Intelligence
(Includes ISR)


January 2013
Compiled by Bibliography Branch
Muir S. Fairchild Research Information Center
Maxwell AFB, AL


Contents

For older material, see other Fairchild Center bibliographies: Intelligence (2005)Intelligence, Surveillance and Reconnaissance (ISR) Programs (2005)Intelligence: History and Role in American Society (2001)

The appearance of hyperlinks does not constitute endorsement by the U.S. Air Force of this website or the information, products, or services contained therein.  For other than authorized activities such as military exchanges and morale, welfare and recreation sites, the U.S. Air Force does not exercise any editorial control over the information you may find at these locations.  Such links are provided consistent with the stated purpose of this DoD website.

Some articles listed below require access to subscription databases.  If you cannot gain access, contact your local library for availability.  AU students and faculty can contact the Center's Web Maintainer for a password.

If a file does not open by clicking on the link, right click and select "copy the shortcut" then paste it into the browser's address bar.

All sites listed were last accessed on December 13, 2012.



General Information


Internet Resources

Air War College: Gateway to Intelligence.
Available online at: http://www.au.af.mil/au/awc/awcgate/crs/index.htm#intelligence
This site has links to numerous Congressional Research Service Reports related to intelligence.

Best, Richard A., Jr.  Intelligence Information Need-to-Know vs. Need-to-Share.  Washington, Congressional Research Service, June 6, 2011.  13 p.  (CRS report for Congress, R41848)
Available online at: http://www.fas.org/sgp/crs/intel/R41848.pdf
"This report focuses on information acquired, analyzed, and disseminated by agencies of the U.S. Intelligence Community, but these concerns also affect classified information outside the Intelligence Community."--Excerpt from the summary.

Bruce, James B.  Media Leaks Hinder Intelligence Gathering.  The Washington Times March 11, 2007.
Available online at:
http://www.lexisnexis.com/lnacui2api/api/version1/getDocCui?lni=4N7S-R4P0-TWCW-42WM&csi=8176&hl=t&hv=t&hnsd=f&hns=t&hgn=t&oc=00240&perma=true

Canaday, Henry.  Seaborne ISR.  Tactical ISR Technology  2:25-26  April 2012.
Available online at: http://www.special-operations-technology.com/tisr-home/398-tisr-2012-volume-2-issue-3-april/5429-seaborne-isr.html

Cary, Mary Kate.  The Real Threat of WikiLeaks.  U.S. News Digital Weekly  2:11  December 3, 2010.
Available online at: http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=59406807&site=ehost-live&scope=site&custid=airuniv
"The author comments on the release of a number of confidential U.S. embassy cables by the Web site, WikiLeaks...then offers a background on WikiLeaks, its founder, the other people behind it and how it functions."--Abstract.

Clark, J. Ransom.  The Literature of Intelligence: A Bibliography of Materials, with Essays, Reviews, and Comments.  New Concord, OH, Muskingum University.
Available online at: http://intellit.muskingum.edu/
Most major, many minor, and some obscure books, documents and articles dealing in some fashion with intelligence matters are listed.  A very extensive bibliography.

Cordner, Gary and Scarborough, Kathryn.  Information Sharing: Exploring the Intersection of Policing with National and Military Intelligence.  Homeland Security Affairs  6:1-19  January 2010.
Available online at: http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=51496551&site=ehost-live&scope=site&custid=airuniv
"The article examines the connection between police intelligence and national and military intelligence in the U.S. ...analyzes how information sharing among the local and federal law enforcement, intelligence agencies, and the military in the 9/11 era is done."--Abstract.

Cross-Cultural Competence.  Military Intelligence Professional Bulletin January-March 2011.
Available online at: http://www.fas.org/irp/agency/army/mipb/2011_01.pdf
This issue has several articles on cross-cultural competence relating to mission and thus intelligence.  This quarterly bulletin is designed to keep military intelligence professionals knowledgeable of current and emerging developments in their field.

Davis, Jennifer A.  Threats from Non-Traditional Actors: Expanding and Transforming Intelligence to Address Transnational Issues.  American Intelligence Journal  29:47-52  March 2011.
Available online at: http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=65095484&site=ehost-live&scope=site&custid=airuniv
"The article reports on the improvement and transformation of intelligence to address transitional issues in the U.S."--Abstract

Defense Security Service (DSS).
Available online at: http://www.dss.mil/about_dss/publications.html
Electronic Reading Room has numerous PDF documents for review.  United States Department of Defense website.

Global Security.  Intelligence Programs and Systems.
Available online at: http://www.globalsecurity.org/intell/systems/list.htm
"This resource is a comprehensive alphabetical listing of intelligence programs, including both those for which detailed descriptions are available, as well as those for which profiles are not yet available."--Website.
May not be available on Maxwell .mil network.

Goldman, Jan.  Words of Intelligence: An Intelligence Professional's Lexicon for Domestic and Foreign Threats.  Lanham, MD, Scarecrow Press, 2011.  299 p.  (Scarecrow professional intelligence education series no. 14)
Available online as an EBSCOHost eBook at: http://search.ebscohost.com/login.aspx?direct=true&scope=si te&db=nlebk&db=nlabk&AN=364784&custid=airuniv

Intelligence Online.
Available online at: http://www.intelligenceonline.com/
"Intelligence Online is an exclusive and independent publication supported entirely by readers and published since 1990 by the independent news organisation Indigo Publications."--Website.

Keane, Nick and Kleiven, Maren Eline.  Risky Intelligence.  International Journal of Police Science & Management  11:324-333  Autumn 2009.
Available online at: http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=43202159&site=ehost-live&scope=site&custid=airuniv
"Intelligence-led policing should not be abandoned, but it should be revisited and revised to take greater notice of the changes in the landscape it is designed to cover.  The territory is changing but the map is not being amended; it is time for some major revisions."--Abstract.

Major, David G.  Enforcement of Espionage Laws.  Washington, Committee on House Judiciary Subcommittee on Crime, Terrorism, and Homeland Security, FDCH Congressional Testimony, January 29, 2008.
Available online at: http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=32Y2205909757&site=ehost-live&scope=site&custid=airuniv
Statement of David G. Major, President of The Centre for Counterintelligence and Security Studies (CI Centre).

Margarit, Mihaiu.  Why Intelligence?  Intelligence and the Challenges of the Present.  Romanian Journal of Security Studies  1:28-37  September 2010.
Available online at: http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=58035942&site=ehost-live&scope=site&custid=airuniv
"The content of the article is questioning the relationship between specialized intelligence structures and civil society within complex political, economical and social framework affected by the present global crisis."--Abstract.

Martin, Rachel.  Has Sept. 11 Changed How Agencies Share Secrets?  NPR, September 6, 2011.
Available online at: http://www.npr.org/2011/09/06/140206911/intelligence-community-still-not-keen-on-sharing-secrets
"In the aftermath of 9/11, the U.S. intelligence community was forced to answer questions about why key pieces of information were not shared.  One reason: an obsession with secrecy.  Nearly 10 years later, has the culture of secrecy changed?"--NPR's web page.

McConnell, J. Michael.  Annual Threat Assessment of the Director of National Intelligence for the Senate Select Committee on Intelligence.  Washington, United States.  Office of the Director of National Intelligence, February 5, 2008.  45 p.
Available online at: http://handle.dtic.mil/100.2/ADA476703

MiPAL: National Security Strategy.  Intelligence Reform.
Available online at: http://merln.ndu.edu/index.cfm?secID=116&pageID=3&type=section#intelreform
Compiled by the National Defense University Library.  Numerous linked documents dealing with intelligence reform.  Do some scrolling for other subject areas.

National Research Council (U.S.) and others.  Avoiding Technology Surprise for Tomorrow's Warfighter--Symposium 2010.  Washington, National Academies Press, 2010.  48 p.
Available online as an EBSCOHost eBook at: http://web.ebscohost.com/
"This symposium represented a continuation of the relationship between the TIGER standing committee and the intelligence community (IC) and the growth between them, with the goal of perpetuating and strengthening a dialogue between warfighters and members of the IC on ways to minimize surprise from either the unexpected appearance of novel technological capabilities or innovative adaptations of existing capabilities, or both."--P. 1.

Office of the Director of National Intelligence.  About the Intelligence Community (IC).
Available online at: http://www.intelligence.gov/about-the-intelligence-community/

Pappas, Aris A. and Simon, James M., Jr.  Daunting Challenges, Hard Decisions, The Intelligence Community: 2001-2015.  May 08, 2007.  9 p.
Available online at: https://www.cia.gov/library/center-for-the-study-of-intelligence/kent-csi/vol46no1/pdf/v46i1a05p.pdf
"Aris A. Pappas and James M. Simon, Jr., are senior officers on the Intelligence Community Management Staff under the Director of Central Intelligence."--P. 39.

Ross, Gary.  Who Watches the Watchmen?  The Conflict Between National Security and Freedom of the Press.  Washington, National Intelligence University, Center for Strategic Intelligence Research, July 2011.  303 p.
Available online at: http://www.au.af.mil/au/awc/awcgate/dia/nip_who_watches_the_watchmen.pdf
"Argues that the tension between maintaining national security secrets and the public’s right to know cannot be 'solved,' but can be better understood and more intelligently managed."--P. iv.

Sepper, Elizabeth.  Democracy, Human Rights, and Intelligence Sharing.  Texas International Law Journal  46:151-207  Fall 2010.
Available online at: http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=57194750&site=ehost-live&scope=site&custid=airuniv
"Mentions several improvements for a more effective intelligence sharing and recommends two reinforcing methods for a better democratic and human rights compliant intelligence exchange."--Abstract.

Special Operations Technology.
Available online at: http://www.special-operations-technology.com/sotech-home.html
Do search for specific keyword, i.e. Intelligence.  Website offers an online monthly magazine titled "Special Operations Technology" with archives back to February 2006.  Access limited to .mil on-base.

Strategic Intelligence.
Available online at: http://www.loyola.edu/departments/academics/political-science/strategic-intelligence/index.html
Various subject headings, all have numerous links to other intelligence references.

Transnational Organized Crime.  National Intelligence Council.
Available online at: http://www.dni.gov/files/documents/Special Report_The Threat to U.S. National Security Posed by Transnational Organized Crime.pdf

U.S. National Intelligence: An Overview 2011.  Office of the Director of National Intelligence, January 2012.  76 p.
Available online at: http://www.whs.mil/library/IC_Consumers_Guide_2011.pdf
Provides general information about the Intelligence Community (IC).  For laws and policies governing the IC refer to Tab 8, pp 93-95.

United States.  Government Accountability Office.  Interagency Collaboration: Implications of a Common Alignment of World Regions Among Select Federal Agencies.  Washington, U.S. GAO, July 11, 2011.  38 p.
Available online at: http://www.gao.gov/products/GAO-11-776R?source=ra
"This report summarizes and formally transmits the enclosed briefing in response to Section 1055 of the Ike Skelton National Defense Authorization Act for Fiscal Year 2011, which required us to examine the need for and implications of a common alignment of world regions in the internal organization of federal departments and agencies with international responsibilities, specifically the Department of Commerce (Commerce), DOD, the Department of Homeland Security (DHS), the Department of Justice (Justice), State, the Department of the Treasury (Treasury), USAID, and the agencies comprising the intelligence community."--P. 2.



Internet (Student Research)

Carabin, David.  An Intelligence-Sharing Continuum: Next Generation Requirements for U.S. Counterterrorism Efforts.  Monterey, CA, Naval Postgraduate School, Department of National Security Affairs, September 2011.  153 p.
Available online at: http://edocs.nps.edu/npspubs/scholarly/theses/2011/September/11Sep_Carabin.pdf
"This thesis aims to identify potential solutions that leverage existing intelligence operations to promote an intelligence-sharing continuum across all tiers of U.S. government."--Abstract.

DeCoster, Bryan D.  Crime or War: Cyberspace Law and Its Implications for Intelligence.  Carlisle Barracks, PA, U.S. Army War College, 2011.  34 p. (USAWC strategy research project)
Available online at: http://handle.dtic.mil/100.2/ADA543201
"This paper analyzes six basic sources of cyberspace threats in terms of existing law to determine which threats and their resulting cyberspace activities are matters for law enforcement as opposed to acts of war to be pursued by the Department of Defense."--Abstract.

Watson, Christine D.  Strategic Intelligence Observations From the Pre-Vietnam and Pre-9/11 Periods for the Intelligence Professional and the Policy-Maker: A Monograph.  Fort Leavenworth, KS, School of Advanced Military Studies, U.S. Army Command and General Staff College, January 5, 2007.  81 p.
Available online at: http://handle.dtic.mil/100.2/ADA470899
"Investigates strategic intelligence failures of the pre-Vietnam and pre-9/11 time periods...presents PEMISI (political, economic, military, information, societal, and intelligence) environmental analyses...to evaluate whether intelligence lessons are truly similar in both periods."--Abstract.



