|
List of Figures, Tables and Boxes |
|
|
x | |
Preface to the Second Edition |
|
xi | |
|
|
xiii | |
Introduction: The Development of Intelligence Studies |
|
1 | (9) |
|
|
10 | (23) |
|
|
10 | (1) |
|
The Concept of the Intelligence Cycle: Help or Hindrance? |
|
|
11 | (6) |
|
A Definition of `Intelligence' |
|
|
17 | (3) |
|
|
20 | (7) |
|
Does Intelligence Matter? |
|
|
27 | (4) |
|
Conclusion: Towards a Theory of Intelligence? |
|
|
31 | (2) |
|
2 How Do We Understand Intelligence? |
|
|
33 | (20) |
|
|
33 | (1) |
|
The Critique of Positivism |
|
|
34 | (2) |
|
The Challenge of Postmodernism |
|
|
36 | (3) |
|
Critical Realism: Neither Positivist nor Postmodernist |
|
|
39 | (1) |
|
|
40 | (2) |
|
Intelligence as Surveillance: Knowledge and Power |
|
|
42 | (7) |
|
Conclusion: A Map for Theorizing and Researching Intelligence |
|
|
49 | (4) |
|
|
53 | (24) |
|
Introduction: Security Intelligence Networks |
|
|
53 | (2) |
|
|
55 | (1) |
|
|
56 | (11) |
|
|
67 | (3) |
|
|
70 | (1) |
|
|
71 | (1) |
|
Making Security Intelligence Networks Work |
|
|
72 | (4) |
|
|
76 | (1) |
|
4 How Do They Gather Information? |
|
|
77 | (26) |
|
|
77 | (2) |
|
Priorities, Planning and Direction |
|
|
79 | (1) |
|
OSINT: Open Source Intelligence |
|
|
79 | (2) |
|
PROTINT: Protected Information |
|
|
81 | (1) |
|
HUMINT: Human Intelligence |
|
|
81 | (11) |
|
SIGINT: Signals Intelligence |
|
|
92 | (6) |
|
IMINT: Imagery Intelligence |
|
|
98 | (2) |
|
MASINT: Measurement and Signatures Intelligence |
|
|
100 | (1) |
|
Conclusion: From Collection to Action |
|
|
101 | (2) |
|
5 How Is Information Turned into Intelligence? |
|
|
103 | (18) |
|
|
103 | (1) |
|
|
104 | (7) |
|
`No Good Will Come of This': Problems with Dissemination |
|
|
111 | (8) |
|
|
119 | (2) |
|
6 What Do They Do with Intelligence? |
|
|
121 | (22) |
|
|
121 | (1) |
|
Where Intelligence Becomes Action: The Intensification of Surveillance |
|
|
121 | (11) |
|
Drone Wars: The Intensification of Surveillance Exemplified |
|
|
132 | (8) |
|
|
140 | (1) |
|
|
140 | (3) |
|
7 Why Does Intelligence Fail? |
|
|
143 | (27) |
|
|
143 | (1) |
|
The Limits of Intelligence |
|
|
143 | (6) |
|
The Policymaker-Intelligence Interface as a Site of Intelligence Failure |
|
|
149 | (4) |
|
Politicization of Intelligence |
|
|
153 | (3) |
|
The 9/11 Commission Report: Explaining Intelligence Failure? |
|
|
156 | (3) |
|
|
159 | (8) |
|
The 7 July 2005 London Bombings: An Intelligence Failure? |
|
|
167 | (2) |
|
|
169 | (1) |
|
8 Can Intelligence Be Democratic? |
|
|
170 | (30) |
|
|
170 | (3) |
|
Defining Control, Review and Oversight |
|
|
173 | (1) |
|
Democratizing Intelligence |
|
|
173 | (2) |
|
The Legal and Ethical Bases for Democratic Control and Oversight |
|
|
175 | (4) |
|
Organizing External Oversight |
|
|
179 | (5) |
|
Extra-Parliamentary Oversight |
|
|
184 | (3) |
|
|
187 | (1) |
|
Torture, Intelligence Networks and Oversight: The Cases of Binyam Mohamed and Rangzieb Ahmed |
|
|
188 | (5) |
|
The Challenge of Controlling and Overseeing Intelligence Networks |
|
|
193 | (6) |
|
|
199 | (1) |
|
9 Intelligence for a More Secure World? |
|
|
200 | (9) |
Notes |
|
209 | (45) |
Selected Further Reading |
|
254 | (3) |
Index |
|
257 | |