This book questions the conventional wisdom about one of the most controversial episodes in the Cold War, and tells the story of the CIA's backing of the Congress for Cultural Freedom.
This book questions the conventional wisdom about one of the most controversial episodes in the Cold War, and tells the story of the CIA's backing of the Congress for Cultural Freedom.
This book is the first full history of South African intelligence and provides a detailed examination of the various stages in the evolution of South Africa's intelligence organizations and structures.
This book is the first full history of South African intelligence and provides a detailed examination of the various stages in the evolution of South Africa's intelligence organizations and structures.
This book is the first full history of South African intelligence and provides a detailed examination of the various stages in the evolution of South Africa's intelligence organizations and structures.
This book examines how international intelligence cooperation has come to prominence post-9/11 and introduces the main accountability, legal and human rights challenges that it poses.
This book examines how international intelligence cooperation has come to prominence post-9/11 and introduces the main accountability, legal and human rights challenges that it poses.
The once-neglected study of counter-insurgency operations has recently emerged as an area of central concern for Western governments and their military organizations.
The once-neglected study of counter-insurgency operations has recently emerged as an area of central concern for Western governments and their military organizations.
This book critically analyses the concept of the intelligence cycle, highlighting the nature and extent of its limitations and proposing alternative ways of conceptualising the intelligence process.
This book critically analyses the concept of the intelligence cycle, highlighting the nature and extent of its limitations and proposing alternative ways of conceptualising the intelligence process.
This book tracks post 9/11 developments in national security and policing intelligence and their relevance to new emerging areas of intelligence practice such as: corrections, biosecurity, private industry and regulatory environments.
This book tracks post 9/11 developments in national security and policing intelligence and their relevance to new emerging areas of intelligence practice such as: corrections, biosecurity, private industry and regulatory environments.
This book analyses how banks implement counter-terrorist financing measures and experiment with technologies to assess risks and make security decisions.
This is the first book to analyze how the technology to alter images and rapidly distribute them can be used for propaganda and to support deception operations.
This is the first book to analyze how the technology to alter images and rapidly distribute them can be used for propaganda and to support deception operations.
This book starts from the proposition that the field of intelligence lacks any systematic ethical review, and then develops a framework based on the notion of harm and the establishment of Just Intelligence Principles.
This book starts from the proposition that the field of intelligence lacks any systematic ethical review, and then develops a framework based on the notion of harm and the establishment of Just Intelligence Principles.
Professor Sheldon uses the modern concept of the intelligence cycle to trace intelligence activities in Rome whether they were done by private citizens, the government, or the military.
Professor Sheldon uses the modern concept of the intelligence cycle to trace intelligence activities in Rome whether they were done by private citizens, the government, or the military.
This fascinating new study shows how the CIA and the British secret service, in collaboration with the military alliance NATO and European military secret services, set up a network of clandestine anti-communist armies in Western Europe after World War II.
This fascinating new study shows how the CIA and the British secret service, in collaboration with the military alliance NATO and European military secret services, set up a network of clandestine anti-communist armies in Western Europe after World War II.