Books

Applications of Information Systems to Homeland Security and Defense, edited by Hussein A. Abbass and Daryl Essam.  Hershey, PA, Idea Group Pub., 2006.  257 p.
"This book provides an overview of complex systems' techniques and presents both guidelines and specific instances of how they can be applied to security and defense applications"--Publisher.
Book call no.: 363.320285 A652

Berkowitz, Bruce D. and Goodman, Allan E.  Best Truth: Intelligence in the Information Age.  New Haven, CT, Yale University Press, 2000.  203 p.
The authors "call for fundamental, radical reforms in the organization and approach of America's intelligence agencies...examine recent failures of the intelligence community, discuss why traditional principles of intelligence are no longer adequate, and consider the implications for such broad policy issues as secrecy, covert action, and the culture of the intelligence community."--Book jacket.
Book call no.: 327.120285 B513b

Betts, Richard K.  Enemies of Intelligence: Knowledge and Power in American National Security.  New York, Columbia University Press, 2007.  241 p.
"Outlines strategies for better intelligence gathering and assessment."--Book jacket.
Book call no.: 327.1273 B565e

Bowden, Mark.  Killing Pablo: The Hunt for the World's Greatest Outlaw.  New York, Penguin Books, 2002.  296 p.
"Exposes the never-before-revealed details of how U.S. operatives covertly led the sixteen-month manhunt (for Pablo Escobar of Columbia)."--Book jacket.
Book call no.: 364.17709861 B784k 2002

Burton, Fred.  Ghost: Confessions of a Counterterrorism Agent.  New York, Random House, 2008.  276 p.
Examines the hunt for and capture of assassins and terrorists.
Book call no.: 363.28 B974g

Chapman, Bert.  Researching National Security and Intelligence Policy.  Washington, CQ Press, 2004.  452 p.
"The book details origins and institutions of military and national security study in the United States as well as the laws and regulations that shape national security policy.  Helpful boxed features focus on such topics as military and defense agency structure, congressional oversight, and military protocol."--Book jacket.
Review Chapter 6, Intelligence Agencies, pp 207-228.
Book call no.: 025.06 C466r

Chesterman, Simon.  One Nation Under Surveillance: A New Social Contract to Defend Freedom Without Sacrificing Liberty.  New York, Oxford University Press, 2011.  297 p.
"What limits, if any, should be placed on a government's efforts to spy on its citizens in the name of national security?  ...this book offers a framework to defend freedom without sacrificing liberty."--Product description.
Book call no.: 323.4482 C525o

Clapper, James R.  Defense Intelligence Strategy.  Washington, Office of the Under Secretary of Defense for Intelligence, March 31, 2008.  20 p.
Strategy document introduced by Under Secretary James R. Clapper.
Also available online at:
http://www.au.af.mil/au/awc/awcgate/dod/def_intell_strat_080501.pdf
Book call no.: 355.34320973 U58d

Clark, J. Ransom.  Intelligence and National Security: A Reference Handbook.  Westport, CT, Praeger Security International, 2007.  192 p.
"Explanatory text and reference work that deals with what intelligence is, what it can and cannot do, how it functions, and why it matters within the context of furthering American national security."--Book jacket.
Book call no.: 327.1273 C594i

Cultural Intelligence for Winning the Peace, edited by Juliana Geran Pilon.  Washington, The Institute of World Politics Press, 2009.  315 p.
Book call no.: 355.02 C968

Democratic Control of Intelligence Services: Containing Rogue Elephants, edited by Hans Born and Marina Caparini.  Burlington, VT, Ashgate, 2007.  303 p.
Book call no.: 353.17288 D383

Dower, John W.  Cultures of War: Pearl Harbor, Hiroshima, 9-11, Iraq.  New York, New Press, 2010.  596 p.
A "comparative study of the dynamics and pathologies of war in modern times.  ...Dower also sets the U.S. occupations of Japan and Iraq side by side in strikingly original ways."--Abstract.
Book call no.: 355.00973 D746c

Duelfer, Charles.  Hide and Seek: The Search for Truth in Iraq.  New York, Public Affairs, 2009.  523 p.
American intelligence officer Charles Duelfer describes intelligence collection among other observations and lessons of the Iraq War, 2003.
Book call no.: 956.704431 D852h

Encyclopedia of Intelligence and Counterintelligence, edited by Rodney P. Carlisle.  Armonk, NY, M.E. Sharpe, 2004.  2 vols.
Book call no.: 327.1203 E561

Field Evaluation in the Intelligence and Counterintelligence Context, rapporteur Robert Pool.  Washington, National Academies Press, 2010.  104 p.
"Summary of September 22-23, 2009, National Research Council workshop on the field evaluation of behavioral and cognitive sciences--based methods and tools for use in the areas of intelligence and counterintelligence."--Publisher.
Book call no.: 327.12 F453

Grabo, Cynthia M.  Handbook of Warning Intelligence: Assessing the Threat to National Security.  Lanham, MD, Scarecrow Press, 2010.  307 p. (Scarecrow professional intelligence education series no. 12)
Book call no.: 327.1273 G727h

Graham, Thomas and Hansen, Keith A.  Preventing Catastrophe: The Use and Misuse of Intelligence in Efforts to Halt the Proliferation of Weapons of Mass Destruction.  Stanford, CA, Stanford University Press, 2009.  300 p.
Book call no.: 327.1745 G742p

Grau, Lester W. and Billingsley, Dodge.  Operation Anaconda: America's First Major Battle in Afghanistan.  Lawrence, KS, University Press of Kansas, 2011.  459 p + 1 DVD (4 3/4 in.).  (Modern war studies)
Highlights the lack of Intelligence sharing between U.S. agencies and coalition forces.
Book call no.: 958.104742 G774o

Harris, Shane.  The Watchers: The Rise of America's Surveillance State.  New York, Penguin Press, 2010.  418 p.
"Using exclusive access to key government sources, Shane Harris chronicles the rise of the American surveillance state over the past 25 years and highlights a dangerous paradox: our government's strategy has made it harder to catch terrorists and easier to spy on the rest of us."--Abstract.
Book call no.: 363.3251630973 H316w

Hatfield, Elizabeth L.  Finding Leaders: Preparing the Intelligence Community for Succession Management.  Washington, National Defense Intelligence College, Center for Strategic Intelligence Research, July 2008.  85 p. (Occasional paper no. 17)
Book call no.: 327.1273 H362f

Intelligence and Human Rights in the Era of Global Terrorism, edited by Steve Tsang.  Westport, CT, Praeger Security International, 2007.  224 p.
Book call no.: 327.12 I615

Intelligence and the National Security Strategist: Enduring Issues and Challenges, edited by Roger Z. George and Robert D. Kline.  Lanham, MD, Rowman & Littlefield, 2006.  596 p.
"This anthology of 39 previously published and new articles treats the evolution and structure of US intelligence and perspectives on controversial issues facing the intelligence community operating in a democracy."--Abstract.
Book call no.: 355.34320973 I61

The Intelligence Community: Overview and User's Guidelines, edited by Melanie S. Flores.  Hauppauge, NY, Nova Science Publishers, 2010.  109 p.
Book call no.: 327.1273 I612

Intelligence: The Secret World of Spies: An Anthology, edited with introductions by Loch K. Johnson and James J. Wirtz.  3rd ed.  New York, Oxford University Press, 2011.  564 p.
"Includes the history of intelligence, how the United States gathers and interprets global information, the meaning of security intelligence, methods of intelligence collection, intelligence analysis...and intelligence as practiced in other nations."--Publisher.
Book call no.: 327.12 I616

International Intelligence Cooperation and Accountability, edited by Hans Born and others.  New York , Routledge, 2011.  335 p. (Studies in intelligence series)
Book call no.: 327.12 I617

Jervis, Robert.  Why Intelligence Fails: Lessons From the Iranian Revolution and the Iraq War.  Ithaca, NY, Cornell University Press, 2010.  238 p. (Cornell studies in security affairs)
Book call no.: 955.053 J57w

Johnson, Loch K.  National Security Intelligence: Secret Operations in Defense of the Democracies.  Cambridge, Polity, 2012.  228 p.
Book call no.: 327.12091713 J67n

Johnson, Loch K.  The Threat on the Horizon: An Inside Account of America's Search for Security After the Cold War.  New York, Oxford University Press, 2011.  509 p.
Provides "invaluable resource for anyone interested in how the world's most powerful nation struggled to confront the new global threats that materialized after the collapse of the Soviet empire, and why Washington was unprepared for the calamities that would soon occur."--Abstract.
Book call no.: 355.033073 J67t

Joint Special Operations University, Special Operations Command.  2011 JSOU and NDIA SO/LIC Division Essays.  MacDill AFB, FL, JSOU Press, July 2011.  54 p. (JSOU report no. 11-4)
Review "Redefining Intelligence Support in a Resource Constrained Environment" by Carrick Longley, pp 1-11.
Also available online at:
https://jsou.socom.mil/JSOU%20Publications/11-4_Essays_110811b.pdf
Book call no.: 359.984 T974 2011

Jones, Brian.  Failing Intelligence: The True Story of How We Were Fooled Into Going to War in Iraq.  London, Biteback, 2010.  302 p.
Book call no.: 956.704431 J76f

Kennedy, Robert.  Of Knowledge and Power: The Complexities of National Intelligence.  Westport, CT, Praeger Security International, 2008.  261 p.
"This work examines the many roadblocks the Intelligence Community confronts as it attempts to provide accurate and timely intelligence in support of American foreign policy and national security interests."--Book jacket.
Book call no.: 327.1273 K36o

Lahneman, William J.  Keeping U.S. Intelligence Effective: The Need for a Revolution in Intelligence Affairs.  Lanham, MD, Scarecrow Press, 2011.  201 p. (Scarecrow professional intelligence education series no. 13)
Book call no.: 353.170973 L183k

Lowenthal, Mark M.  Intelligence: From Secrets to Policy.  4th ed.  Washington, CQ Press, 2009.  364 p.
Book call no.: 327.1273 L917i 2009

Major, James S.  Communicating with Intelligence: Writing and Briefing in the Intelligence and National Security Communities.  Lanham, MD, Scarecrow Press, 2008.  420 p. (Scarecrow professional intelligence education no. 1)
Book call no.: 808.066355 M234c

McDowell, Don.  Strategic Intelligence: A Handbook for Practitioners, Managers, and Users.  Rev. ed.  Lanham, MD, Scarecrow Press, 2009.  272 p. (Scarecrow professional intelligence education series no. 5)
Book call no.: 327.12 M138s

National Defense Intelligence College (U.S.).  Perspectives on Multinational Intelligence Cooperation for Peace Operations: International Intelligence Fellows Program.  Washington, National Defense Intelligence College, 2008.  426 p.
Book call no.: 355.3432 I612 2008

National Intelligence Systems: Current Research and Future Prospects, edited by Gregory F. Treverton and Wilhelm Agrell.  New York, Cambridge University Press, 2009.  294 p.
Book call no.: 327.12 N277

The National Security Enterprise: Navigating the Labyrinth, edited by Roger Z. George and Harvey Rishikof.  Washington, Georgetown University Press, 2011.  367 p.
Book call no.: 355.033073 N27713

Odom, William E.  Fixing Intelligence: For a More Secure America.  2nd ed.  New Haven, CT, Yale University Press, 2004.  230 p. (Yale Nota bene)
"William Odom is the highest-ranking member of the United States Intelligence Community ever to write a book outlining fundamental restructuring of this vast network of agencies, technology, and human agents."--Book jacket.
Book call no.: 355.34320973 O25f 2004

Olshansky, Barbara.  Democracy Detained: Secret, Unconstitutional Practices in the U.S. War on Terror.  New York, Seven Stories Press, 2007.  377 p.
"Prominent legal activist Barbara Olshansky documents the assault on our constitutional democracy since 9/11, meticulously analyzing the unlawful justifications made by the U.S. government for covert actions at home and abroad."--Book jacket.
Book call no.: 343.73014 O52d

The Oxford Handbook of National Security Intelligence, edited by Loch K. Johnson.  New York, Oxford University Press, 2010.  886 p. (Oxford handbooks)
Book call no.: 327.12 O98

Paglen, Trevor.  Blank Spots on the Map: The Dark Geography of the Pentagon's Secret World.  2nd ed.  New York, New American Library, 2010.  324 p.
The book tells of "an empire that continues to grow every year - an empire that doesn't even exist.  ...top secret agencies that make up what insiders call the 'black world.'"--P. 4 of cover.
Book call no.: 355.34320973 P138b 2010

Pillar, Paul R.  Intelligence and U.S. Foreign Policy: Iraq, 9/11, and Misguided Reform.  New York, Columbia University Press, 2011.  413 p.
Book call no.: 327.1273 P641i

Posner, Richard A.  Uncertain Shield: The U.S. Intelligence System in the Throes of Reform.  Lanham, MD, Rowman & Littlefield, 2006.  228 p. (Hoover studies in politics, economics, and society)
The author "argues that the decisions about structure the administration has made in implementation of the act [Intelligence Reform and Terrorism Prevention Act of 2004] are creating a too-top-heavy, too-centralized intelligence system."--Book jacket.
Book call no.: 327.1273 P855u

Renshon, Stanley Allen.  National Security in the Obama Administration: Reassessing the Bush Doctrine.  New York, Routledge, 2010.  291 p.
Book call no.: 355.033073 R421n

Richelson, Jeffrey.  The U.S. Intelligence Community.  6th ed.  Boulder, CO, Westview Press, 2012.  603 p.
The author "charts the evolution of the CIA, FBI, and military intelligence agencies and reveals the interrelationships between today's multifarious and awesomely sophisticated intelligence complexes."--Publisher's web.
Book call no.: 327.120973 R528u 2012

Rovner, Joshua.  Fixing the Facts: National Security and the Politics of Intelligence.  Ithaca, NY, Cornell University Press, 2011.  263 p. (Cornell studies in security affairs)
Book call no.: 327.1273 R875f

Shulsky, Abram N. and Schmitt, Gary James.  Silent Warfare: Understanding the World of Intelligence.  3rd ed.  Washington, Brassey's, 2002.  247 p.
Book call no.: 327.12 S562s 2002

Spinning Intelligence: Why Intelligence Needs the Media, Why the Media Needs Intelligence, edited by Robert Dover and Michael S. Goodman.  London, Hurst & Co., 2009.  263 p.
Book call no.: 070.44932712 S757

Strategic Denial and Deception: The Twenty-First Century Challenge, edited by Roy Godson and James J. Wirtz.  New Brunswick, NJ, Transaction Publishers, 2002.  256 p.
Discusses threats, effectiveness, and lessons learned concerning strategic denial and deception (D&D) of information.
Book call no.: 327.14 S898

Theoharis, Athan G.  The Quest for Absolute Security: The Failed Relations Among U.S. Intelligence Agencies.  Chicago, Ivan R. Dee, 2007.  309 p.
"Despite measures to promote cooperation, the nation has not enjoyed greater security and both the CIA and the FBI have turned this quest into abuses of power and violations of individual liberties."--Book jacket.
Book call no.: 327.1273 T391q

Thompson, James R. and Seidner, Rob.  Federated Human Resource Management in the Federal Government: The Intelligence Community Model.  Washington, IBM Center for the Business of Government, 2009.  42 p. (Human Capital Management Series)
"Unlike the traditional top-down approaches to policy development, the Office of the Director of National Intelligence worked closely with each of the 17 components of the Intelligence Community to agree upon a new human resource management framework.  The result is a robust set of changes that has achieved widespread acceptance."--Foreword.
Link is to synopsis of book.
Also available online at: http://www.businessofgovernment.org/sites/default/files/thompsonseidner_magazine.pdf
Book call no.: 658.3 T473f

Trahair, R. C. S. and Miller, Robert L.  Encyclopedia of Cold War Espionage, Spies, and Secret Operations.  Westport, CT, Greenwood Press, 2009.  572 p.
Book call no.: 327.1209 T765e 2009

Transforming U.S. Intelligence, edited by Jennifer E. Sims and Burton Gerber.  Washington, Georgetown University Press, 2005.  285 p.
Book call no.: 353.170973 T772

Treverton, Gregory F.  Intelligence for an Age of Terror.  New York, Cambridge University Press, 2009.  306 p.
"Intelligence for an Age of Terror outlines the extent of the challenges across both foreign and domestic data collection and analysis, presenting the issues of value that arise as new targets require collection of more information at home."--Book jacket.
Book call no.: 363.325163 T812i

Turner, Michael A.  Why Secret Intelligence Fails.  Dulles, VA, Potomac Books, 2005.  217 p.
"Why Secret Intelligence Fails provides a frank discussion of the problems of the American intelligence community.  ...[this book] explores each step of the intelligence cycle - priority setting, intelligence collection, analysis, production, and dissemination - to identify the 'inflection points' within each stage that contribute to intelligence failures.  Finally, he examines a variety of plans that, if implemented, would improve American intelligence."--Book jacket.
Book call no.: 327.1273 T949w

