To see the other types of publications on this topic, follow the link: Intelligence Establishment.

Books on the topic 'Intelligence Establishment'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 29 books for your research on the topic 'Intelligence Establishment.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

United States. Department of State. Emergence of the intelligence establishment. Washington: U.S. G.P.O., 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fleck, James. Postscript to development and establishment in artificial intelligence. Edinburgh: University of Edinburgh. Department of Business Studies, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Philip, Rosen. The Communications Security Establishment: Canada's most secret intelligence agency. [Ottawa]: Library of Parliament, Research Branch, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Michel, Gratton, ed. Spyworld: Inside the Canadian and American intelligence establishments. Toronto, Ont: Doubleday Canada, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Snediker, Ted R. Joint intelligence in a changing defense establishment: The case of counterintelligence. Carlisle Barracks, Pa: U.S. Army War College, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

H, Immerman Richard, ed. Ike's spies: Eisenhower and the espionage establishment. New York: Anchor Books, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Avenant, T. J. The establishment of an individual intelligence scale for adult South Africans: Report on an exploratory study conducted with the WAIS-R on a sample of Blacks. Pretoria: Human Sciences Research Council, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

United States. National Security Agency/Central Security Service. Center for Cryptologic History., ed. The quest for cryptologic centralization and the establishment of NSA: 1940-1952. [Fort George G. Meade, Md.]: Center for Cryptologic History, National Security Agency, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bowsher, Charles A. Establishment of an Inspector General at the Central Intelligence Agency: Statement of Charles A. Bowsher before the Select Committee on Intelligence, United States Senate. [Washington, D.C.?]: U.S. General Accounting Office, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Buus, German. Global distribution systems in the establishment of intelligent agents. London: LCP, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Partners at the creation: The men behind postwar Germany's defense and intelligence establishments. Annapolis, MD: Naval Institute Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Law, Darwinism & public education: The establishment clause and the challenge of intelligent design. Lanham, Md: Rowman & Littlefield, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Ransom, Harry Howe. The Intelligence Establishment. Harvard University Press, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Frost, Mike. Spyworld: Inside the Canadian & American Intelligence Establishments. Diane Pub Co, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Foreign Relations Of The United States 1945-1950, Emergence of the Intelligence Establishment: Emergence Of The Intelligence Establishment (Foreign Relations of the United States). United States Government Printing, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Ike's Spies: Eisenhower and the Espionage Establishment. University Press of Mississippi, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Views of many eminent Canadians on the establishment of an Imperial Intelligence Service on a comprehensive scale: Letter addressed to the Right Honorable the Earl of Elgin, secretary of state for the colonies. [Ottawa?: s.n.], 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Sanders, Rebecca. Surveillance. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190870553.003.0005.

Full text
Abstract:
This chapter explores shifting patterns of intelligence surveillance in the United States. The Fourth Amendment protects Americans from unreasonable search and seizure without a warrant, but foreign spying is subject to few constraints. During the Cold War, surveillance power was abused for political purposes. Operating in a culture of secrecy, American intelligence agencies engaged in extensive illegal domestic spying. The intelligence scandals of the 1970s revealed these abuses, prompting new laws, notably the Foreign Intelligence Surveillance Act. Fearing further recrimination, the national security establishment increasingly demanded legal cover. After 9/11, Congress expanded lawful surveillance powers with the PATRIOT Act. Meanwhile, the Bush administration directed the National Security Agency to conduct warrantless domestic wiretapping. To justify this program, officials sought to redefine unconstrained foreign surveillance to subsume previously protected communications. The Obama administration continued to authorize mass surveillance and data mining programs and legally rationalize bulk collection of Americans’ data.
APA, Harvard, Vancouver, ISO, and other styles
19

Ahmad, Muhammad Idrees. The Road to Iraq. Edinburgh University Press, 2014. http://dx.doi.org/10.3366/edinburgh/9780748693023.001.0001.

Full text
Abstract:
The Road to Iraq is an empirical investigation that explains the causes of the Iraq War, identifies its main agents, and demonstrates how the war was sold to decision makers and by decision makers to the public. It shows how a small but ideologically coherent and socially cohesive group of determined political agents used the contingency of 9/11 to outflank a sceptical foreign policy establishment, military brass and intelligence apparatus and provoked a war that has had disastrous consequences.
APA, Harvard, Vancouver, ISO, and other styles
20

The establishment of a great imperial intelligence union as a means of promoting the consolidation of the Empire: An address delivered by Sir Sandford Fleming before the Eighty Club, on July 20, 1906. [Edinburgh?: s.n., 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Johnson, David K. America’s Cold War Empire. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252037726.003.0003.

