Requirements for successful state level ISACs are identified through numerous cases studies focusing on the Georgia Information Sharing and Analysis Center.
Gordon Thomas reveals secret operations at the cutting edge of danger, and a gallery of characters no novelist would dare to invent.
MI5, MI6: Britain's Security and Secret Intelligence Services
Based on scores of exclusive interviews and displaying the groundbreaking reporting that has made Bill Gertz’s previous books smash bestsellers, The Failure Factory offers a chilling look at the threats to our national security that exist ...
This work investigates the connection between intelligence history, domestic policy, military history and foreign relations in a time of increasing bureaucratization of the modern state.
At head of title: ABA Standing Committee on Law and National Security
Covert Action
This accessible text: * Covers the full gamut of agencies involved in homeland security * Tackles difficult ethical issues * Discusses specific threats--ranging from drug trafficking and money laundering to bioterrorism and the challenges ...
100 years old in August 2009, this is a complete and up-to-date account of the two oldest and still the most powerful, secretive intelligence services in the world: MI5, the security service, and MI6, the secret intelligence service.
Tinker Tailor Soldier Spy: The Honourable Schoolboy ; Smiley's People
He unveils the dark conspiracy between the Russian and German secret services which cast new light on the downfall of Marshal Tukhachevsky and the purge of the Red Army leaders at the Moscow trials. ¿Operation Bernhard¿ ¿ the story of ...
Explains how to develop an environment where teamwork flourishes, identifying six conditions necessary for any team to succeed and using examples to show how each helps teams accomplish their goal.
The code word for this stratagem was "Come Retribution." But when Booth was stymied, the Secret Service took another course. They conspired to bomb the White House during a conference of senior Union officials. But this plot also failed.
Based on access to never-before-seen task forces and FBI bases from Budapest, Hungary, to Quantico, Virginia, this book profiles the visionary agents who risked their lives to bring down criminals and terrorists both here in the U.S. and ...
Many of these accounts are based on exclusive interviews and access. From Afghanistan to the Congo, from Moscow to the back streets of London, these are the voices of those who have worked on the front line of Britain's secret wars.
A modern masterpiece, TINKER, TAILOR, SOLDIER, SPY begins George Smiley's chess match of wills and wits with Karla, his Soviet equivalent, as he's assigned to identify and destroy the double agent -- a mole -- who has burrowed his way into ...
Provides an unclassified reference handbook which explains the categories of intelligence threat, provides an overview of worldwide threats in each category, and identifies available resources for obtaining threat information.
The year is 1963 and Fidel Castro, seeking revenge for his humiliation during the missile crisis, has become an assassination target.
Strategic intelligence and analysis: guidelines on methodology and applications
Russian Secret Police