United States.  Congress.  House.  Permanent Select Committee on Intelligence.  Annual Threat Assessment of the U.S. Intelligence Community.  Hearing.  111th Congress, 2nd session, February 3, 2010.  Washington, GPO, 2010.  86 p.
Also available online at:
http://purl.access.gpo.gov/GPO/LPS121709
Book call no.: 355.033073 U58a

United States.  Congress.  House.  Permanent Select Committee on Intelligence.  Annual Threat Assessment of the U.S. Intelligence Community.  Hearing.  111th Congress, 1st session, February 25, 2009.  Washington, GPO, 2009.  80 p.
Also available online at:
http://purl.fdlp.gov/GPO/gpo3424
Book call no.: 355.033073 U58a 2009

United States.  Congress.  Senate.  Select Committee on Intelligence.  Intelligence Reform.  Hearings.  110th Congress, 1st session, January 23, 2007, January 25, 2007.  Washington, GPO, 2009.  167 p. (S. hrg. 110-839)
Also available online at:
http://purl.access.gpo.gov/GPO/FDLP156
Book call no.: 327.1273 U583ib

United States.  Defense Security Service.  Targeting U.S. Technologies.  Alexandria, VA, Defense Security Service, 2009.  48 p.
Under the heading "DSS Counterintelligence Trend Analysis Reports" select the report 2009.  Newer (2010-2011) reports can be accessed via the web too.
Also available online at:
http://www.dss.mil/about_dss/publications.html
Book call no.: 658.47 T255

United States.  Office of the Director of National Intelligence.  Vision 2015: A Globally Networked and Integrated Intelligence Enterprise.  Washington, Director of National Intelligence, 2008.  23 p.
"The purpose of this Vision document is to chart a new path forward for a globally networked and integrated Intelligence Enterprise for the 21st century based on the principles of integration, collaboration, and innovation."--P. 1.
Also available online at:
http://handle.dtic.mil/100.2/ADA487171
Book call no.: 327.1273 V831

United States.  Office of the Director of National Intelligence.  Office of General Counsel.  Intelligence Community Legal Reference Book.  2nd ed.  Washington, Office of the Director of National Intelligence, Office of General Counsel, 2009.  938 p.
"The Intelligence Community draws much of its authority and guidance from the body of law contained in this collection."--Abstract.
Book call no.: 343.7301 I61 2009

Waller, Douglas C.  Wild Bill Donovan: The Spymaster Who Created the OSS and Modern American Espionage.  New York, Free Press, 2011.  466 p.
"Donovan was director of the Office of Strategic Services (the country's first national intelligence agency) and the father of today's CIA."--Book jacket.
Book call no.: 940.548673092 W198w

Warner, Michael and McDonald, J. Kenneth.  US Intelligence Community Reform Studies Since 1947.  Washington, Strategic Management Issues Office, Center for the Study of Intelligence, 2005.  43 p.
Also available online at:
http://permanent.access.gpo.gov/lps65315/73531book.pdf
Book call no.: 353.172367 W283u

Who's Watching the Spies?: Establishing Intelligence Service Accountability, edited by Hans Born and others.  Washington, Potomac Books, 2005.  255 p.
"Experts...use a structured approach, to examine the strengths and weaknesses of the intelligence systems of Argentina, Canada, Germany, Norway, Poland, South Africa, South Korea, the United Kingdom, and the United States."--Book jacket.
Book call no.: 353.17235 W628

Zegart, Amy B.  Spying Blind: The CIA, The FBI, and the Origins of 9/11.  Princeton, NJ, Princeton University Press, 2007.  317 p.
"In this book, Amy Zegart provides the first scholarly examination of the intelligence failures that preceded September 11."--Book jacket.
Book call no.: 973.931 Z44s



Documents

Friedland, LeeEllen and others.  Socio-Cultural Perspectives: A New Intelligence Paradigm.  McLean, VA, MITRE Center for National Security Programs, June 2007.  70 p.
"Explores various ways in which socio-cultural perspectives could be used in intelligence analysis."--Abstract.
Also available online at:
http://www.mitre.org/work/tech_papers/tech_papers_08/07_1220/07_1220.pdf
Doc. call no.: M-U 40595-81 no.070244

Krizan, Lisa.  Intelligence Essentials for Everyone.  Washington, Joint Military Intelligence College, June 1999.  81 p. (Occasional paper/Joint Military Intelligence College (U.S.))
Also available online at:
http://handle.dtic.mil/100.2/ADA476726
Doc. call no.: M-U 44217 no.6



Documents (Student Research)

Bird, John J.  Analysis of Intelligence Support to the 1991 Persian Gulf War: Enduring Lessons.  Carlisle Barracks, PA, U.S. Army War College, March 19, 2004.  20 p. (USAWC strategy research project)
Also available online at:
http://handle.dtic.mil/100.2/ADA423282
Doc. call no.: M-U 39080-537 B6181a

Burke, Patrick A.  Collecting and Connecting the Dots: Leveraging Technology to Enhance the Collection of Information and the Dissemination of Intelligence.  Monterey, CA, Naval Postgraduate School, September 2009.  89 p.
Also available online at:
http://handle.dtic.mil/100.2/ADA510025
Doc. call no.: M-U 42525 B9596c

Dennis, Wade F.  Strategic Detention and Intelligence Operations: GTMO is the Answer.  Carlisle Barracks, PA, U.S. Army War College, 2008.  24 p. (USAWC strategy research project)
Concludes that "the Joint Detention Facility located at Guantanamo Bay, Cuba (GTMO)...was the correct choice in 2002 and remains the logical place to conduct these tasks today."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA480142
Doc. call no.: M-U 39080-537 D411s

English, Jason C.  Intelligence Community in the War on Terror: Progress of Reform.  Maxwell AFB, AL, Air Command and Staff College, April 2007.  34 p.
Doc. call no.: M-U 43122 E582i

Kristoffersen, Eirik.  A Requirement for a National Intelligence Support Team in Direct Support of Special Operations Forces Task Groups in Multinational Operations.  Quantico, VA, United States Marine Corps Command and Staff College, 2009.  25 p.
"The lack of intelligence cooperation among coalition forces causes severe problems for effective employment of Special Operations Forces (SOF) in multinational operations."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA509219
Doc. call no.: M-U 41886-71 K92r

Perry, Bruce H.  Information Sharing Among Intelligence, Law Enforcement, and Other Federal, State, and Local Agencies.  Maxwell AFB, AL, Air War College, February 15, 2008.  28 p.
Also available online at: http://dtlweb.au.af.mil///exlibris/dtl/d3_1/apache_media/L2V4bGlicmlzL2R0bC9kM18xL2FwYWNoZV9tZWRpYS8zNDMyMQ==.pdf
Doc. call no.: M-U 43117 P462i

Stone, Cristina M.  Collaborative Intel for Time Sensitive Targeting: Putting the National Intel Community on "Hot Mike".  Maxwell AFB, AL, Air Command and Staff College, April 2003.  32 p.
Doc. call no.: M-U 43122 S8772c

Thornlow, Christopher C.  Fusing Intelligence with Law Enforcement Information: An Analytic Imperative.  Monterey, CA, Naval Postgraduate School, March 2005.  59 p.
"The United States Northern Command Intelligence Directorate (USNORTHCOM J2) must be able to use all intelligence sources, including law enforcement information, to better understand the potential threats and capabilities arrayed against it."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA432327
Doc. call no.: M-U 42525 T512f

Watts, Dawn W.  How We can Win the Long War: A New Interagency Approach to the GWOT.  Maxwell AFB, AL, Air Command and Staff College, April 2009.  30 p.
Offers solutions and "identifies the problems inherent in the current interagency process as it relates to the Global War on Terrorism (GWOT)."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA539777
Doc. call no.: M-U 43122 W3491h

Wenks, Kevin M.  Are We Tracking the Dragon?: Ensuring the Intelligence Community Is Properly Postured to Monitor an Emerging China.  Monterey, CA, Naval Postgraduate School, March 2008.  101 p.
"Viewing current IC reform through the prisms of organization, doctrine and technology, this thesis shows which steps are headed in the right direction, and where there remains room for improvement."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA480035
Doc. call no.: M-U 42525 W475a



Periodicals

Bar-Joseph, Uri.  The Professional Ethics of Intelligence Analysis.  International Journal of Intelligence & CounterIntelligence  24:22-43  Spring 2011.
"An article discussing the future of intelligence analysis in the 21st-century is presented.  ...The relationship between the IC and the press is also included."--Abstract.

Blair, Dennis C.  Road Rules for the Intelligence Community.  Vital Speeches of the Day  76:176-183  April 2010.
"Speech by Dennis C.  Blair, the U.S. Director of National Intelligence...Topics include a document called 'Richard's Rules of the Road,' the U.S. intelligence service, homeland security, and the Reserve Officer's Training Corps or ROTC program at Kansas State"--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=48950742&site=ehost-live&custid=airuniv

Copley, Gregory R.  Re-Thinking Strategic-Level Policy Security and Intelligence in a Time of Technological and Social Transformation.  Defense & Foreign Affairs Strategic Policy  38, no. 8:11-13  2010.

Dahl, Erik J.  Missing the Wake-Up Call: Why Intelligence Failures Rarely Inspire Improved Performance.  Intelligence & National Security  25:778-799  December 2010.
Examines "intelligence failures as 'focusing events', which is a concept used in the literature on government policy making to explain how disasters and crises can stimulate policy change and help organizations and decision-makers learn."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=56448423&site=ehost-live&scope=site&custid=airuniv

Deibert, Ronald.  Militarizing Cyberspace.  Technology Review  113:12  July-August 2010.
"Argues that to preserve the open Internet, governments must stop the cyber arms race...an arms race in cyberspace creates an environment in which crime, espionage, malware, denial of service, filtering, and surveillance prosper and thrive."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=53735059&site=ehost-live&scope=site&custid=airuniv

Dipert, Randall R.  The Ethics of Cyberwarfare.  Journal of Military Ethics  9:384-410  December 2010.
"Addresses several issues in the morality of cyberwar and cyberwarfare...sketches the diverse technical ways in which an attack may occur, including denial-of-service attacks and the insertion of various forms of malware."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=56042207&site=ehost-live&scope=site&custid=airuniv

Epstein, Keith and others.  The Taking of NASA’s Secrets.  Business Week  No.  4110:73-79  December 1, 2008.
"The article discusses the stealing of secret information from the computer systems of the U.S. National Aeronautics and Space Administration (NASA) by foreign hackers."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=35536733&site=ehost-live&scope=site&custid=airuniv

Frerichs, Rebecca L. and Di Rienzo, Stephen R.  Establishing a Framework for Intelligence Education and Training.  JFQ: Joint Force Quarterly  62:68-73  3rd Quarter 2011.
"The article discusses the development of an education and training program for intelligence officers in the U.S. Intelligence Community (IC)."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=63992596&site=ehost-live&scope=site&custid=airuniv

Friedman, Norman.  Too Much Access?  U.S. Naval Institute Proceedings  136:88-89  August 2010.
"Wikileaks leaked the information which it claims to reveal wrong doing of the government as it had access to database of 260,000 classified cables of the U.S. State Department."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=52805371&site=ehost-live&scope=site&custid=airuniv

George, Roger Zane.  Beyond Analytic Tradecraft.  International Journal of Intelligence & CounterIntelligence  23:296-306  Summer 2010.
"This article discusses the changes that have been made in the U.S. Intelligence Community since the terrorist attacks of September 11, 2001 and the need for more changes."--Abstract.

Hagelin, Bjorn.  Science, Security and Spies.  European Security  18:483-500  December 2009.
"Will we see more scientists, in their normal scientific activities, being accused of spying?...Spy cases in less democratic countries could have consequences for scientists also in other countries."--Abstract.

Hammond, Thomas H.  Intelligence Organizations and the Organization of Intelligence.  International Journal of Intelligence & CounterIntelligence  23:680-724  Winter 2010.
"Examples of intelligence failure and how it can be prevented with proper organizational structure."--Abstract.

Hitz, Frederick P.  The Future of American Espionage.  International Journal of Intelligence & CounterIntelligence  13:1-20  January 2000.
"Assesses the quality of the United States' espionage establishment or intelligence community as it enters the 21st century."--Abstract.

Howe, James.  Defeating the UNKNOWN Terrorist.  U.S. Naval Institute Proceedings  134:38-42  October 2008.
"The article focuses on the thousands of unknown terrorists, who are the anonymous jihadists, stoking anti-Western hatred on the world wide web."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=34917641&site=ehost-live&scope=site&custid=airuniv

Leslau, Ohad.  The Effect of Intelligence on the Decisionmaking Process.  International Journal of Intelligence & CounterIntelligence  23:426-448  Fall 2010.
"The article looks at the factors that influence the way in which the intelligence product is used.  The author talks about the relationship between both the intelligence agencies and intelligence personnel, and with the decisionmakers."--Abstract.

Magnuson, Stew.  When it Comes to Cybersecurity, the 'Who is Responsible for What?' Debate Continues.  National Defense  95:12-13  June 2011.
"Discusses the ongoing debate on the responsibility over cybersecurity."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=61203302&site=ehost-live&scope=site&custid=airuniv

McConnell, Mike.  Overhauling Intelligence.  Foreign Affairs  86:49-58  July-August 2007.
"The article focuses on the need to expand on and reform current U.S. intelligence establishments.  It talks about the barriers established by the National Security Act of 1947 which divided U.S. intelligence capabilities into four areas of responsibility."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=25610515&site=ehost-live&custid=airuniv

McKenna, Ted.  Mixed Signals.  Journal of Electronic Defense  28:49-55  May 2005.
"Signals intelligence, including both communications intelligence and electronic--typically radar--intelligence is...becoming as integral a part of network-centric warfare as any other type of intelligence."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=aph&an=17173119&custid=airuniv

Miller, Bowman H.  Soldiers, Scholars, and Spies: Combining Smarts and Secrets.  Armed Forces & Society  36:695-715  July 2010.
"Finding the appropriate balance between helping safeguard national security and upholding the tenets of professional integrity is a joint task of soldiers, scholars, and spies."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=52368441&site=ehost-live&scope=site&custid=airuniv

Muller, David G.  Improving Futures Intelligence.  International Journal of Intelligence & CounterIntelligence  22:382-395  Fall 2009.
Discusses Global Trends reports written by the U.S. National Intelligence Council (NIC) and the Joint Strategic Assessment reports published by the U.S. Defense Intelligence Agency (DIA).

Neary, Patrick C.  Intelligence Reform, 2001-2009: Requiescat in Pace?  Studies in Intelligence  54:1-16  March 2010.
"The article looks at the urge of national intelligence reform in the U.S."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=52290080&site=ehost-live&scope=site&custid=airuniv

Nemeth, Erik.  Collecting Cultural Intelligence: The Tactical Value of Cultural Property.  International Journal of Intelligence & CounterIntelligence  24:217-238  Summer 2011.
"An overview of the history of efforts to gather tactical intelligence about cultural assets is provided, and international treaties regarding the protection of such items are discussed."--Abstract.

Nolte, William M.  Ethics and Intelligence.  JFQ: Joint Force Quarterly  54:22-29  3rd Quarter 2009.
"The article discusses the ethics of intelligence in the U.S.  It states that intelligence services are considered as instruments for regime survival."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=44242044&site=ehost-live&scope=site&custid=airuniv

Olcott, Anthony C.  The Challenges of Clashing IC Interests.  International Journal of Intelligence & CounterIntelligence  23:623-635  Winter 2010.

Pillar, Paul R.  Think Again: Intelligence.  Foreign Policy  191:1-10  January-February 2012.
"The article evaluates U.S. President's use of intelligence services when making decisions pertaining to the nation's foreign and military policies."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=70332844&site=ehost-live&scope=site&custid=airuniv

Shelton, Christina.  The Roots of Analytic Failures in the U.S. Intelligence Community.  International Journal of Intelligence & CounterIntelligence  24:637-655  Winter 2011-2012.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=65412788&site=ehost-live&scope=site&custid=airuniv

Spies for Hire.  Foreign Policy  165:23  March-April 2008.
"The article discusses the outsourcing of U.S. intelligence work to private firms.  The transmission of state secrets by defense companies is examined.  The practice of recruiting government analysts to private defense companies is also explored."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=31295993&site=ehost-live&scope=site&custid=airuniv

Turner, Michael A.  A Distinctive U.S. Intelligence Identity.  International Journal of Intelligence & CounterIntelligence  17:42-61  Spring 2004.
"Analyzes reasons behind the failure of the U.S. intelligence community to prevent the September 11, 2001, terrorist attacks."--Abstract.

Wippl, Joseph W.  Intelligence Exchange Through InterIntel.  International Journal of Intelligence & CounterIntelligence  25:1-18  March 30, 2012.
"The article discusses intelligence exchange between both foreign and domestic intelligence services.  It is suggested that intelligence exchange is key to combating multilateral threats such as terrorism and organized crime and will occur more often in the future."--Abstract.


Intelligence Community

CIA | Department of Defense | Department of Homeland Security | Department of Justice Other


CIA


Internet Resources

Center for the Study of Intelligence.  
Available online at: https://www.cia.gov/library/center-for-the-study-of-intelligence/index.html
This CIA site contains articles relating to intelligence research, intelligence history and historical record. 

Office of the Director of National Intelligence.  
Available online at: http://www.dni.gov/
Oversees the Intelligence Community. 

Office of the National Counterintelligence Executive (ONCIX).  
Available online at: http://www.ncix.gov/

U.S. Central Intelligence Agency.  
Available online at: https://www.cia.gov


Books

Ahern, Thomas L.  Vietnam Declassified: The CIA and Counterinsurgency.  Lexington, KY, University Press of Kentucky, 2010.  450 p.
Book call no.: 959.70438 A285v

Batvinis, Raymond J.  The Origins of FBI Counterintelligence.  Lawrence, KS, University Press of Kansas, 2007.  332 p. (Modern war studies)
Book call no.: 327.1273 B336o

Callanan, James.  Covert Action in the Cold War: US Policy, Intelligence, and CIA Operations.  London, I.B. Tauris, 2010.  268 p. (International library of twentieth century history no. 21)
"This comprehensive examination of a still controversial subject sheds valuable new light on the undercover operations mounted by the CIA during the Cold War."--Product description.
Book call no.: 327.1273009045 C156c

Diamond, John M.  The CIA and the Culture of Failure: U.S. Intelligence from the End of the Cold War to the Invasion of Iraq.  Stanford, CA, Stanford Security Series, 2008.  536 p.
"The 9/11 attacks and the War in Iraq sprang in no small part from massive intelligence failures, that much is well understood.  How the CIA got to a point where it could fail so catastrophically is not."--Book jacket.
Book call no.: 327.1273 D537c

Faddis, Charles S.  Beyond Repair: The Decline and Fall of the CIA.  Guilford, CT, Lyons Press, 2010.  183 p.
Book call no.: 327.1273 F144b

Goodman, Melvin A.  Failure of Intelligence: The Decline and Fall of the CIA.  Lanham, MD, Rowman & Littlefield, 2008.  394 p.
"Offers a provocative mingling of historical description with contemporary political analysis and reform prescription that challenges the conventional wisdom on clandestine collection...asserts that the failure to have diplomatic relations has led to the inability to collect intelligence."--Book jacket.
Book call no.: 327.1273 G653f

Johnston, Rob.  Analytic Culture in the US Intelligence Community: An Ethnographic Study.  Washington, Center for the Study of Intelligence, Central Intelligence Agency, 2005.  161 p.
Also available online at:
http://handle.dtic.mil/100.2/ADA507369
Book call no.: 353.170973 J73a

Jones, Ishmael.  The Human Factor: Inside the CIA's Dysfunctional Intelligence Culture.  New York, Encounter Books, 2008.  383 p.
"Jones became convinced that the CIA's failure to fulfill its purpose endangers Americans.  Attempting reform from within proved absurd, and Jones resigned from the CIA to make a public case for reform through the writing of this book."--Book jacket.
Book call no.: 327.1273 J77h

Kessler, Ronald.  The CIA at War: Inside the Secret Campaign Against Terror.  New York, St. Martin's Press, 2003.  362 p.
"The book explores whether the CIA can be trusted, whether its intelligence is politicized, and whether it is capable of winning the war on terror.  In doing so, the book weaves in the history of the CIA and how it really works."--Book jacket. 
Book call no.: 973.931 K42c

Rustmann, F. W., Jr.  CIA, Inc.: Espionage and the Craft of Business Intelligence.  Washington, Brassey's, 2002.  217 p.
"This book teaches the principles of intelligence and counterintelligence using the CIA's methods as a model for the business world."--Book jacket.
Book call no.: 658.47 R971c

Warrick, Joby.  The Triple Agent: The Al-Qaeda Mole Who Infiltrated the CIA.  New York, Doubleday, 2011.  244 p.
"With his breathtaking accounts from inside al-Qaeda's lair, Balawi appeared poised to become America's greatest double agent in half a century, but he was not at all what he seemed."--Book jacket.
Book call no.: 363.325092 W295t

Weiner, Tim.  Legacy of Ashes: The History of the CIA.  New York, Doubleday, 2007.  702 p.
Book call no.: 327.1273009 W423L

Zegart, Amy B.  Spying Blind: The CIA, The FBI, and the Origins of 9/11.  Princeton, NJ, Princeton University Press, 2007.  317 p.
"In this book, Amy Zegart provides the first scholarly examination of the intelligence failures that preceded September 11."--Book jacket.
Book call no.: 973.931 Z44s


Document

Best, Richard A. and Feickert, Andrew.  Special Operations Forces (SOF) and CIA Paramilitary Operations: Issues for Congress.  Washington, Congressional Research Service, August 3, 2009.  6 p. (CRS report for Congress, RS22017)
Link provides access to other versions of this report. 
Also available online at:
http://opencrs.com/document/RS22017
Doc. call no.: M-U 42953-1 no.-RS22017


Periodicals

Clemente, Jonathan.  CIA's Medical and Psychological Analysis Center (MPAC) and the Health of Foreign Leaders.  International Journal of Intelligence & CounterIntelligence  19:385-423  Fall 2006.

Lowenthal, Mark M.  The Intelligence Time Event Horizon.  International Journal of Intelligence & CounterIntelligence  22:369-381  Fall 2009.
"Discusses the difficulty of making long-term predictions and their feasibility...as an example, the belief that weapons of mass destruction (WMDs) were in Iraq."--Abstract.

Muller, David G.  Improving Futures Intelligence.  International Journal of Intelligence & CounterIntelligence  22:382-395  Fall 2009.
Discusses Global Trends reports written by the U.S. National Intelligence Council (NIC) and the Joint Strategic Assessment reports published by the U.S. Defense Intelligence Agency (DIA).

Shelton, Christina.  The Roots of Analytic Failures in the U.S. Intelligence Community.  International Journal of Intelligence & CounterIntelligence  24:637-655  Winter 2011-2012.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=65412788&site=ehost-live&scope=site&custid=airuniv

Stiefler, Todd.  CIA's Leadership and Major Covert Operations: Rogue Elephants or Risk-Averse Bureaucrats?  Intelligence & National Security  19:632-654  Winter 2004.
Discusses "accusations that the Central Intelligence Agency has distorted intelligence analysis to encourage covert operations."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=15496503&site=ehost-live&scope=site&custid=airuniv


Department of Defense


Internet Resources

Air Force ISR Agency Overview.  Tactical ISR Technology  1, no. 5  December 2011.
Available online at: http://www.special-operations-technology.com/tisr-home/372-tisr-2011-volume-1-issue-5-december/5069-air-force-isr-agency-overview.html

Air War College: Gateway to Intelligence. 
Available online at: http://www.au.af.mil/au/awc/awcgate/awc-ntel.htm
Numerous subject links to intelligence areas.

Boaru, Gheorghe and Ilies, Ioan-Mihai.  Information Assurance-Intelligence-Information Superiority Relationship Within NATO Operations.  Journal of Defense Resources Management  2:111-120  October 2011.
Available online at: http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=66933757&site=ehost-live&scope=site&custid=airuniv
"There is a tight relationship between information assurance, the intelligence cycle and information superiority within NATO operations."--Abstract.

Department of Defense.  National Security Agency (NSA).
Available online at: http://www.nsa.gov/

Department of Defense Cyber Crime Center (DC3).
Available online at: http://dc3.mil/dc3/dc3About.php
"The Department of Defense Cyber Crime Center (DC3) sets standards for digital evidence processing, analysis, and diagnostics for any DoD investigation that requires computer forensic support to detect, enhance, or recover digital media, including audio and video."--Website.

Isherwood, Michael W.  Layering ISR Forces.  Washington, Mitchell Institute for Airpower Studies.  Mitchell Institute Press, 2011.  39 p. (Mitchell paper no. 8)
Available online at: http://www.afa.org/Mitchell/Reports/MP8_ISR_1211.pdf

Keller, John.  DOD Earmarks at Least $31.6 Billion for C4ISR Procurement and Research Next Year.  Military & Aerospace Electronics  23:6-7  April 2012.
Available online at: http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=74208957&site=ehost-live&custid=airuniv

Kuniyuki, Yukio A., III.  ISR Support to Non-lethal Operations.  Military Intelligence Professional Bulletin  36:18-23  July-September 2010.
Available online at:
http://search.proquest.com/docview/1017697949/13A46ADC1F2514A3B25/10?accountid=4332

National Air & Space Intelligence Center.
Available online at: http://www.afisr.af.mil/units/nasic/index.asp
The National Air and Space Intelligence Center (NASIC) is the Department of Defense's (DoD) primary source for foreign air and space threats.

National Geospatial-Intelligence Agency (NGA).
Available online at: https://www1.nga.mil/Pages/default.aspx

Negulescu, Florin.  Intelligence Sharing and Dissemination in Combined Joint Special Operations.  Journal of Defense Resources Management  2:99-104  October 2011.
Available online at: http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=66933755&site=ehost-live&scope=site&custid=airuniv

U.S. Defense Intelligence Agency.
Available online at: http://www.dia.mil

U.S. Department of the Air Force ISR (Intelligence, Surveillance and Reconnaissance) Agency.
Available online at: http://www.afisr.af.mil/

U.S. Department of the Army.  Intelligence and Security Command (INSCOM).
Available online at: http://www.inscom.army.mil

U.S. Department of the Marine Corps.  Marine Corps Intelligence Activity.
Available online at: http://www.quantico.usmc.mil/activities/?Section=MCIA

U.S. Department of the Navy.  Office of Naval Intelligence (ONI).
Available online at: http://www.oni.navy.mil/

U.S. Marine Corps.  Intelligence Department (MCIA).
Available online at: http://www.hqmc.marines.mil/intelligence/UnitHome.aspx

U.S. National Reconnaissance Office.
Available online at: http://www.nro.gov

U.S. National Security Agency/Central Security Service.
Available online at: http://www.nsa.gov

United States.  Army Training and Doctrine Command.  Dept. of the Army.  The U.S. Army Functional Concept for Intelligence, 2016-2028.  Fort Monroe, VA, Army Training and Doctrine Command, October 13, 2010.  88 p.
Available online at: http://handle.dtic.mil/100.2/ADA540655
TRADOC Pam 525-2-1.

United States.  Department of the Navy and Headquarters United States Marine Corps.  Naval Doctrine Publication (NDP) 2: Naval Intelligence.  Washington, September 30, 1994.  77 p.
Available online at: http://www.fas.org/irp/doddir/navy/ndp2.htm
Naval Intelligence NDP 2 outlines broad guidance for Navy and Marine Corps intelligence.

United States.  Department of Defense.  U.S. Northern Command (USNORTHCOM).
Available online at: http://www.northcom.mil/

United States.  Government Accountability Office.  Intelligence, Surveillance, and Reconnaissance: Actions are Needed to Increase Integration and Efficiencies of DOD's ISR Enterprise: Report to Congressional Committees.  Washington, U.S. GAO, June 2011.  33 p.
Available online at: http://www.gao.gov/new.items/d11465.pdf

United States.  Government Accountability Office.  Intelligence, Surveillance, and Reconnaissance: DOD Needs a Strategic, Risk-Based Approach to Enhance Its Maritime Domain Awareness: Report to Congressional Requesters.  Washington, U.S. GAO, June 2011.  33 p.
Available online at: http://www.gao.gov/assets/320/319811.pdf


Internet Resources (Student Research)

Acanfora, Matthew J.  Centers of Stability Analysis - The Missing Framework in Joint Intelligence Preparation of the Operational Environment Doctrine.  Newport, RI, Naval War College, May 4, 2011.  22 p.
Available online at: http://handle.dtic.mil/100.2/ADA545960
"Describes the current scope of phase zero stability operations and JIPOE (Joint Intelligence Preparation of the Operational) analysis...explains how the threat-based analysis does not work for stability operations with specific stability objectives."--Abstract.

Dacus, Andrew P.  Impact of C4ISR/Digitization and Joint Force Ability to Conduct the Global War on Terror (GWOT): A Monograph.  Fort Leavenworth, KS, School of Advanced Military Studies, U.S. Army Command and General Staff College, May 25, 2006.  66 p.
Available online at: http://handle.dtic.mil/100.2/ADA463122
"Multiple systems from space, to aircraft and UAVs, to ground systems are required to empower the Joint Force.  Through the successful implementation of these systems, a global C4ISR structure can be described as the primary enabler that empowers Joint Forces to successfully conduct the Global War on Terror."--Abstract.

Downs, Michael L.  Rethinking the CFACC's Intelligence, Surveillance, and Reconnaissance Approach to Counterinsurgency.  Newport, RI, Naval War College, May 10, 2007.  22 p.
Available online at: http://handle.dtic.mil/100.2/ADA470834
This paper "explains the ISR requirements of U.S. commanders in Iraq and Afghanistan and the CFACC’s deficiencies in meeting these needs."--Abstract.