Full text
Abstract:
This chapter analyzes how a fear of homosexuals characterized American Cold War security concerns, leading to the establishment of policies, procedures, and personnel throughout the U.S. government to uncover and remove all suspected gays and lesbians from public service. This state-sponsored homophobic panic was exported to America's Western allies and international organizations such as the United Nations, the International Monetary Fund, and the World Bank. The chapter shows how U.S. officials pressured foreign officials and the heads of international organizations to adopt American-style security procedures and purge their agencies of anyone guilty of homosexual conduct. Fearing the loss of either American financial aid or contact with the U.S. intelligence-gathering apparatus, most sought to comply.
APA, Harvard, Vancouver, ISO, and other styles
22

Barton, Mary S. Counterterrorism Between the Wars. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780198864042.001.0001.

Full text
Abstract:
This is a book about terrorism, weapons, and diplomacy in the interwar years between the First and Second World Wars. It charts the convergence of the manufacture and trade of arms; diplomacy among the Great Powers and the domestic politics within them; the rise of national liberation and independence movements; and the burgeoning concept and early institutions of international counterterrorism. Key themes include: a transformation in meaning and practice of terrorism; the inability of Great Powers—namely, Great Britain, the United States, France—to harmonize perceptions of interest and the pursuit of common interests; the establishment of the tools and infrastructure of modern intelligence—including the U.S.-U.K. cooperation that would evolve into the Five Eyes intelligence alliance; and the nature of peacetime in the absence of major wars. Particular emphasis is given to British attempts to quell revolutionary nationalist movements in India and elsewhere in its empire, and to the Great Powers’ combined efforts to counter the activities of the Communist International. The facilitating roles of the Paris Peace Conference and League of Nations are explored here, in the context of the Arms Traffic Convention of 1919, the Arms Traffic Conference of 1925, and the 1937 Terrorism Convention.
APA, Harvard, Vancouver, ISO, and other styles
23

Critchfield, James H. Partners at the Creation: The Men Behind Postwar Germany's Defense and Intelligence Establishments. US Naval Institute Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Abraham, Sunil. Systematic Government Access to Private-Sector Data in India. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190685515.003.0012.

Full text
Abstract:
This chapter focuses on India’s policies and practices regarding systematic government access to private-sector data. India does not have many laws that explicitly prescribe or prohibit systematic government access to private-sector data apart from provisions in laws such as the Information Technology Act, Anti-Money Laundering Act, and Epidemic Diseases Act. Nevertheless, the appetite in some parts of the government for systematic access appears to be growing. In February 2012, the Intelligence Bureau wrote to the Department of Telecom demanding that telecom operators and ISPs cooperate to enable comprehensive real-time tracking of Internet usage on mobile phones. This included the establishment of a core group “for finalisation of Internet Protocol Detail Record (IPDR) for Internet and GPRS service, and standardisation of parameters that will have to be stored by mobile phone companies….” The chapter also discusses proposals for the NATGRID and the Comprehensive Monitoring System.
APA, Harvard, Vancouver, ISO, and other styles
25

Curtin, Deirdre. Brexit and the EU Area of Freedom, Security, and Justice. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198811763.003.0009.

Full text
Abstract:
UK involvement in the EU Area of Freedom, Security, and Justice (AFSJ) has been patchy. It never joined the Schengen border-free zone, and when in 2014 it exercised a block exit from all AFSJ measures, it selectively rejoined a substantial number. Even if partially outside, the UK has been a leader inside. Advanced intelligence capabilities meant it provided important support to the functioning of agencies such as Europol and UK laws inspired EU laws, for example, on data retention. The need to preserve some pragmatic forms of cooperation between the UK and the EU is obvious and shared by the UK security establishment. There is a partial institutional precedent . When Denmark rejected participation in Europol in a popular referendum, the Danish government obtained a deal from the EU institutions which allows it to remain associated to Europol as a ‘third country’ (and a Member State). The bespoke Brexit reality may prove even more complex.
APA, Harvard, Vancouver, ISO, and other styles
26

Eriksson, Par, Nils Marius Rekkedal, and Wegger Strommen. Intelligence in Peace Support Operations: A Joint Report by the Swedish and Norwegian Defence Research Establishments. Diane Pub Co, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Fuentecilla, Jose V. Learning How to Lobby. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252037580.003.0007.

