Listing 1 - 7 of 7 |
Sort by
|
Choose an application
Polemology --- inlichtingendiensten --- United States --- Intelligence service --- -#KVHA:Verenigde Staten; Staatsveiligheid --- Counter intelligence --- Counterespionage --- Counterintelligence --- Intelligence community --- Secret police (Intelligence service) --- Public administration --- Research --- Disinformation --- Secret service --- National Security Council (U.S.) --- -United States. Central Intelligence Agency --- -United States. Joint Chiefs of Staff --- -United States. --- United States. --- Sovet nat︠s︡ionalʹnoĭ bezopasnosti SShA --- Agentstvo nat︠s︡ionalʹnoĭ bezopasnosti (U.S.) --- NSC --- ANB --- History --- -History --- #KVHA:Verenigde Staten; Staatsveiligheid --- Joint United States Chiefs of Staff --- JCS --- Agjencia Qendrore e Inteligjencës --- Central Intelligence Agency (U.S.) --- CIA (Central Intelligence Agency (U.S.)) --- CIP (United States. Centrālās izlūkošanas pārvalde) --- Mei-kuo chung yang chʻing pao chü --- National Security Council (U.S.). --- Si Aing Ei --- T︠S︡entralʹnoe razvedyvatelʹnoe upravlenie SShA --- T︠S︡RU SShA --- T︠S︡RU (T︠S︡entralʹnoe razvedyvatelʹnoe upravlenie SShA) --- ЦРУ США --- ЦРУ (Центральное разведывательное управление США) --- Центральное разведывательное управление США --- ארצות הברית. --- 美國. --- History. --- J.C.S. --- United States. Central Intelligence Agency --- United States. Joint Chieffs of Staff --- United States. - Central Intelligence Agency - History. --- United States. - Joint Chiefs of Staff - History. --- CIA (Central Intelligence Agency) --- United States of America
Choose an application
In this pathbreaking book, Amy Zegart provides the first scholarly examination of the intelligence failures that preceded September 11. Until now, those failures have been attributed largely to individual mistakes. But Zegart shows how and why the intelligence system itself left us vulnerable. Zegart argues that after the Cold War ended, the CIA and FBI failed to adapt to the rise of terrorism. She makes the case by conducting painstaking analysis of more than three hundred intelligence reform recommendations and tracing the history of CIA and FBI counterterrorism efforts from 1991 to 2001, drawing extensively from declassified government documents and interviews with more than seventy high-ranking government officials. She finds that political leaders were well aware of the emerging terrorist danger and the urgent need for intelligence reform, but failed to achieve the changes they sought. The same forces that have stymied intelligence reform for decades are to blame: resistance inside U.S. intelligence agencies, the rational interests of politicians and career bureaucrats, and core aspects of our democracy such as the fragmented structure of the federal government. Ultimately failures of adaptation led to failures of performance. Zegart reveals how longstanding organizational weaknesses left unaddressed during the 1990's prevented the CIA and FBI from capitalizing on twenty-three opportunities to disrupt the September 11 plot. Spying Blind is a sobering account of why two of America's most important intelligence agencies failed to adjust to new threats after the Cold War, and why they are unlikely to adapt in the future.
Intelligence service --- September 11 Terrorist Attacks, 2001. --- Terrorism --- Government policy --- United States. --- TerrorismGovernment policyUnited States. --- 9/11 Terrorist Attacks, 2001 --- 911 Terrorist Attacks, 2001 --- Attack on America, 2001 (September 11 Terrorist Attacks) --- Nine-Eleven Terrorist Attacks, 2001 --- Pentagon-World Trade Center Terrorist Attacks, 2001 --- Sept. 11 Terrorist Attacks, 2001 --- September 11 Terror Attacks, 2001 --- September 11 Terrorism, 2001 --- Terrorist Attacks, September 11, 2001 --- World Trade Center-Pentagon Terrorist Attacks, 2001 --- FBI --- FBR --- Federal Bureau of Investigation (U.S.) --- Federalʹnoe bi︠u︡ro rassledovaniĭ v SShA --- Agjencia Qendrore e Inteligjencës --- Central Intelligence Agency (U.S.) --- CIA (Central Intelligence Agency (U.S.)) --- CIP (United States. Centrālās izlūkošanas pārvalde) --- Mei-kuo chung yang chʻing pao chü --- National Security Council (U.S.). --- Si Aing Ei --- T︠S︡entralʹnoe razvedyvatelʹnoe upravlenie SShA --- T︠S︡RU SShA --- T︠S︡RU (T︠S︡entralʹnoe razvedyvatelʹnoe upravlenie SShA) --- ЦРУ США --- ЦРУ (Центральное разведывательное управление США) --- Центральное разведывательное управление США --- ארצות הברית. --- 美國. --- Hijacking of aircraft --- National Security Council (U.S.) --- CIA (Central Intelligence Agency) --- BPB2211 --- Comité permanent de Contrôle des services de renseignement et de sécurité (Comité permanent R) --- Vast Comité van Toezicht op de inlichtingen- en veiligheidsdiensten (Vast Comité I)
Choose an application
In the past, the chief concern used to be whether a foreign dictator would nationalize the country's oil industry. Today, political risk stems from a widening array of agents, from Twitter users and terrorists to hackers and insurgents. This means that in today's globalized world there are no 'safe' bets. Political risk affects companies and organisations of all sizes, operating everywhere from London to Lahore, even if they don't know it. This book investigates and analyses this shifting landscape, suggests what businesses can do to navigate it, and explains how all of us can better understand these rapidly changing geopolitical dynamics.