Fussell, Christopher and others.  What Makes Fusion Cells Effective?  Monterey, CA, Naval Postgraduate School, December 2009.  121 p.
Available online at: http://handle.dtic.mil/100.2/ADA514114
"This thesis will examine what characteristics enable three types (DoD-led, State and Local Fusion Centers, and DOJ/OGA-led fusion cells) of fusion cells to be most effective."--Abstract.

Lupa, Joseph.  Simulation of National Intelligence Process With Fusion.  Wright-Patterson AFB , OH, Air Force Institute of Technology, March 2008.  87 p.
Available online at: http://handle.dtic.mil/100.2/ADA480399
"This work is a follow on effort of two previous Master's theses.  ...Both methods are compared to each other and to the baseline model where no fusion takes place."--Abstract.

McInnis, Larry.  Intelligence Support to Civil-Military Operations: The Application of Joint Doctrine.  Norfolk, VA, Joint Forces Staff College, April 4, 2008.  82 p.
Available online at: http://handle.dtic.mil/100.2/ADA487176
"This research examines select intelligence failures during complex contingency operations between 1990 to the present and considers whether adherence to joint doctrine might have alleviated these shortcomings."--Abstract.

Vogelhut, Jonas.  Coalition Mission Command: Balancing Information Security and Sharing Requirements.  Carlisle Barracks, PA, U.S. Army War College, February 28, 2011.  28 p.
Available online at: http://handle.dtic.mil/100.2/ADA553143
"Reviews the background of coalition information sharing, introduces its benefits...ongoing efforts in information sharing, including the Afghan Mission Network (AMN) that is currently in use in Afghanistan."--Abstract.


Books

Aid, Matthew M.  The Secret Sentry: The Untold History of the National Security Agency.  New York, Bloomsbury Press, 2009.  423 p.
Book call no.: 327.1273 A288s

Bayer, Michael D.  The Blue Planet: Informal International Police Networks and National Intelligence.  Washington, National Defense Intelligence College, February 2010.  179 p.
This book "...makes a powerful argument for why the United States needs to make better use of its federal law enforcement agencies abroad as an integral part of our national counterterrorism strategy."--P. vii.
Also available online at:
http://ni-u.edu/ni_press/pdf/18507.pdf
Book call no.: 363.23 B357b

Davis, Paul K. and Wilson, Peter A.  Looming Discontinuities in U.S. Military Strategy and Defense Planning: Colliding RMAs Necessitate a New Strategy.  Santa Monica, CA, RAND Corp, 2011.  57 p. (Occasional paper, OP-326-OSD)
"Argues causes of discontinuity in the United States include technology diffusion that is leveling aspects of the playing field militarily, geostrategic changes, and the range of potential adversaries."--RAND website. 
Refer to pp 22 for ISR survivability and sustainability issue.
Also available online at:
http://www.rand.org/pubs/occasional_papers/OP326.html
Book call no.: 355.6840973 D263L

Electronic Warfare, edited by Adam T. Elsworth.  New York, Nova Science Publishers, 2010.  192 p. (Defense, security and strategy series)
Book call no.: 355.4 E38

Grunwald, Michael.  Transforming Air Force ISR for the Long War and Beyond.  Maxwell AFB, AL, Air University Press, January 2009.  20 p. (Wright flyer paper no. 36)
Also available online at:
http://handle.dtic.mil/100.2/ADA495105
Book call no.: 355.33041 G891t

Institute of Land Warfare.  Key Issues Relevant to Army Intelligence Transformation.  Arlington, VA, Institute of Land Warfare, Association of the United States Army, July 2007.  15 p. (Torchbearer national security report)
Also available online at:
http://www.ausa.org/publications/torchbearercampaign/tnsr/Documents/TNSR_07-07_Intel.pdf
Book call no.: 355.343 K44

Johnson, Daniel R.  Enabling Intelligence, Surveillance, and Reconnaissance Effects for Effects-Based Operations Conditions.  Maxwell AFB, AL, Air University Press, June 2005.  35 p. (Maxwell papers/Air University (U.S.) Air War College no. 34)
Also available online at:
http://www.au.af.mil/au/awc/awcgate/maxwell/mp34.pdf
Book call no.: 355.42 J68e

Net-Centric Approaches to Intelligence and National Security, edited by Roy Ladner and Frederick E. Petry.  New York, Springer Science+Business Media, 2005.  178 p.
Book call no.: 327.120285 N469

Netted Bugs and Bombs: Implications for 2010, edited by Marsha J. Kwolek.  Maxwell Air Force Base, AL, Center for Strategy and Technology, Air War College, Air University, 2005.  416 p. (Occasional paper no. 40-51)
Refer to Chapter 4, Lowering the High Ground: Using Near-Space Vehicles for Persistent ISR by Knudelka, Benjamin F., pp 101-132.  This is the same student thesis M-U 43122 K721 found in documents, Increasing C3ISR Persistence by Lowering the Ultimate High Ground: Using Near Space Vehicles in the Pursuit of Persistent C3ISR by Benjamin F. Knudelka.
Also available online at:
http://www.au.af.mil/au/awc/awcgate/cst/bugs_ch04.pdf
Book call no.: 355.80973 N473

Paul, Christopher and others.  Alert and Ready: An Organizational Design Assessment of Marine Corps Intelligence.  Santa Monica, CA, RAND Corp., 2011.  201 p. (RAND Corporation monograph series, MG1108)
Also available online at:
http://www.rand.org/pubs/monographs/MG1108.html http://handle.dtic.mil/100.2/ADA546835
Book call no.: 355.3432 A369

Perry, David L.  Partly Cloudy: Ethics in War, Espionage, Covert Action, and Interrogation.  Lanham, MD, Scarecrow Press, 2009.  247 p. (Scarecrow professional intelligence education series no. 6)
Book call no.: 172.42 P462p

Stone, Cristina M.  Air Force Intelligence Role in Combating Weapons of Mass Destruction.  Maxwell AFB, AL, Air War College, 2006.  32 p. (Maxwell paper no. 39)
Also available online at:
http://handle.dtic.mil/100.2/ADA462287
Book call no.: 355.3432 S877a

Trenear-Harvey, Glenmore S.  Historical Dictionary of Air Intelligence.  Lanham, MD, Scarecrow Press, 2009.  219 p. (Historical dictionaries of intelligence and counterintelligence no. 9)
Also available online as an EBSCOHost eBook at:
http://search.ebscohost.com/login.aspx?authtype=ip,uid&custid=airuniv&direct=true&scope=site&db=nlebk&db=nlabk&AN=267379
Book call no.: 358.41343203 T794h

Wirth, Kevin E.  The Coast Guard Intelligence Program Enters the Intelligence Community: A Case Study of Congressional Influence on Intelligence Community Evolution.  Washington, National Defense Intelligence College, 2007.  109 p. (Occasional paper no. 16)
Book call no.: 363.2860973 W799c


Documents

Best, Richard A., Jr.  Intelligence Community Reorganization: Potential Effects on DOD Intelligence Agencies.  Washington, Congressional Research Service, 2004.  16 p. (CRS report for Congress, RL32515)
Also available online at:
http://handle.dtic.mil/100.2/ADA447931.pdf
Doc. call no.: M-U 42953-1 no.04-RL32515

Best, Richard A., Jr. and Feickert, Andrew.  Special Operations Forces (SOF) and CIA Paramilitary Operations: Issues for Congress.  Washington, Congressional Research Service, August 3, 2009.  6 p. (CRS report for Congress, RS22017)
Link provides access to other versions of this report.
Also available online at:
http://opencrs.com/document/RS22017
Doc. call no.: M-U 42953-1 no.-RS22017

Kramer, Lisa A. and others.  Technological, Social, and Economic Trends That Are Increasing U.S. Vulnerability to Insider Espionage.  Monterey, CA, Defense Personnel Security Research Center, May 2005.  31 p.
Also available online at:
http://handle.dtic.mil/100.2/ADA433793
Doc. call no.: M-U 43901 no.05-10

Mason, R. Chuck.  Securing America's Borders: The Role of the Military.  Washington, Congressional Research Service, 2010.  7 p. (CRS report for Congress, R41286)
Also available online at:
http://handle.dtic.mil/100.2/ADA524243
Doc. call no.: M-U 42953-1 no.R41286

United States.  Defense Science Board and others.  Report of Joint Defense Science Board, Intelligence Science Board Task Force on Integrating Sensor-Collected Intelligence.  Washington, Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics, December 2008.  106 p.
Also available online at:
http://purl.access.gpo.gov/GPO/LPS109913
Doc. call no.: M-U 40607-222

United States.  Defense Science Board.  Task Force on Operations Research Applications for Intelligence, Surveillance and Reconnaissance ISR.  Report of the Defense Science Board Advisory Group on Defense Intelligence, Operations Research Applications for Intelligence, Surveillance and Reconnaissance (ISR).  Washington, Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics, January 2009.  56 p.
Also available online at:
http://handle.dtic.mil/100.2/ADA493773 http://purl.access.gpo.gov/GPO/LPS108441
Doc. call no.: M-U 40607-223

United States.  Dept. of the Air Force.  Global Integrated Intelligence, Surveillance, & Reconnaissance Operations (AFDD 2-0).  Maxwell AFB, AL, LeMay Center for Doctrine Development and Education, January 6, 2012.  71 p. (Air Force Doctrine Document 2-0)
AFDD 2-0 provides fundamental principles and operational-level U.S. Air Force doctrine for ISR operations.
Also available online at:
http://www.e-publishing.af.mil/shared/media/epubs/AFDD2-0.pdf
Doc. call no.: Shelved by AF series

United States.  Dept. of the Army.  Human Intelligence Collector Operations.  Washington, Headquarters Department of the Army, September 2006.  1 vol.  (FM 2-22.3)
Also available online at: http://www.globalsecurity.org/intell/library/policy/army/fm/2-22-3/fm2-22-3.pdf
Doc. call no.: M-U 35062-78 no.2-22.3

United States.  Dept. of the Army.  Intelligence.  Washington, Headquarters Department of the Army, March 2010.  1 vol.  (FM 2-0)
For official use only.  Distribution authorized to U.S. Government agencies and their contractors only.  FM 2-0 is the Army’s keystone manual for military intelligence (MI) doctrine.
Doc. call no.: M-U 35062-78 no. 2-0 2010

United States.  Joint Chiefs of Staff.  Joint and National Intelligence Support to Military Operations.  Washington, Joint Chiefs of Staff, 5 January 2012.  281 p. (Joint publication 2-01)
Also available online at:
http://www.dtic.mil/doctrine/new_pubs/jp2_01.pdf
Doc. call no.: M-U 40592 no.2-01 (2012 January 5)

United States.  Joint Chiefs of Staff.  Joint Intelligence.  Washington, Joint Chiefs of Staff, 22 June 2007.  150 p. (Joint Publication 2-0) 
Also available online at:
http://www.dtic.mil/doctrine/new_pubs/jp2_0.pdf
Doc. call no.: M-U 40592 no.2-0 2007

United States.  Office of the Chairman of the Joint Chiefs of Staff.  Geospatial Intelligence Support to Joint Operations.  Washington, Office of the Chairman, Joint Chiefs of Staff, 31 October 2012.  135 p. (Joint Publication 2-03)
Also available online at:
http://www.dtic.mil/doctrine/new_pubs/jp2_03.pdf
Doc. call no.: M-U 40592 no.2-03 2012

United States.  Office of the Chairman of the Joint Chiefs of Staff.  Joint Intelligence Preparation of the Operational Environment.  Washington, Office of the Chairman, Joint Chiefs of Staff, 2009.  285 p. (Joint Publication 2-01.3)
"This publication supersedes JP 2-01.3, 24 May 2000, Joint tactics, techniques, and procedures for joint intelligence preparation of the battlespace."--P. F-1.
Doc. call no.: M-U 40592 no.2-01.3 (2009 June 16)


Documents (Student Research)

Acord, Michael Dane.  IPB: Predicting an Unpredictable Enemy: Why We Do It?: Why the S2 Can't Do It?: Why the Staff Should?: A Monograph.  Fort Leavenworth, KS, School of Advanced Military Studies, U.S. Army Command and General Staff College, March 2007.  47 p.
"The purpose of this study is to determine why intelligence officers acting as battalion S-2 have difficulty predicting the enemy."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA470459
Doc. call no.: M-U 42022-2 A185i

Blomme, Mark E.  Decentralizing Centralized Control: Reorienting a Fundamental Tenet for Resilient Air Operations: A Monograph.  Fort Leavenworth, KS, School of Advanced Military Studies, U.S. Army Command and General Staff College, May 2008.  98 p.
Intelligence is continually addressed throughout the document.
Also available online at:
http://handle.dtic.mil/100.2/ADA485469
Doc. call no.: M-U 42022-2 B653d

Bramble, Vincent Paul.  Covert Action Lead: Central Intelligence Agency or Special Forces: A Monograph.  Fort Leavenworth, KS, School of Advanced Military Studies, U.S. Army Command and General Staff College, May 2007.  49 p.
Also available online at:
http://handle.dtic.mil/100.2/ADA470469
Doc. call no.: M-U 42022-2 B815c

Cole, Kaci H.  Cyberspace Intelligence Preparation of the Operational Environment.  Maxwell AFB, AL, Air Command and Staff College, December 2009.  13 p.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=37208
Doc. call no.: M-U 43122 C6897c

Coyne, Kevin M.  Developing a USEUCOM Intelligence, Surveillance and Reconnaissance Strategy for Fiscal Years 2010 thru 2015.  Maxwell AFB, AL, Air War College, February 10, 2009.  18 p.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=25047
Doc. call no.: M-U 43117 C881d

Dennis, Wade F.  Strategic Detention and Intelligence Operations: GTMO is the Answer.  Carlisle Barracks, PA, U.S. Army War College, 2008.  24 p. (USAWC strategy research project)
Concludes that "the Joint Detention Facility located at Guantanamo Bay, Cuba (GTMO)...was the correct choice in 2002 and remains the logical place to conduct these tasks today."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA480142
Doc. call no.: M-U 39080-537 D411s

Dersch, David M., Jr.  Delineating Outer Space: The Impact on Near-Space Intelligence, Surveillance, and Reconnaissance.  Maxwell AFB, AL, Air Command and Staff College, March 2010.  13 p.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=50972
Doc. call no.: M-U 43122 D438d

Flickinger, Robert T.  Integrating Intelligence and Information Sharing in Theater Security Cooperation.  Newport, RI, Naval War College, May 4, 2009.  25 p.
Also available online at:
http://handle.dtic.mil/100.2/ADA502913
Doc. call no.: M-U 41662 F621i

Frengle, Royce.  Beyond Afghanistan: Effective Combined Intelligence, Surveillance and Reconnaissance Operations.  Maxwell AFB, AL, Air Command and Staff College, April 2010.  20 p.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=27992
Doc. call no.: M-U 43122 F878b

Fry, William J.  Thickening the Fog: The Truncation of Air Intelligence Since World War II.  Maxwell AFB, AL, School of Advanced Air and Space Studies, June 2010.  84 p.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=25766
Doc. call no.: M-U 43998-1 F947t