Full text
Abstract:
This chapter focuses on the lobbying efforts of political exiles. Marcos and his military establishment were essential to the considerable U.S. interests in the Philippines. In turn, Marcos' military had an ongoing need for hardware and training from the United States. This symbiotic relationship dictated the ebb and flow of military aid money each year. By portraying U.S.-supplied security forces as the chief instrument keeping Marcos in power, the opposition hoped to either eliminate or reduce the amount of military aid earmarked for the Philippines. During deliberations on the 1973 aid bill, an amendment was introduced by Senator James Abourezk of South Dakota on December 5, 1973, that would deny assistance to any country that imprisoned its citizens for political purposes. An earlier Abourezk amendment to the Foreign Assistance Act of 1973 would have prohibited the use of aid funds for police, prisons, internal intelligence, or the maintenance of internal security forces. Both amendments were defeated. Given the United States' utter dependence on its Philippine bases, it was unrealistic to think that Congress would risk losing them by cutting off all aid to Marcos. The best the exile lobbyists could hope for was a moderation in the regime's behavior, such as releasing political prisoners or dropping the use of torture.
APA, Harvard, Vancouver, ISO, and other styles
28

Turner, Alicia, Laurence Cox, and Brian Bocking. The Irish Buddhist. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190073084.001.0001.

Full text
Abstract:
The Irish Buddhist tells the story of a poor Irishman who worked his way across America as a migrant worker, became one of the very first Western Buddhist monks, and traveled the length and breadth of Asia, from Burma and present-day Thailand to China and Japan, and from India and Sri Lanka to Singapore and Australia. Defying racial boundaries, he scandalized the colonial establishment of the 1900s. As a Buddhist monk, he energetically challenged the values and power of the British empire. U Dhammaloka was a radical celebrity who rallied Buddhists across Asia, set up schools, and argued down Christian missionaries—often using Western atheist arguments. He was tried for sedition, tracked by police and intelligence services, and “died” at least twice. His early years and final days are shrouded in mystery, despite his adept use of mass media. His story illuminates the forgotten margins and interstices of imperial power, the complexities of class, ethnicity, and religious belonging in colonial Asia, and the fluidity of identity in the high Victorian period. Too often, the story of the pan-Asian Buddhist revival movement and Buddhism’s remaking as a world religion has been told “from above,” highlighting scholarly writers, middle-class reformers, and ecclesiastical hierarchies. By contrast, Dhammaloka’s adventures “from below” highlight the changing and contested meanings of Buddhism in colonial Asia. They offer a window into the worlds of ethnic minorities and diasporas, transnational networks, poor whites, and social movements, all developing different visions of Buddhist and post-imperial modernities.
APA, Harvard, Vancouver, ISO, and other styles
29

O'Hara, Kieron, Wendy Hall, and Vinton Cerf. Four Internets. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197523681.001.0001.

Full text
Abstract:
The book describes the Internet, and how Internet governance prevents it fragmenting into a ‘Splinternet’. Four opposing ideologies about how data flows around the network have become prominent because they are (a) implemented by technical standards, and (b) backed by influential geopolitical entities. Each of these specifies an ‘Internet’, described in relation to its implementation by a specific geopolitical entity. The four Internets of the title are: the Silicon Valley Open Internet, developed by pioneers of the Internet in the 1960s, based on principles of openness and efficient dataflow; the Brussels Bourgeois Internet, exemplified by the European Union, with a focus on human rights and legal administration; the DC Commercial Internet, exemplified by the Washington establishment and its focus on property rights and market solutions; and the Beijing Paternal Internet, exemplified by the Chinese government’s control of Internet content. These Internets have to coexist if the Internet as a whole is to remain connected. The book also considers the weaponization of the hacking ethic as the Moscow Spoiler model, exemplified by Russia’s campaigns of misinformation at scale; this is not a vision of the Internet, but is parasitic on the others. Each of these ideologies is illustrated by a specific policy question. Potential future directions of Internet development are considered, including the policy directions that India might take, and the development of technologies such as artificial intelligence, smart cities, the Internet of Things, and social machines. A conclusion speculates on potential future Internets that may emerge alongside those described.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography