limits of restraint
—
at least in nations like the United States that have long displayed a
concern for morality in the making of foreign policy.
*
29.
Another System of Oversight: Intelligence and the Rise of Judicial Intervention.
. . 384
Frederic F.
Manget
The judicial branch of government is a latecomer to the world of intelligence, but, as
Manget
notes, it is now very much a part of that world as the courts provide yet another
check on intelligence abuse.
30.
Congressional Supervision of America's Secret Agencies: The Experience and
Legacy of the Church Committee
.391
Loch K. Johnson
A former assistant to Senator Frank Church, who led the Senate inquiry into alleged
CIA abuses of power in
1975,
Johnson reviews the experiences of that investigation and
gauges the contribution made by the Church Committee.
31.
Warrantless Wiretaps
.404
Yale University School of Law Symposium (Alan Dershowitz, Senator Conrad Bums,
John J. Donohue, David B. Rivkin, Jr., Dakota Rudesill, Stephen
A. Vaden,
and
Loch K. Johnson)
This selection presents a range of views on the propriety of NSA warrantless wiretap¬
ping, a subject that became controversial when the second Bush Administration by¬
passed the law that requires warrants for electronic eavesdropping.
PART IX. INTELLIGENCE ACTIVITIES IN THE AFTERMATH OF THE
9/11
AND WMD INTELLIGENCE FAILURES
Introduction
.413
*32.
9/11
Intelligence Failure
.417
Kean Commission
The
9/11
Commission, led by former New Jersey Governor Thomas H. Kean, wrote a
rare best-selling government document that highlighted intelligence mistakes made
prior to the
9/11
attacks and suggested how to improve Americas security against ter¬
rorism.
*33. WMD Intelligence Failure
.459
Silberman-Robb Commission
A second federal commission, led by a U.S. senator and a judge, surveyed the intelli¬
gence errors associated with the faulty prediction of WMDs in Iraq and offered recom¬
mendations to improve America's intelligence capabilities.
*34. Institutional Origins of the
9/11
Intelligence Failure
.479
Amy B. Zegart
Professor Zegart finds that the fragmented nature of the federal government contrib¬
uted significantly to the intelligence failure of September
11, 2001.
*35. The
9/11
Attacks and Iraqi WMD Failures
.497
Loch K. Johnson
This selection reviews the errors that contributed to the twin intelligence failures re¬
lated to the
9/11
attacks and the incorrect estimates about WMDs in Iraq.
PART X. INTELLIGENCE IN OTHER LANDS
Introduction
.506
36.
The Heritage and Future of the Russian Intelligence Community
.510
Robert W. Pringle
In this postmortem of the KGB, Pringle describes how it kept Soviet citizens in line and
protected the regime from both internal and external political threats. He also describes
the difficult task facing the Russian government as it creates new intelligence organiza¬
tions from the remnants of the KGB.
37.
Controlling Intelligence in New Democracies
.516
Thomas C.
Brumau
Bruneau describes an issue that is often overlooked in the literature on transitions to
democracy: the reform of intelligence organizations and their role in fledgling democ¬
racies.
*38. The British Experience With Intelligence Failure
.526
Butler Panel of Inquiry
A British investigation into intelligence failures regarding Iraqi WMD estimates pro¬
duced several recommendations for reform, outlined here.