Gaeta, Douglas.  Policy and Doctrine Impacts of Semi & Full Autonomous ISR and Weaponized Unmanned Aircraft Systems (UAS).  Maxwell AFB, AL, Air Command and Staff College, 2010.  10 p.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=28458
Doc. call no.: M-U 43122 G129p

Gordon, David J.  A Tasking Construct for Non-Traditional Intelligence, Surveillance, and Reconnaissance.  Maxwell AFB, AL, Air Command and Staff College, April 2009.  31 p.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=27828
Doc. call no.: M-U 43122 G6621t

Gorski, Steven.  Refining Intelligence Support to Irregular Warfare.  Newport, RI, Naval War College, May 3, 2010.  22 p.
Also available online at:
http://handle.dtic.mil/100.2/ADA525260
Doc. call no.: M-U 41662 G674r

Gross, Richard C.  Different Worlds: Unacknowledged Special Operations and Covert Action.  Carlisle Barracks, PA, U.S. Army War College, February 24, 2009.  22 p. (Student papers USAWC strategy research project)
Also available online at:
http://handle.dtic.mil/100.2/ADA494716
Doc. call no.: M-U 39080-537 G8782d

Gulden, Ryan J.  Near-Space Airships: The Solution to Persistent ISR.  Maxwell AFB, AL, Air Command and Staff College, March 2010.  11 p.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=31071
Doc. call no.: M-U 43122 G9712n

Hayford, Scott E.  Human Intelligence: America's Achilles.  Maxwell AFB, AL, Air Command and Staff College, April 2005.  47 p.
"...a problem is developing due to the continued exposure of classified methods, sources, capabilities, and limitations of America's intelligence system."--Abstract.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=25462
Doc. call no.: M-U 43122 H4184h

Higgins, Beau.  An Analysis of Marine Corps Intelligence: Today and Tomorrow.  Maxwell AFB, AL, Air War College, February 12, 2009.  38 p.
Doc. call no.: M-U 43117 H636a

Hogan, Todd C.  The Persistent Intelligence, Surveillance, and Reconnaissance Dilemma: Can the Department of Defense Achieve Information Superiority?  Fort Leavenworth, KS, U.S. Army Command and General Staff College, June 15, 2007.  79 p.
Also available online at:
http://handle.dtic.mil/100.2/ADA471464
Doc. call no.: M-U 42022 H714r

Jackson, Matthew J.  Swimming with the Natives: Cultural Immersion and Its Applications for Naval Special Warfare.  Monterey, CA, Naval Postgraduate School, September 2004.  101 p.
Also available online at:
http://handle.dtic.mil/100.2/ADA427334
Doc. call no.: M-U 42525 J131s

Jewell, David P.  Transforming the Core Function of Military Intelligence to Knowledge Management: A Monograph.  Fort Leavenworth, KS, School of Advanced Military Studies, U.S. Army Command and General Staff College, May 22, 2003.  61 p.
"...proposes this transformation should follow the three critical vectors of doctrinal reform, organizational reform, and officer education reform to enable MI to sufficiently inform commanders understanding of the threat and environment."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA416035
Doc. call no.: M-U 42022-2 J59t

Knoedler, Andrew J.  Increasing C3ISR Persistence by Lowering the Ultimate High Ground: Using Near Space Vehicles in the Pursuit of Persistent C3ISR.  Maxwell AFB, AL, Air Command and Staff College, April 2005.  38 p.
"A combination of manned and unmanned C31SR (sic) platforms supported operations in Afghanistan and Iraq but they could not provide round-the-clock information to the commanders and the warfighters."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA463564
Doc. call no.: M-U 43122 K72i

Kostka, Del C.  Birds of a Feather: Moving Towards a Joint Acquisition Process to Support the Intelligence, Surveillance and Reconnaissance (ISR) Enterprise.  Maxwell AFB, AL, Air Command and Staff College, April 2009.  28 p.
Also available online at:
http://handle.dtic.mil/100.2/ADA539572
Doc. call no.: M-U 43122 K867m

Long, Valarie A.  Operational Design and ISR and Zombies: Or How Operational Design Can Help to Re-Aggregate Joint ISR at the Theater and Component Levels.  Maxwell AFB, AL, Air Command and Staff College, April 2010.  40 p.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=28691
Doc. call no.: M-U 43122 L8494o

Murray, Scott F.  Intelligence Reform: The Historical Mind and Support to Military Operations.  Maxwell AFB, AL, Air University, April 2007.  48 p.
"Three historical vignettes serve as the analytical foundation for this research monograph: Gallipoli Campaign (1915), Tet Offensive (1968) and Operation ALLIED FORCE (1999)."--Abstract.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=25628
Doc. call no.: M-U 42252-91 M984i

Myers, Gregory A.  Future Coalitions: Developing Compatible ISR Technologies, Doctrines, and Standards.  Maxwell AFB, AL, Air War College, February 15, 2007.  36 p.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=33909
Doc. call no.: M-U 43117 M9962f

Neptune, John W.  Cyber-Based C4ISR Asset: A U.S. Air Force Critical Vulnerability.  Maxwell AFB, AL, Air Command and Staff College, April 2009.  36 p.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=25391
Doc. call no.: M-U 43122 N442c

Owens, John T.  Intelligence Outsourcing: Filling Critical Gaps at What Cost.  Carlisle Barracks, PA, U.S. Army War College, March 25, 2010.  24 p. (USAWC strategy research project)
Doc. call no.: M-U 39080-537 O976i

Pearce, Mark W.  The Evolution of Defense HUMINT Through Post Conflict Iraq.  Carlisle Barracks, PA, U.S. Army War College, March 20, 2009.  26 p. (USAWC strategy research project)
"Examines some of the historical experience of (human intelligence) HUMINT within the Department of Defense and proposes a set of recommendations for a more effective HUMINT effort in post conflict Iraq."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA497791
Doc. call no.: M-U 39080-537 P359e

Quitno, Yvette S.  Transformational Command and Control, Intelligence, Surveillance, and Reconnaissance (C2ISR): The E-10a and Implications for the Future.  Maxwell AFB, AL, School of Advanced Air and Space Studies, June 2004.  92 p.
"The USAF has identified the E-10A Multi-Sensor Command and Control Aircraft (MC2A) as a transformational Command, Control, Intelligence, Surveillance, and Reconnaissance (C2ISR) capability...recommendations to leverage transformational alternatives available in the information age in pursuit of future C2ISR capabilities."--Abstract.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=28682
Doc. call no.: M-U 43998-1 Q8t

Richardson, Craig J.  Steps Toward More Responsive Space-Based Intelligence, Surveillance, and Reconnaissance through Improvements in Fusion, Information Management, and Tasking.  Monterey, CA, Naval Postgraduate School, December 2011.  55 p.
Distribution authorized to U.S. Government Agencies and their Contractors.
Doc. call no.: M-U 42525 R521s

Sanchez, Theresa L.  Air Force Intelligence Surveillance and Reconnaissance Officer and Civilian Career Force Management for the 21st Century.  Maxwell AFB, AL, Air War College, February 12, 2009.  29 p.
"Provides recommendation on how to better synchronize AF ISR officer and civilian force development programs and to tie both programs to DNI and AF requirements."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA540007
Doc. call no.: M-U 43117 S2111a

Sennott, Daniel J.  How the Posse Comitatus Act Restricts Department of Defense Information Sharing.  Fort Leavenworth, KS, School of Advanced Military Studies, U.S. Army Command and General Staff College, June 11, 2010.  117 p.
Also available online at:
http://handle.dtic.mil/100.2/ADA524054
Doc. call no.: M-U 42022 S478h

Smith, Daniel W., III.  Airship Renaissance: Considerations for Operational Warfare.  Newport, RI, Naval War College, May 3, 2010.  21 p.
"...Discusses operational considerations for theater-level commanders to examine when planning for the employment of airships...why critics believe airships are not the right tool for future wars...highlights potential ways to apply UAV lessons learned to overcome possible challenges to employing airships."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA525124
Doc. call no.: M-U 41662 S6453a

Smith, James E.  One Size Fits All?: Assessment of the National Space-Based Intelligence, Surveillance, and Reconnaissance Strategy.  Maxwell AFB, AL, School of Advanced Air and Space Studies, June 2010.  114 p.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=43904
Doc. call no.: M-U 43998-1 S6511o

Smith, Paul L.  Transforming Air Force Intelligence.  Maxwell AFB, AL, Air War College, February 14, 2007.  35 p.
"Argues more change is needed specifically recommendations for a more centralized command and control (C2) structure of ISR tasking, processing, expoitation and dissemination (TPED) assets."--Introduction.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=37305
Doc. call no.: M-U 43117 S6561t

Tougaw, Ronald L.  Improving Collaboration Between Air Force Human Intelligence and Counterintelligence.  Maxwell AFB, AL, Air Command and Staff College, April 2009.  24 p.
Also available online at:
http://handle.dtic.mil/100.2/ADA539934
Doc. call no.: M-U 43122 T722i

Wells, Leonard E.  Military Deception: Equivalent to Intelligence, Maneuver and Fires.  Newport, RI, Naval War College, October 31, 2008.  23 p.
"Argues that MILDEC (Military deception) should be included as a joint function in U.S. military doctrine to achieve desired effects with respect to adversarial leader decisions and decision making."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA494225
Doc. call no.: M-U 41662 W454m

Wolf, Danny R.  ISR: The Right Question to Ask.  Maxwell AFB, AL, Air War College, February 12, 2009.  29 p.
"Are we effectively using joint ISR capabilities in an efficient manner to enable superior decisions leading to actionable operations?"--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA540124
Doc. call no.: M-U 43117 W853i


Periodicals

Anderson, Dagvin R. M.  A Holistic Approach to Intelligence, Surveillance, and Reconnaissance.  Air & Space Power Journal  25:54-64  Winter 2011.
The article "...proposes the establishment of an overarching architecture that addresses ISR across all domains and the empowerment of the ISR Task Force."--Abstract from EbscoHost.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=71342694&site=ehost-live&scope=site&custid=airuniv

Deptula, David A.  Think Different: Information-Age Warfare Demands New Approaches to ISR [Intelligence, Surveillance and Reconnaissance] Structures.  Armed Forces Journal  148:38-39  November 2010.
Also available online at:
http://www.armedforcesjournal.com/2010/11/4939123

Deptula, David A.  Transformation and Air Force Intelligence, Surveillance and Reconnaissance.  Air Force Speeches  April 27, 2007.  4 p.
Lt. Gen. David A. Deptula, Deputy Chief of Staff for Intelligence, Surveillance and Reconnaissance, Headquarters U.S. Air Force.  Remarks were given at the Air Force Defense Strategy Seminar, Washington, April 27, 2007.
Also available online at:
http://www.af.mil/information/speeches/speech.asp?id=321

Deptula, David A. and Brown, Greg.  A House Divided: The Indivisibility of Intelligence, Surveillance, and Reconnaissance.  Air & Space Power Journal  22:5-15  Summer 2008.
"The article focuses on the insights of Air Force Chief of Staff ...Intelligence relies on surveillance and reconnaissance for its data and information.  The data collected depends upon processing and exploitation common to all three activities."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=34409625&site=ehost-live&scope=site&custid=airuniv

Deptula, David A. and Marrs, James R.  Global Distributed ISR Operations.  JFQ: Joint Force Quarterly  54:110-115  3rd Quarter 2009.
"Discusses the latest innovations that enhances the distributed ISR operations including the unmanned aerial systems and various air, space and cyberspace infrastructures."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=44242061&site=ehost-live&scope=site&custid=airuniv

Doyle, John M.  Insatiable Hunger, Tightening Belts: Military's Intelligence Needs Mean More Unmanned Systems in 2012 Defense Budget Request.  Unmanned Systems  29:25-27  April 2011.

Drew, Christopher.  Enlisted in the World of Airborne Spying.  New York Times (New York edition), p B1, September 6, 2011.
The military has been snapping up used luxury aircraft to fulfill its need for more surveillance planes.  Civilian planes are filling a niche in the world of airborne spying.
Also available online at:
http://www.nytimes.com/2011/09/07/business/civilian-planes-pressed-into-military-spy-service.html?ref=espionage

Duyvesteyn, Isabelle.  Intelligence and Strategic Culture: Some Observations.  Intelligence & National Security  26:521-530  August 2011.
"This contribution brings together some of the insights of the contributions in this special issue and it attempts to formulate some challanges (sic) for future research."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=63515093&site=ehost-live&scope=site&custid=airuniv

Evans, Geraint.  Rethinking Military Intelligence Failure - Putting the Wheels Back on the Intelligence Cycle.  Defence Studies  9:22-46  March 2009.
"Proposals for the Intelligence Cycle's future applicability - and consideration of an alternative model that may be followed - are made possible."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=37194972&site=ehost-live&scope=site&custid=airuniv

Foryst, Carole A.  Missing From U.S. Intelligence Analysis: The Concept of “Total U.S.”   International Journal of Intelligence & CounterIntelligence  22:396-420  Fall 2009.
"According to the author, the IC is driven by seven kinds of thinking which are defensive thinking, stale assumptions, reactive posture, constrained imagination, no national strategy, constrained perceptions, and failures that it has experienced."--Abstract.

Fuentes, Gidget.  "Harbor Wing" Prepares for Launch: Unmanned Sail Prototype Offers Open-Ocean Intel Options.  Defense News  26:24  June 27, 2011.

Fultz, Brad.  Battalion Intelligence: Integrating Nonkinetic Intelligence Into the Staff Process.  Marine Corps Gazette  95:12-16  June 2011.
Also available online at:
http://search.proquest.com/docview/874203665/fulltextPDF/1342F39D0892E7EF356/6?accountid=4332

Gardner, Greg and Killebrew, Robert.  Gangs, Drugs, Terrorism- and Information-Sharing.  JFQ: Joint Force Quarterly  54:68-73  3rd Quarter 2009.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=44242053&site=ehost-live&scope=site&custid=airuniv

Hassner, Ron E.  Religious Intelligence.  Terrorism & Political Violence  23:684-710  November-December 2011.
"Sacred rituals and symbols can act as force multipliers that motivate and constrain the effectiveness of actors.  Religious intelligence involves an assessment of how these rituals and symbols affect combat operations."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=67129634&site=ehost-live&scope=site&custid=airuniv

Hodges, Jim.  Smarter Vehicles: U.S. Army Wants Standardized ISR Equipment and Proven Technology.  C4ISR Journal   10:22-23  April 2011.

Iannotta, Ben.  Intelligence Authorization Bill could Shift Oversight.  C4ISR Journal  10:8  June 2011.

Iannotta, Ben.  Intel After Bin Laden.  C4ISR Journal  10:24-28  June 2011.

Jennings, Gareth.  On Patrol: USAF Strike Eagles Flex for Strike, ISR and Anti-Air Roles in Afghanistan.  Jane's International Defence Review  44:50-52  February 2011.

