Atjaunināt sīkdatņu piekrišanu

E-grāmata: Intelligence in An Insecure World

3.85/5 (30 ratings by Goodreads)
(University of Wolverhampton), (Liverpool John Moores University, UK)
  • Formāts: EPUB+DRM
  • Izdošanas datums: 08-Oct-2018
  • Izdevniecība: Polity Press
  • Valoda: eng
  • ISBN-13: 9781509525232
  • Formāts - EPUB+DRM
  • Cena: 28,17 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Izdošanas datums: 08-Oct-2018
  • Izdevniecība: Polity Press
  • Valoda: eng
  • ISBN-13: 9781509525232

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Security intelligence continues to be of central importance to the contemporary world: individuals, groups, organizations and states all seek timely and actionable information in order to increase their sense of security. But what exactly is intelligence? Who seeks to develop it and to what ends? How can we ensure that intelligence is not abused  

In this third edition of their classic guide to the field, Peter Gill and Mark Phythian set out a comprehensive framework for the study of intelligence, discussing how states organise the production - collection, analysis and dissemination - of intelligence, how it is acted upon, why it may fail and how the process should be governed in order to uphold democratic rights. Fully revised and updated throughout, the book covers recent developments including the impact of the Snowden leaks on what is known about the role of intelligence agencies in the surveillance of the Internet and social media, their involvement in cyber operations and the legal and political arrangements for democratic control. The role of intelligence as part of ‘hybrid’ warfare in the case of Russia and Ukraine is also explored and the problems facing intelligence in the realm of counter terrorism considered in the context of the current wave of attacks in Western Europe. 

Intelligence in an Insecure World is an authoritative and accessible guide to a rapidly expanding area of inquiry – one which everyone has an interest in understanding.

Recenzijas

"This excellent survey by two leaders in the field is essential reading for anyone who wishes to understand intelligence, secrecy and surveillance, together with its linkage to issues of democratic rights and civil liberties." Richard J. Aldrich, University of Warwick

"Peter Gill and Mark Phythian capture an increasingly vibrant field in way that is both sophisticated and accessible. This third edition engages with the latest theoretical and policy debates on intelligence based on contemporary and diverse cases." Damien Van Puyvelde, University of Glasgow

Figures, Tables and Boxes
ix
Preface to the Third Edition x
Abbreviations xii
1 What Is Intelligence?
1(26)
Towards a Definition of Intelligence
1(6)
The Evolution of Intelligence
7(8)
Organizing Our Thinking about Intelligence: Beyond the Intelligence Cycle
15(5)
The Nature of Intelligence Studies
20(6)
Conclusion
26(1)
2 How Do We Understand Intelligence?
27(18)
Introduction
27(1)
Critical Realism
28(1)
The Critique of Positivism and Challenge of Postmodernism
29(4)
Intelligence as Surveillance: Knowledge and Power
33(4)
Producing knowledge
33(2)
Exercising power
35(1)
Secrecy and resistance
36(1)
Explaining Intelligence
37(2)
Levels of Surveillance
39(2)
Conclusion: A Map for Theorizing and Researching Intelligence
41(4)
3 Who Does Intelligence?
45(22)
Introduction: Security Intelligence Networks
45(1)
State Sector
46(12)
Police intelligence
48(1)
Domestic security intelligence
49(2)
Foreign intelligence
51(2)
Signals intelligence
53(2)
Military intelligence
55(1)
Central security and intelligence assessments
56(2)
Corporate Sector
58(2)
Non-State Sovereignty Sector
60(1)
Intelligence Networks
61(2)
Making Security Intelligence Networks Work
63(3)
Conclusion
66(1)
4 How Do They Gather Information?
67(26)
Introduction
67(3)
OSINT: Open Source Intelligence
70(1)
IMINT: Imagery Intelligence
71(2)
HUMINT: Human Intelligence
73(7)
Extraordinary rendition and torture
77(3)
SIGINT: Signals Intelligence
80(10)
Digital collection and the Snowden leaks
81(3)
The post-Snowden debate
84(6)
Conclusion
90(3)
5 How Is Information Turned into Intelligence?
93(16)
Introduction
93(1)
Analysis
93(8)
Dissemination: Security versus Sharing
101(6)
What is produced and when?
102(2)
To whom is it disseminated and how?
104(3)
Conclusion
107(2)
6 What Do They Do with Intelligence?
109(19)
Introduction
109(1)
When Intelligence Becomes Action: The Intensification of Surveillance
109(5)
Intelligence and Military Action
114(1)
Policing and Covert Action
115(2)
Intelligence Action in the Cyber Realm
117(6)
Assassination
123(1)
Use of Armed Drones
124(3)
Conclusion
127(1)
7 Why Does Intelligence Fail?
128(26)
Introduction
128(1)
The Limits of Intelligence
129(1)
Approaches to Identifying the Causes of Intelligence Failure
130(5)
The Policymaker-Intelligence Interface as a Site of Intelligence Failure
135(4)
Vietnam
136(2)
Iran
138(1)
Politicization of Intelligence
139(3)
The 9/11 Commission Report: Explaining Intelligence Failure?
142(3)
The- Iraq WMD Failure
145(5)
US inquiries
145(4)
UK inquiries
149(1)
Terrorist Attacks and Intelligence Failure
150(3)
Conclusion
153(1)
8 How Democratic Can Intelligence Be?
154(29)
Introduction
154(2)
Defining Control and Oversight
156(1)
The Legal and Ethical Bases for Democratic Control and Oversight
157(4)
Organizing Oversight, Internally and Externally
161(4)
Extra-parliamentary Oversight
165(6)
The impact of the Snowden releases on oversight: the UK and Germany
168(2)
The judicial role
170(1)
Ad Hoc Inquiries
171(2)
Media and Civil Society
173(3)
The Challenge of Controlling and Overseeing Intelligence Networks
176(5)
National networks
177(1)
State-corporate networks
178(1)
Transnational networks
179(2)
Conclusion
181(2)
9 Intelligence for a More Secure World?
183(8)
Selected Further Reading
191(3)
Journals
191(1)
Books
191(3)
Notes 194(37)
Index 231
Peter Gill is an Honorary Visiting Fellow in the Department of Politics and International Relations at the University of Leicester

Mark Phythian is Professor of Politics and International Relations at the University of Leicester