|
Figures, Tables and Boxes |
|
|
ix | |
Preface to the Third Edition |
|
x | |
Abbreviations |
|
xii | |
|
|
1 | (26) |
|
Towards a Definition of Intelligence |
|
|
1 | (6) |
|
The Evolution of Intelligence |
|
|
7 | (8) |
|
Organizing Our Thinking about Intelligence: Beyond the Intelligence Cycle |
|
|
15 | (5) |
|
The Nature of Intelligence Studies |
|
|
20 | (6) |
|
|
26 | (1) |
|
2 How Do We Understand Intelligence? |
|
|
27 | (18) |
|
|
27 | (1) |
|
|
28 | (1) |
|
The Critique of Positivism and Challenge of Postmodernism |
|
|
29 | (4) |
|
Intelligence as Surveillance: Knowledge and Power |
|
|
33 | (4) |
|
|
33 | (2) |
|
|
35 | (1) |
|
|
36 | (1) |
|
|
37 | (2) |
|
|
39 | (2) |
|
Conclusion: A Map for Theorizing and Researching Intelligence |
|
|
41 | (4) |
|
|
45 | (22) |
|
Introduction: Security Intelligence Networks |
|
|
45 | (1) |
|
|
46 | (12) |
|
|
48 | (1) |
|
Domestic security intelligence |
|
|
49 | (2) |
|
|
51 | (2) |
|
|
53 | (2) |
|
|
55 | (1) |
|
Central security and intelligence assessments |
|
|
56 | (2) |
|
|
58 | (2) |
|
Non-State Sovereignty Sector |
|
|
60 | (1) |
|
|
61 | (2) |
|
Making Security Intelligence Networks Work |
|
|
63 | (3) |
|
|
66 | (1) |
|
4 How Do They Gather Information? |
|
|
67 | (26) |
|
|
67 | (3) |
|
OSINT: Open Source Intelligence |
|
|
70 | (1) |
|
IMINT: Imagery Intelligence |
|
|
71 | (2) |
|
HUMINT: Human Intelligence |
|
|
73 | (7) |
|
Extraordinary rendition and torture |
|
|
77 | (3) |
|
SIGINT: Signals Intelligence |
|
|
80 | (10) |
|
Digital collection and the Snowden leaks |
|
|
81 | (3) |
|
|
84 | (6) |
|
|
90 | (3) |
|
5 How Is Information Turned into Intelligence? |
|
|
93 | (16) |
|
|
93 | (1) |
|
|
93 | (8) |
|
Dissemination: Security versus Sharing |
|
|
101 | (6) |
|
What is produced and when? |
|
|
102 | (2) |
|
To whom is it disseminated and how? |
|
|
104 | (3) |
|
|
107 | (2) |
|
6 What Do They Do with Intelligence? |
|
|
109 | (19) |
|
|
109 | (1) |
|
When Intelligence Becomes Action: The Intensification of Surveillance |
|
|
109 | (5) |
|
Intelligence and Military Action |
|
|
114 | (1) |
|
Policing and Covert Action |
|
|
115 | (2) |
|
Intelligence Action in the Cyber Realm |
|
|
117 | (6) |
|
|
123 | (1) |
|
|
124 | (3) |
|
|
127 | (1) |
|
7 Why Does Intelligence Fail? |
|
|
128 | (26) |
|
|
128 | (1) |
|
The Limits of Intelligence |
|
|
129 | (1) |
|
Approaches to Identifying the Causes of Intelligence Failure |
|
|
130 | (5) |
|
The Policymaker-Intelligence Interface as a Site of Intelligence Failure |
|
|
135 | (4) |
|
|
136 | (2) |
|
|
138 | (1) |
|
Politicization of Intelligence |
|
|
139 | (3) |
|
The 9/11 Commission Report: Explaining Intelligence Failure? |
|
|
142 | (3) |
|
|
145 | (5) |
|
|
145 | (4) |
|
|
149 | (1) |
|
Terrorist Attacks and Intelligence Failure |
|
|
150 | (3) |
|
|
153 | (1) |
|
8 How Democratic Can Intelligence Be? |
|
|
154 | (29) |
|
|
154 | (2) |
|
Defining Control and Oversight |
|
|
156 | (1) |
|
The Legal and Ethical Bases for Democratic Control and Oversight |
|
|
157 | (4) |
|
Organizing Oversight, Internally and Externally |
|
|
161 | (4) |
|
Extra-parliamentary Oversight |
|
|
165 | (6) |
|
The impact of the Snowden releases on oversight: the UK and Germany |
|
|
168 | (2) |
|
|
170 | (1) |
|
|
171 | (2) |
|
|
173 | (3) |
|
The Challenge of Controlling and Overseeing Intelligence Networks |
|
|
176 | (5) |
|
|
177 | (1) |
|
|
178 | (1) |
|
|
179 | (2) |
|
|
181 | (2) |
|
9 Intelligence for a More Secure World? |
|
|
183 | (8) |
|
|
191 | (3) |
|
|
191 | (1) |
|
|
191 | (3) |
Notes |
|
194 | (37) |
Index |
|
231 | |