Junio, Timothy J.  Smarter Surveillance.  C4ISR Journal  9:36-38  May 2010.

Kosek, Joseph T., III.  Into the Crucible: Intelligence Leadership Challenges at the Tactical Level.  American Intelligence Journal  29:144-147  March 2011.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=65095496&site=ehost-live&scope=site&custid=airuniv

LeClaire, Devaunt Z.  ISR Integration: The Marine Corps Can Learn From British Forces.  Marine Corps Gazette  95:51-55  June 2011.
"...they enhance a ground unit's mission effectiveness and save lives.  ...no two brigades are organized or operate in exactly the same way."--Abstract.
Also available online at:
http://search.proquest.com/docview/874205343/1342F26FC6D7D01D909/15?accountid=4332

Military Intelligence Professional Bulletin.
This quarterly bulletin is designed to keep military intelligence professionals knowledgeable of current and emerging developments in their field.  It includes articles on current intelligence subjects and book reports submitted by military professionals.
Also available online at:
http://www.accessmylibrary.com/archive/420552-military-intelligence-professional-bulletin.html

Miller, Bowman H.  Soldiers, Scholars, and Spies: Combining Smarts and Secrets.  Armed Forces & Society  36:695-715  July 2010.
"Finding the appropriate balance between helping safeguard national security and upholding the tenets of professional integrity is a joint task of soldiers, scholars, and spies"--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=52368441&site=ehost-live&scope=site&custid=airuniv

Ranieri, Thomas F.  Adapting U.S. Military Intelligence to Network Warfare.  American Intelligence Journal  29:37-46  March 2011.
Also available online at: http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=65095483&site=ehost-live&scope=site&custid=airuniv

Rath, Thomas J.  Tools of Change: Tactical C4IRS and Conflicts--Past, Present, and Future.  Air & Space Power Journal  25:100-114  Summer 2011.
The "author echoes the call for a purpose-built command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) aircraft for the irregular warfare environment, which the Air Force can share with partner nations."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=64285937&site=ehost-live&scope=site&custid=airuniv

Risen, James.  A Military and Intelligence Clash Over Spy Satellites.  New York Times, Late Edition-Final, p A13, April 19, 2012.
Also available online at:
http://www.nytimes.com/

Shircliffe, James E., Jr.  Investing in Stability: The Need for Intelligence Preparation for Economic Operations.  Military Review  90:86-92  March-April 2010.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=50332472&site=ehost-live&scope=site&custid=airuniv

Stavridis, James G.  An Intelligent Theater.  JFQ: Joint Force Quarterly  56:104-108  1st Quarter 2010.
"The article offers information on the six combatant commands having a broad-ranging obligation for Department of Defense (DOD) activity throughout a defined theater."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=48169428&site=ehost-live&scope=site&custid=airuniv

Steele, Dennis.  New Sentinels, Scouts and Spies--UAVs Expand Intelligence, Surveillance, Reconnaissance and Strike Capabilities.  Army  61:39-40+  September 2011.
"The article reports that the U.S. Army will start operational testing of its long endurance multi-intelligence vehicle (LEMV) in Afghanistan by the end of 2011."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=65267094&site=ehost-live&scope=site&custid=airuniv

Taylor, Daniel P.  Eye in the Sky: BAMS Program Gears Up for Some Major Milestones this Year.  Sea Power  54:58+  April 2011.
"The article focuses on the unmanned aerial system known as the Broad Area Maritime Surveillance (BAMS) drone that make up one part of the Navy's sea-based airborne surveillance triad in the U.S."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=60268014&site=ehost-live&scope=site&custid=airuniv

Wilder, Matthew.  Geospatial-Intelligence in Tactical Operations and Planning.  Infantry  100:11-14  June-August 2011.
"The article explores geospatial intelligence (GEOINT), which proved itself as a invaluable instrument during Operation Iraqi Freedom.  An intelligence discipline, GEOINT includes imagery, advanced geospatial data and imagery analysis and its products provide situational awareness."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=f5h&AN=66723426&site=ehost-live&scope=site&custid=airuniv


Department of Homeland Security


Internet Resources

Homeland Security.  Office of Intelligence and Analysis. 
Available online at: http://www.dhs.gov/xabout/structure/gc_1220886590914.shtm
"The I&A (Intelligence and Analysis) mission is to equip the Homeland Security Enterprise with the intelligence and information it needs to keep the homeland safe, secure, and resilient."--Website.

Hughbank, Richard J. and Githens, Don.  Intelligence and Its Role in Protecting Against Terrorism.  Journal of Strategic Security  3:31-37  March 2010.
Available online at: http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=48314132&site=ehost-live&scope=site&custid=airuniv

Randol, Mark A.  Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches.  International Journal of Terrorism & Political Hot Spots  4, no. 3/4:275-295  2009.
Available online at: http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=55769747&site=ehost-live&scope=site&custid=airuniv
"At the policy and operational levels, the communication and integration of federal HSINT efforts with these state and local fusion centers will likely remain an important priority and future challenge.  This report will not be updated."--Abstract.
(Large document, long load time)

Theohary, Catherine A. and Rollins, John.  Terrorist Use of the Internet: Information Operations in Cyberspace.  Washington, Congressional Research Service, March 8, 2011.  16 p. (CRS report for Congress, R41674)
Available online at: http://opencrs.com/document/R41674
"The Internet is used by international insurgents, jihadists, and terrorist organizations as a tool for radicalization and recruitment, a method of propaganda distribution, a means of communication, and ground for training.  ...This report does not discuss technical and Internet architecture design solutions."--Summary.

United States.  U.S. Coast Guard.  Intelligence.  Washington, U. S. Coast Guard, May 2010.  29 p.  (CG Pub 2)
Available online at: http://www.uscg.mil/doctrine/CGPub/CG_Pub_2_0.pdf
"Theory and philosophy of intelligence as practiced by the Coast Guard...provides a conceptual framework for understanding and conducting effective intelligence activities."--Thad W. Allen, Admiral, U.S. Coast Guard.



Books

Bayer, Michael D.  The Blue Planet: Informal International Police Networks and National Intelligence.  Washington, National Defense Intelligence College, February 2010.  179 p.
This book "...makes a powerful argument for why the United States needs to make better use of its federal law enforcement agencies abroad as an integral part of our national counterterrorism strategy."--P. vii.
Also available online at:
http://ni-u.edu/ni_press/pdf/18507.pdf
Book call no.: 363.23 B357b

Considering the Creation of a Domestic Intelligence Agency in the United States: Lessons From the Experiences of Australia, Canada, France, Germany, and the United Kingdom, edited by Brian A. Jackson.  Santa Monica, CA, RAND Homeland Security Program and the Intelligence Policy Center, 2009.  194 p. (RAND Corporation monograph series)
"Prepared for the Department of Homeland Security."--Abstract.
Also available online at: http://handle.dtic.mil/100.2/ADA494510
http://www.rand.org/pubs/monographs/2009/RAND_MG805.pdf

Book call no.: 363.325163 C755

Homeland Security and Intelligence, edited by Keith Gregory Logan.  Santa Barbara, CA, Praeger Security International, 2010.  245 p.
Focuses on policy, concepts, approaches, and current issues in the field of intelligence studies, essays by leading scholars in the field.
Book call no.: 327.1273 H765

Hulnick, Arthur S.  Keeping us Safe: Secret Intelligence and Homeland Security.  Westport, CT, Praeger, 2004.  238 p.
Book call no.: 363.32516 H915k

Intelligence and Statecraft: The Use and Limits of Intelligence in International Society, edited by Peter Jackson and Jennifer Siegel.  Westport, CT, Praeger, 2005.  288 p.
"British, Canadian, and US historians and political scientists focus on the evolution of permanent foreign intelligence services as a factor in international relations."--Abstract.
Book call no.: 327.12 I614

Marks, Ronald A.  Spying in America in the Post 9/11 World: Domestic Threat and the Need for Change.  Santa Barbara, CA, Praeger, 2010.  153 p. (Changing face of war)
Book call no.: 327.1273 M346s

McNamara, Thomas E.  Information Sharing Environment Implementation Plan.  Washington, Office of the Director of National Intelligence, Program Manager, Information Sharing Environment, November 2006.  161 p.
Also available online at:
http://handle.dtic.mil/100.2/ADA458786
Book call no.: 363.325160285 M169i

Priest, Dana and Arkin, William M.  Top Secret America: The Rise of the New American Security State.  New York, Little, Brown and Company, 2011.  296 p.
"Describes the enormous, top-secret, invisible universe created by the government after 9/11 and describes why the system in place to keep us safe may actually be putting us in greater danger."--Abstract.
Book call no.: 327.1273 P949t

Stanton, Louise.  The Civilian-Military Divide: Obstacles to the Integration of Intelligence in the United States.  Santa Barbara, CA, Praeger Security International, 2009.  273 p.
Book call no.: 355.34320973 S792c

Treverton, Gregory F.  Reorganizing U.S. Domestic Intelligence: Assessing the Options.  Santa Monica, CA, RAND, 2008.  125 p. (RAND Corporation monograph series)
Also available online at:
http://www.rand.org/pubs/monographs/MG767/
Doc. call no.: 363.325163 T812r

United States.  Office of the Director of National Intelligence.  The Terrorist Threat to the US Homeland.  Washington, National Intelligence Council, July 2007.  6 p. (National intelligence estimate)
Also available online at:
http://handle.dtic.mil/100.2/ADA470324
Book call no.: 363.325 U581t



Documents

Hoffman, Bruce.  Lessons of 9/11.  Santa Monica, CA, RAND, October 2002.  26 p. (Testimony, CT-201)
Also available online at:
http://www.rand.org/content/dam/rand/pubs/testimonies/2005/CT201.pdf
Doc. call no.: M-U 30352-94 no.201

Masse, Todd.  Homeland Security Intelligence: Perceptions, Statutory Definitions, and Approaches.  Washington, Congressional Research Service, August 18, 2006.  28 p. (CRS Report for Congress, RL33616)
Link provides access to other versions of this report.
Also available online at:
http://opencrs.com/document/RL33616
Doc. call no.: M-U 42953-1 no.RL33616

Randol, Mark A.  The Department of Homeland Security Intelligence Enterprise:  Operational Overview and Oversight Challenges for Congress.  Washington, Congressional Research Service, March 19, 2010.  57 p. (CRS Report for Congress R40602)
Also available online at: https://opencrs.com/document/R40602/
Doc. call no.: M-U 42953-1 no.R40602

United States.  Government Accountability Office.  Information Sharing Environment: Definition of the Results to Be Achieved in Improving Terrorism-Related Information Sharing is Needed to Guide Implementation and Assess Progress.  Washington, U.S. GAO, 2008.  57 p.
Also available online at:
http://www.gao.gov/cgi-bin/getrpt?GAO-08-492
Doc. call no.: M-U 41026-173 no.08-492



Documents (Student Research)

Bartlett, David C.  Building a Team for Homeland Security and Defense: The Guard and Civilian Agencies.  Maxwell AFB, AL, Air Command and Staff College, April 2007.  38 p.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=24934
Doc. call no.: M-U 43122 B289b

Burkett, Jeffrey W.  Command and Control of Military Forces in the Homeland.  Maxwell AFB, AL, Air War College, February 15, 2008.  57 p.
"Discusses the frequency with which US military forces are employed for homeland security related missions has risen dramatically since 9/11."--Abstract.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=28276
Doc. call no.: M-U 43117 B9591c

Coble, Mark L.  National Guard Intelligence Support to Domestic Operations: A Monograph.  Fort Leavenworth, KS, School of Advanced Military Studies, U.S. Army Command and General Staff College, May 21, 2009.  46 p.
Also available online at:
http://handle.dtic.mil/100.2/ADA505038
Doc. call no.: M-U 42022-2 C656n

Demko, John M.  The Ongoing War Between the United States National Counter-Terrorism Structure and Militant Islamists: Is the Next 9/11 Preventable?: A Monograph.  Fort Leavenworth, KS, School of Advanced Military Studies, U.S. Army Command and General Staff College, May 22, 2008.  74 p.
Also available online at:
http://handle.dtic.mil/100.2/ADA485626
Doc. call no.: M-U 42022-2 D381o

Gilloon, Robert.  Homeland Defense and Homeland Security: Creating Unity of Effort.  Maxwell AFB, AL, Air War College, February 12, 2009.  29 p.
"The paper discusses present and future challenges to creating a unity of effort.  The paper concludes that currently there is not a unity of effort and recommends that legislation may be needed to help the process along."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA539956
Doc. call no.: M-U 43117 G483h

Lautner, Gregory D.  Domestic Intelligence and Homeland Security: Are We There Yet?  Carlisle Barracks, PA , U.S. Army War College, February 1, 2010.  36 p. (USAWC strategy research project)
"Even though tremendous gains have been made the domestic intelligence system faces many problems in its organizational structure, in information sharing, and in intelligence analysis."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA522062
Doc. call no.: M-U 39080-537 L389d

Miller, Andrew D.  Homeland Security Intelligence: To What End?  Monterey, CA, Naval Postgraduate School, September 2010.  77 p.
"Defines homeland security decision advantage, the elements necessary for its acquisition and maintenance, and ultimately defines and defends the value of intelligence in improving homeland security decisions."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA531465
Doc. call no.: M-U 42525 M6478h

Newbill, Raymond R., III.  Intelligence Sharing, Fusion Centers, and Homeland Security.  Wright-Patterson AFB, OH, Air Force Institute of Technology, June 2008.  54 p.
"Achieving true Homeland Security may be as simple as first achieving Hometown Security."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA488163
Doc. call no.: M-U 39567-5 N534i

Thornlow, Christopher C.  Fusing Intelligence with Law Enforcement Information: An Analytic Imperative.  Monterey, CA, Naval Postgraduate School, March 2005.  59 p.
"The USNORTHCOM J2 must be able to use all intelligence sources, including law enforcement information, to better understand the potential threats and capabilities arrayed against it."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA432327
Doc. call no.: M-U 42525 T512f



Periodicals

Burkett, Jeffrey W.  Command and Control of Military Forces in the Homeland.  JFQ: Joint Force Quarterly  51:130-136  4th Quarter 2008.
Also available online at:
http://search.proquest.com/docview/203686068?accountid=4332

Flynn, Stephen.  Recalibrating Homeland Security.  Foreign Affairs  90:130-140  May-June 2011.
"Describes American security policy following the September 11, 2011 terrorist attacks and counterterrorism measures for law enforcement and border control."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=60123119&site=ehost-live&custid=airuniv

Gardner, Greg and Killebrew, Robert.  Gangs, Drugs, Terrorism- and Information-Sharing.  JFQ: Joint Force Quarterly  54:68-73  3rd Quarter 2009.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=44242053&site=ehost-live&scope=site&custid=airuniv

Hulnick, Arthur S.  Home Time: A New Paradigm for Domestic Intelligence.  International Journal of Intelligence & CounterIntelligence  22:569-585  Winter 2009.
"Suggests that Americans are willing to accept laws that infringe on their privacy and civil liberties if they ensure their safety but often oppose these laws and intelligence abuses after threats have passed."--Abstract.