Choose an application
Spying has never been more ubiquitous--or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. Amy Zegart separates fact from fiction as she offers an engaging and enlightening account of the past, present, and future of American espionage as it faces a revolution driven by digital technology. Drawing on decades of research and hundreds of interviews with intelligence officials, Zegart provides a history of U.S. espionage, from George Washington's Revolutionary War spies to today's spy satellites; examines how fictional spies are influencing real officials; gives an overview of intelligence basics and life inside America's intelligence agencies; explains the deadly cognitive biases that can mislead analysts; and explores the vexed issues of traitors, covert action, and congressional oversight. Most of all, Zegart describes how technology is empowering new enemies and opportunities, and creating powerful new players, such as private citizens who are successfully tracking nuclear threats using little more than Google Earth. And she shows why cyberspace is, in many ways, the ultimate cloak-and-dagger battleground, where nefarious actors employ deception, subterfuge, and advanced technology for theft, espionage, and information warfare. A fascinating and revealing account of espionage for the digital age, Spies, Lies, and Algorithms is essential reading for anyone who wants to understand the reality of spying today. [Provided by publisher]
INTELLIGENCE SERVICE--USA --- CYBER INTELLIGENCE (COMPUTER SECURITY)--USA --- Polemology --- United States --- Intelligence service --- Cyber intelligence (Computer security) --- Terrorism --- Public-private sector cooperation --- Cyber spying --- Cyberintelligence (Computer security) --- Cyberspying --- Intelligence, Cyber (Computer security) --- Computer security --- Government policy --- Abuse of authority. --- Al-Qaeda. --- Assassination. --- Atomic spies. --- Bribery. --- Bureau of Intelligence and Research. --- CIA Counterintelligence. --- Central Intelligence Agency. --- Circumstantial evidence. --- Clandestine HUMINT. --- Clandestine cell system. --- Classified information. --- Computer worm. --- Confirmation bias. --- Conspiracy theory. --- Counter-insurgency. --- Counter-terrorism. --- Counterintelligence. --- Counterterrorism Center. --- Covert operation. --- Cryptanalysis. --- Cryptography. --- Cyber threat intelligence. --- Cyber-attack. --- Demagogue. --- Denial and deception. --- Denial-of-service attack. --- Deterrence theory. --- Director of Central Intelligence. --- Director of National Intelligence. --- Director of the Central Intelligence Agency. --- Disinformation. --- Double agent. --- Drug lord. --- Electoral fraud. --- Encryption. --- Espionage. --- Fabricator (intelligence). --- Fake Claims. --- Generative Adversarial Networks. --- Hacking tool. --- Identity theft. --- Imminent Threat. --- Information asymmetry. --- Information overload. --- Information warfare. --- Insider threat. --- Insurgency. --- Intelligence Authorization Act. --- Intelligence Reform and Terrorism Prevention Act. --- Intelligence agency. --- Intelligence analysis. --- Intelligence officer. --- Iran–Contra affair. --- Jihadism. --- KGB. --- Lie detection. --- MafiaBoy. --- Malware. --- Mole (espionage). --- Mossad. --- NSA warrantless surveillance (2001–07). --- National Security Archive. --- National security. --- Nuclear warfare. --- On Intelligence. --- Osama bin Laden. --- Palmer Raids. --- Persecution. --- Policy. --- Political corruption. --- Political crime. --- Political repression. --- Rogue state. --- Sabotage. --- Sanctions against Iran. --- Secret Intelligence Service. --- Security agency. --- Sensitive Compartmented Information. --- Smuggling. --- Spy fiction. --- Spycatcher. --- Spymaster. --- State secrets privilege. --- Stuxnet. --- Subversion. --- Targeted killing. --- Terrorism. --- The Shadow Factory. --- Theft. --- Think Secret. --- Top Secret America. --- Trade secret. --- Undercover operation. --- United States Intelligence Community. --- United States State Department list of Foreign Terrorist Organizations. --- Vulnerability (computing). --- Warfare. --- Watergate scandal. --- Weapon of mass destruction. --- Intelligence service - United States --- Terrorism - Government policy - United States --- Public-private sector cooperation - United States --- Cyber intelligence (Computer security) - United States --- United States of America
Choose an application
Choose an application
Amy Zegart examines the weaknesses of US intelligence oversight and why those deficiencies have persisted, despite the unprecedented importance of intelligence in today's environment. She argues that many of the biggest oversight problems lie with Congress?the institution, not the parties or personalities?showing how Congress has collectively and persistently tied its own hands in overseeing intelligence.
Choose an application
Offensive cyber operations have become increasingly important elements of U.S. national security policy. From the deployment of Stuxnet to disrupt Iranian centrifuges to the possible use of cyber methods against North Korean ballistic missile launches, the prominence of offensive cyber capabilities as instruments of national power continues to grow. Yet conceptual thinking lags behind the technical development of these new weapons. How might offensive cyber operations be used in coercion or conflict ? What strategic considerations should guide their development and use ? What intelligence capabilities are required for cyber weapons to be effective ? How do escalation dynamics and deterrence work in cyberspace ? What role does the private sector play ? In this volume, leading scholars and practitioners explore these and other vital questions about the strategic uses of offensive cyber operations. The contributions to this groundbreaking volume address the key technical, political, psychological, and legal dimensions of the fast-changing strategic landscape.
Listing 1 - 7 of 7 |
Sort by
|