Query Result Set
Skip Navigation Links
   ActiveUsers:504Hits:20600213Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
INTERNATIONAL JOURNAL OF INTELLIGENCE AND COUNTER INTELLIGENCE VOL: 22 NO 4 (7) answer(s).
 
SrlItem
1
ID:   091230


Contractors and intelligence: the private sector in the intelligence community / Voelz, Glenn J   Journal Article
Voelz, Glenn J Journal Article
0 Rating(s) & 0 Review(s)
Publication 2009.
Summary/Abstract At this juncture ongoing military operations and growing demand for domestic counterterrorism information will likely necessitate continuing reliance on private sector augmentation into the foreseeable future. Given this assumption, the time has arrived for the government to move beyond viewing its commercial augmentation as an ad hoc resource without having clear strategies and policy for its use.
        Export Export
2
ID:   091232


Devil is in the details: the legal profession as a model for authentic dissent / Spivey, Robin V   Journal Article
Spivey, Robin V Journal Article
0 Rating(s) & 0 Review(s)
Publication 2009.
Summary/Abstract The legal Devil's Advocate is clearly a role-player. yet his ability to assume characteristics identified with authentic dissenters makes that dissent more productive. The legal culture's acceptance of dissent increases the opportunities for actual dissenters to influence it, and facilitates the activities of its role-players. Lawyers also have a range of techniques available for use on their clients behalf.
        Export Export
3
ID:   091231


Evaluating intelligence: answering questions asked and not / Wheaton, Kristan J   Journal Article
Wheaton, Kristan J Journal Article
0 Rating(s) & 0 Review(s)
Publication 2009.
Summary/Abstract The fundamental problem with evaluating intelligence products is that intelligence, for the most part, is probabilistic. Even when an intelligence analyst presumes to know a fact, it is still subject to interpretation, or may have been the result of a deliberate campaign of deception.
        Export Export
4
ID:   091229


Home time: a new paradigm for domestic intelligence / Hulnick, Arthur S   Journal Article
Hulnick, Arthur S Journal Article
0 Rating(s) & 0 Review(s)
Publication 2009.
Summary/Abstract Americans have always been ambivalent about internal security and homland defense. In times of crisis, they are willing to give up some measure of privacy and accept the erosion of normal liberties in the interest of collective security.
        Export Export
5
ID:   091237


Legal framework for intelligence in post-communist Romania / Matei, Florina Cristiana   Journal Article
Matei, Florina Cristiana Journal Article
0 Rating(s) & 0 Review(s)
Publication 2009.
Summary/Abstract A legal framework for intelligence delineates the rights, obligations, and powers of the intelligence organisations, as well as the arrangements for their governance and accountability, provides the intelligence system with guidance as to what it can and cannto do, indicates who is in charge and who oversees the activity of intelligence; insures that the intelligence apparatus is responsible before the law in case of abuses; makes sure that the IC benefits from legal protection if it observes the legally agreed guidance and directions.
        Export Export
6
ID:   091235


PRC's compromise of US government information and technologies / Lefebvre, Stephane   Journal Article
Lefebvre, Stephane Journal Article
0 Rating(s) & 0 Review(s)
Publication 2009.
Summary/Abstract Over tha last five years, cases of ethnic Chinese and Aemricans charged and/or convicted for having transmitted, or conspired to transmit, sensitive technologies, proprietary information, or government information to the People's Republic of China (China) have made headlines on a regular basis in the United States. This is no coincidence. PRC intelligence activities against the U.S. are judged by government officials and experts to be very aggressive, and at a level matching that the Cold War.
Key Words Conspiracy  United States  China  Intelligence Activities 
        Export Export
7
ID:   091239


Secrecy, security, and sex: the NSA, Congress, and the Martin-Mitchell defections / Barrett, David M   Journal Article
Barrett, David M Journal Article
0 Rating(s) & 0 Review(s)
Publication 2009.
Summary/Abstract Congressional monitoring of intelligence activities has always been somewhat controversial, but its roots go back to the founding era of the United States, when the new Constitution gave both the President and Congress important roles in foreign affairs.
Key Words CIA  United States  NSA  Intelligence Agencies  Monitoring  Intelligence Activities 
        Export Export