U.S. Intelligence Leadership,
1947-2007. 537
The Organization of the U.S. Intelligence Community
. 538
Intelligence Websites
. 539
Select Bibliography
. 541
Name Index
. 544
Subject Index
. 548
xii |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author_GND | (DE-588)132480220 |
building | Verbundindex |
bvnumber | BV023092517 |
callnumber-first | J - Political Science |
callnumber-label | JK468 |
callnumber-raw | JK468.I6 |
callnumber-search | JK468.I6 |
callnumber-sort | JK 3468 I6 |
callnumber-subject | JK - United States |
classification_rvk | MG 70950 |
ctrlnum | (OCoLC)163616263 (DE-599)BVBBV023092517 |
dewey-full | 327.12 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 327 - International relations |
dewey-raw | 327.12 |
dewey-search | 327.12 |
dewey-sort | 3327.12 |
dewey-tens | 320 - Political science (Politics and government) |
discipline | Politologie |
discipline_str_mv | Politologie |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02183nam a2200589zc 4500</leader><controlfield tag="001">BV023092517</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090406 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">080122s2008 xxua||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2007299830</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA761141</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0195332474</subfield><subfield code="c">pbk.</subfield><subfield code="9">0-19-533247-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780195332476</subfield><subfield code="9">978-0-19-533247-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)163616263</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV023092517</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">JK468.I6</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">327.12</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MG 70950</subfield><subfield code="0">(DE-625)122860:12227</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Intelligence and national security</subfield><subfield code="b">the secret world of spies : an anthology</subfield><subfield code="c">ed. with introd. by Loch K. Johnson, James J. Wirtz</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">Oxford Univ. Press</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVI, 553 S.</subfield><subfield code="b">Ill.</subfield><subfield code="c">26 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and indexes</subfield></datafield><datafield tag="610" ind1="2" ind2="4"><subfield code="a">United States</subfield><subfield code="b">Central Intelligence Agency</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intelligence service</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intelligence service</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security</subfield><subfield code="x">Government policy</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Spies</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Spionage</subfield><subfield code="0">(DE-588)4056287-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Geheimdienst</subfield><subfield code="0">(DE-588)4019737-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Spionage</subfield><subfield code="0">(DE-588)4056287-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Geheimdienst</subfield><subfield code="0">(DE-588)4019737-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Johnson, Loch K.</subfield><subfield code="d">1942-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)132480220</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016295367&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016295367</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
geographic | USA USA (DE-588)4078704-7 gnd |
geographic_facet | USA |
id | DE-604.BV023092517 |
illustrated | Illustrated |
index_date | 2024-07-02T19:41:36Z |
indexdate | 2024-07-09T21:10:50Z |
institution | BVB |
isbn | 0195332474 9780195332476 |
language | English |
lccn | 2007299830 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016295367 |
oclc_num | 163616263 |
open_access_boolean | |
owner | DE-12 DE-355 DE-BY-UBR |
owner_facet | DE-12 DE-355 DE-BY-UBR |
physical | XVI, 553 S. Ill. 26 cm |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Oxford Univ. Press |
record_format | marc |
spelling | Intelligence and national security the secret world of spies : an anthology ed. with introd. by Loch K. Johnson, James J. Wirtz 2. ed. New York Oxford Univ. Press 2008 XVI, 553 S. Ill. 26 cm txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and indexes United States Central Intelligence Agency Politik Intelligence service Intelligence service United States National security National security Government policy United States Spies Spionage (DE-588)4056287-6 gnd rswk-swf Geheimdienst (DE-588)4019737-2 gnd rswk-swf USA USA (DE-588)4078704-7 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content USA (DE-588)4078704-7 g Spionage (DE-588)4056287-6 s DE-604 Geheimdienst (DE-588)4019737-2 s Johnson, Loch K. 1942- Sonstige (DE-588)132480220 oth Digitalisierung UB Regensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016295367&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Intelligence and national security the secret world of spies : an anthology United States Central Intelligence Agency Politik Intelligence service Intelligence service United States National security National security Government policy United States Spies Spionage (DE-588)4056287-6 gnd Geheimdienst (DE-588)4019737-2 gnd |
subject_GND | (DE-588)4056287-6 (DE-588)4019737-2 (DE-588)4078704-7 (DE-588)4143413-4 |
title | Intelligence and national security the secret world of spies : an anthology |
title_auth | Intelligence and national security the secret world of spies : an anthology |
title_exact_search | Intelligence and national security the secret world of spies : an anthology |
title_exact_search_txtP | Intelligence and national security the secret world of spies : an anthology |
title_full | Intelligence and national security the secret world of spies : an anthology ed. with introd. by Loch K. Johnson, James J. Wirtz |
title_fullStr | Intelligence and national security the secret world of spies : an anthology ed. with introd. by Loch K. Johnson, James J. Wirtz |
title_full_unstemmed | Intelligence and national security the secret world of spies : an anthology ed. with introd. by Loch K. Johnson, James J. Wirtz |
title_short | Intelligence and national security |
title_sort | intelligence and national security the secret world of spies an anthology |
title_sub | the secret world of spies : an anthology |
topic | United States Central Intelligence Agency Politik Intelligence service Intelligence service United States National security National security Government policy United States Spies Spionage (DE-588)4056287-6 gnd Geheimdienst (DE-588)4019737-2 gnd |
topic_facet | United States Central Intelligence Agency Politik Intelligence service Intelligence service United States National security National security Government policy United States Spies Spionage Geheimdienst USA Aufsatzsammlung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016295367&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT johnsonlochk intelligenceandnationalsecuritythesecretworldofspiesananthology |