You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Decision makers matching wits with an adversary want intelligence—good, relevant information to help them win. Intelligence can gain these advantages through directed research and analysis, agile collection, and the timely use of guile and theft. Counterintelligence is the art and practice of defeating these endeavors. Its purpose is the same as that of positive intelligence—to gain advantage—but it does so by exploiting, disrupting, denying, or manipulating the intelligence activities of others. The tools of counterintelligence include security systems, deception, and disguise: vaults, mirrors, and masks. In one indispensable volume, top practitioners and scholars in the field explain...
Countering the threat of improvised explosive devices (IED)s is a challenging, multilayered problem. The IED itself is just the most publicly visible part of an underlying campaign of violence, the IED threat chain. Improving the technical ability to detect the device is a primary objective, but understanding of the goals of the adversary; its sources of materiel, personnel, and money; the sociopolitical environment in which it operates; and other factors, such as the cultural mores that it must observe or override for support, may also be critical for impeding or halting the effective use of IEDs. Disrupting Improvised Explosive Device Terror Campaigns focuses on the human dimension of terror campaigns and also on improving the ability to predict these activities using collected and interpreted data from a variety of sources. A follow-up to the 2007 book, Countering the Threat of Improvised Explosive Devices: Basic Research Opportunities, this book summarizes two workshops held in 2008.
None
In Spies for Hire, investigative reporter Tim Shorrock lifts the veil off a major story the government doesn't want us to know about -- the massive outsourcing of top secret intelligence activities to private-sector contractors. Running spy networks overseas. Tracking down terrorists in the Middle East. Interrogating enemy prisoners. Analyzing data from spy satellites and intercepted phone calls. All of these are vital intelligence tasks that traditionally have been performed by government officials accountable to Congress and the American people. But that is no longer the case. Starting during the Clinton administration, when intelligence budgets were cut drastically and privatization of go...
A revealing account of the court that put Chicago in the headlines
"Published in cooperation with NATO Emerging Security Challenges Division"--T.p.
As you read this your computer is in jeopardy of being hacked and your identity being stolen. How can you protect yourself? The world's foremost cyber security experts from FBI Director Robert S. Mueller, III to Special Assistant to the President Howard A. Schmidt, share critical practical knowledge on how the cyberspace ecosystem is structured, how it functions, and what we can do to protect it and ourselves from attack
How is foreign policy in the United States really crafted? Who does the work? How are the various activites of the many key participants coordinated and controlled? In America′s Foreign Policy Toolkit: Key Institutions and Processes, Charles A. Stevenson identifies for students what the key foreign policy tools are, clarifies which tools are best for which tasks, describes the factors that constrain or push how they′re used, and provides fresh insight into the myriad challenges facing national security decisionmakers. Written in an engaging style with case examples drawn from "behind the scenes," Stevenson brings depth and dimension to the sophisticated pathways and instruments of Americ...
This text offers a concise, affordable and reader-friendly introduction to the criminal justice system. It explores the system in four sections: the criminal justice system as social control, law enforcement as social control, the law as social control, and corrections as social control. Designed with the student in mind, each chapter includes: "What You Need to Know," highlighting key points for the reader; brief chapter outlines; review questions; vocabulary lists; and exercises to help students customize the material for different jurisdictions. Each chapter has an outline, "what you need to know," photos, charts, jurisdictional exercises, web site links, and vocabulary words with definitions. Chapter one introduces students to "how to write a research paper."