Junio, Timothy J.  Smarter Surveillance.  C4ISR Journal  9:36-38  May 2010.

Kaplan, David E.  Spies Among US.  U.S. News & World Report  140:40-49  May 8, 2006.
"The U.S. Departments of Justice and Homeland Security have spent important sums of money into building up local and state police intelligence operations."--Abstract from Ebscohost.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=20638998&site=ehost-live&custid=airuniv

Kim, Jin and Allard, William M.  Intelligence Preparation of the Battlespace: A Methodology for Homeland Security Intelligence Analysis.  SAIS Review of International Affairs  28:75-87  Winter-Spring 2008.
"Intelligence Preparation of the Battlespace (IPB) provides an analytical methodology that could cultivate a common analytical culture in the homeland security intelligence community, which is key to the community's effectiveness in thwarting a terrorist attack against the United States."--Abstract.
Also available online at:
http://search.proquest.com/docview/231330457/fulltext/135E86EDCA15203B9CF/10?accountid=4332

Nicander, Lars D.  Understanding Intelligence Community Innovation in the Post-9/11 World.  International Journal of Intelligence & CounterIntelligence  24:534-568  Fall 2011.


Department of Justice



Internet Resources

Federal Bureau of Investigation. 
Available online at: http://www.fbi.gov/

U.S. Department of Justice, Archives.  National Drug Intelligence Center. 
Available online at: http://www.justice.gov/archive/ndic/

U.S. Department of Justice, Office of Inspector General.  The Federal Bureau of Investigation's Efforts to Protect the Nation's Seaports.  U.S. Department of Justice, March 2006.  103 p. (Audit report 06-26)
Available online at: http://www.usdoj.gov/oig/reports/FBI/a0626/final.pdf

U.S. Department of Justice, The Federal Bureau of Investigation.  The Federal Bureau of Investigation: National Information Sharing Strategy.  U.S. Department of Justice, 2011.  10 p.
Available online at: http://www.fas.org/irp/agency/doj/fbi/infoshare.pdf



Books

Bowman, Marion Eugene.  Counterterrorism Activities of the FBI: At Home and Abroad.  Fort Lesley J. McNair, Washington, Center for Technology and National Security Policy, August 2007.  17 p. (Case studies in national security transformation no. 8)
Also available online at:
http://handle.dtic.mil/100.2/ADA471233
Book call no.: 363.32516 B787c

Carter, David L.  Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies.
Also available online at:
http://www.cops.usdoj.gov/Default.asp?Item=1404
Book call no.: 353.32 C323L

Graff, Garrett M.  The Threat Matrix: The FBI at War in the Age of Terror.  New York, Little, Brown and Company, 2011.  666 p.
"Draws on hundreds of interviews and once-secret documents to deliver the untold story of the FBI's secret battles in the war on terror--both outside the United States and inside the U.S. government--highlighting the tensions between the FBI and CIA."--Abstract.
Book call no.: 363.325165 G736t

Grayson, Robert.  The FBI and National Security.  Broomall, PA, Mason Crest Publishers, 2010.  64 p. (FBI story)
Book call no.: 355.033073 G784f

Jeffreys-Jones, Rhodri.  The FBI: A History.  New Haven, CT, Yale University Press, 2007.  317 p.
"Common wisdom traces the origin of the bureau to 1908, but Jeffreys-Jones locates its true beginnings in the 1870s, when Congress acted in response to the Ku Klux Klan campaign of terror against black American voters."--Book jacket.
Book call no.: 363.250973 J46f

Kessler, Ronald.  The Secrets of the FBI.  New York, Crown Publishers, 2011.  296 p.
"Draws on agent interviews about famous FBI cases to reveal the Bureau's inner workings and some of its most deeply held secrets.  The FBI is involved in almost every aspect of American life."--Abstract.
Book call no.: 363.25 Kes

Powers, Richard Gid.  Broken: The Troubled Past and Uncertain Future of the FBI.  New York, Free Press, 2004.  515 p.
"Story features an astonishing range of political abuses, misdirected investigations, skewed priorities, and sheer intelligence failures."--Book jacket.
Book call no.: 363.250973 P888b

United States.  Congress.  Senate.  Select Committee on Intelligence.  The Federal Bureau of Investigation's Strategic Plan and Progress on Reform.  Hearing.  110th Congress, 1st session, October 23, 2007.  Washington, U.S. GPO, 2009.  47 p. (S. hrg. 110-793)
Also available online at:
http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=110_senate_hearings&docid=f:48097.pdf
Book call no.: 363.250973 U581f

United States.  Dept. of Justice.  Office of the Inspector General.  A Review of the FBI's Involvement In and Observations of Detainee Interrogations in Guantanamo Bay, Afghanistan, and Iraq.  Washington, Department of Justice, Office of the Inspector General, Oversight and Review Division, May 2008.  370 p.
"The focus of our review was whether FBI agents witnessed incidents of detainee abuse in the military zones, whether FBI employees reported any such abuse to their superiors or others, and how those reports were handled."--Executive summary.
Also available online at: http://handle.dtic.mil/100.2/ADA482061
http://www.usdoj.gov/oig/special/s0805/final.pdf

Book call no.: 973.931 R454

United States.  Office of the Director of National Intelligence.  United States Intelligence Community 500 Day Plan: Integration and Collaboration: Follow-up Report.  Washington, Office of the Director of National Intelligence, 2009.  1 vol.
"Report on plans for interagency collaboration and integration related to the sharing of intelligence in order to meet current and future national security challenges."--Abstract.
Part 1 also available online at: http://purl.access.gpo.gov/GPO/LPS111994

Part 2 also available online at: http://purl.access.gpo.gov/GPO/LPS111995
Book call no.: 327.1273 U585uc

Weiner, Tim.  Enemies: A History of the FBI.  New York, Random House, 2012.  537 p.
"Here is the hidden history of America's hundred-year war on terror.  The FBI has fought against terrorists, spies, anyone it deemed subversive--and sometimes American presidents."--Publisher.
Book call no.: 363.250973 W423e

Zegart, Amy B.  Spying Blind: The CIA, The FBI, and the Origins of 9/11.  Princeton, NJ, Princeton University Press, 2007.  317 p.
"In this book, Amy Zegart provides the first scholarly examination of the intelligence failures that preceded September 11."--Book jacket.
Book call no.: 973.931 Z44s


Document (Student Research)

Smith, Eric B.  The Transformation of the FBI to Meet the Domestic Intelligence Needs of the United States.  Monterey, CA, Naval Postgraduate School, June 2009.  97 p.
"The thesis examines both military transformational processes, as well as the British Model of Domestic Intelligence, and provides recommendations relevant to the ongoing and strategic transformational efforts by the FBI."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA501530
http://edocs.nps.edu/npspubs/scholarly/theses/2009/Jun/09Jun%5FSmith%5FE.pdf
Doc. call no.: M-U 42525 S646t


Others


Internet Resources

Mowatt-Larssen, Rolf.  Nightmares of Nuclear Terrorism.  Bulletin of the Atomic Scientists  66:37-45  March 2010.
Available online at: http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=48453276&site=ehost-live&custid=airuniv
"The author, an accomplished former counterterrorism official at the CIA and Energy Department, outlines the nuclear terrorism scenarios that keep him up at night--and suggests how best to prevent them"--Abstract.

U.S. Department of Energy.  Office of Inspector General.  Controls Over the Department of Energy's Sensitive Compartmented Information Access Program-IG-0790. 
Available online at: http://energy.gov/ig/downloads/office-intelligence-andcounterintelligence-internal-controls-over-department-energy-s
DOE "serves as the premier technical intelligence resource in the areas of nuclear weapons, nonproliferation, energy, science, and technology and emerging nuclear threats."--Website.

U.S. Department of State.  Bureau of Intelligence and Research. 
Available online at: http://www.state.gov/s/inr

U.S. Department of the Treasury.  Office of Terrorism and Financial Intelligence. 
Available online at: http://www.treasury.gov/about/organizational-structure/offices/Pages/Office-of-Terrorism-and-Financial-Intelligence.aspx


Book

United States.  Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction.  Report to the President of the United States.  Official government ed.  Washington, Unclassified Version of the Report of the Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction, 2005.  601 p.
"This unclassified report is derived from a 692-page classified report that was delivered to the President on March 31, 2005"--P. xi.
Also available online at: http://www.gpo.gov/fdsys/pkg/GPO-WMD/pdf/GPO-WMD.pdf
Book call no.: 327.1273 U584r


Budget/Laws/Policy/Guidance


Internet Resources

Best, Richard A., Jr.  Intelligence Reform After Five Years: The Role of the Director of National Intelligence (DNI).  Washington, Congressional Research Service, June 22, 2010.  11 p. (CRS report for Congress)
Available online at: http://fpc.state.gov/documents/organization/145138.pdf

Bush, George W.  Executive Order: Strengthened Management of the Intelligence Community.  Washington, The White House, August 27, 2004.
Available online at: http://georgewbush-whitehouse.archives.gov/news/releases/2004/08/20040827-6.html

Clapper, James R.  Unclassified Statement for the Record on the Worldwide Threat Assessment of the US Intelligence Community for the Senate Select Committee on Intelligence.  January 31, 2012.  30 p.
Available online at: http://intelligence.senate.gov/120131/clapper.pdf
James R. Clapper is the Director of National Intelligence.

Fact Sheet: President Issues New Orders to Reform Intelligence.  August 27, 2004.
Available online at: http://georgewbush-whitehouse.archives.gov/news/releases/2004/08/20040827-13.html

Forcese, Craig.  Spies Without Borders: International Law and Intelligence Collection.  Journal of National Security Law & Policy  5, no.1:179-210  2011.
Available online at: http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=64393253&site=ehost-live&scope=site&custid=airuniv
"Examines the doctrines of international law that are applicable to spying, focusing on sovereignty rules, international immunities and human rights principles."--Abstract.

Homeland Security and Intelligence: Next Steps in Evolving the Mission.  The Aspen Institute, Homeland Security Group, January 18, 2012.  6 p.
Available online at: http://www.aspeninstitute.org/sites/default/files/content/docs/pubs/HS-HPSCI-hearing-011812.pdf
"Examines the role that the Department of Homeland Security can and should play in the intelligence community."--Publisher.

National Archives.  Executive Order 12333: United States Intelligence Activities.  December 4, 1981.
Available online at: http://www.archives.gov/federal-register/codification/executive-order/12333.html
"Timely and accurate information about the activities, capabilities, plans, and intentions of foreign powers, organizations, and persons and their agents, is essential to the national security of the United States."--Preamble.

National Commission on Terrorist Attacks upon the United States.  The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks upon the United States.  New York, Norton, 2004.  567 p.
Available online at: http://govinfo.library.unt.edu/911/report/911Report.pdf

U.S. Intelligence Policy Documentation Project. 
Available online at: http://www.gwu.edu/~nsarchiv/intelligence/
"Provides online access to critical declassified records on issues including U.S. national security, foreign policy, diplomatic and military history, intelligence policy, and more."--Website.

U.S. National Intelligence: An Overview 2011.  Office of the Director of National Intelligence, January 2012.  98 p.
Available online at: http://www.whs.mil/library/IC_Consumers_Guide_2011.pdf
Provides general information about the IC.  For laws and policies governing the IC refer to Tab 8, pp 93-95.

United States.  Defense Science Board.  Task Force on Defense Intelligence.  Counterinsurgency (COIN) Intelligence, Surveillance, and Reconnaissance (ISR) Operations.  Washington, Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics, February 2011.  116 p.
Available online at: http://purl.fdlp.gov/GPO/gpo8054

United States.  Department of Justice.  Title 18, U.S. Code, Section 1385. 
Available online at: http://www.law.cornell.edu/uscode/18/usc_sec_18_00001385----000-.html
Title 18 of the United States Code is the criminal and penal code of the federal government of the United States.  It deals with federal crimes and criminal procedure.  This section deals with the "Use of Army and Air Force as posse comitatus."

United States.  House of Representatives.  United States House Permanent Select Committee on Intelligence (HPSCI). 
Available online at: http://intelligence.house.gov/

United States.  Senate.  Select Committee on Intelligence. 
Available online at: http://intelligence.senate.gov/


Books

Adams, Gordon and Williams, Cindy.  Buying National Security: How America Plans and Pays for Its Global Role and Safety at Home.  New York, Routledge, 2010.  344 p.
Book call no.: 355.033573 A213b

Blair, Dennis C.  The National Intelligence Strategy of the United States of America.  Washington, United States Office of the Director of National Intelligence, August 2009.  18 p.
Also available online at: http://www.au.af.mil/au/awc/awcgate/dni/nat_intel_strat.pdf
Book call no.: 327.1273 N277 2009

Dycus, Stephen and others.  National Security Law.  5th ed.  New York, Wolters Kluwer Law & Business, 2011.  1340 p. (Aspen casebook series)
"Provides the broadest exploration of both constitutional and domestic law issues in National Security of any book in the field."--Abstract.
Book call no.: 343.7301 N277

Secret Intelligence: A Reader, edited by Christopher Andrew and others.  New York, Routledge, 2009.  552 p.
The book focuses on policy, concepts, approaches, and current issues in the field of intelligence studies, and has essays by leading scholars in the field.
Book call no.: 327.1273 S446

Shorrock, Tim.  Spies for Hire: The Secret World of Intelligence Outsourcing.  New York, Simon & Schuster, 2008.  439 p.
The "outsourcing of intelligence activities is now a $50 billion-a-year business that consumes up to 70 percent of the U.S. intelligence budget."--Book jacket.
Book call no.: 327.1273 S559s

Tama, Jordan.  Terrorism and National Security Reform: How Commissions Can Drive Change During Crises.  New York, Cambridge University Press, 2011.  232 p.
"Demonstrates that blue-ribbon commissions can be powerful vehicles for making public policy."-- Publisher.
Book call no.: 363.3251561 T153t

United States.  Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction.  Report to the President of the United States.  Official government ed.  Washington, Unclassified Version of the Report of the Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction, 2005.  601 p.
"This unclassified report is derived from a 692-page classified report that was delivered to the President on March 31, 2005"--P. xi.
Library's copy 2 is printed from website in 2 parts.
Also available online at: http://www.gpo.gov/fdsys/pkg/GPO-WMD/pdf/GPO-WMD.pdf
Book call no.: 327.1273 U584r

United States.  Congress.  House.  Intelligence Reform and Terrorism Prevention Act of 2004: Conference Report (to accompany S. 2845).  Report.  108th Congress, 2nd session, December 7, 2004.  Washington, U.S. GPO, 2004.  244 p. (Rept. 108-796)
Also available online at:
http://purl.access.gpo.gov/GPO/LPS58201
Book call no.: 353.170973 U582ia

United States.  Congress.  House.  Committee on Armed Services.  Permanent Select Committee on Intelligence.  Implications of the National Intelligence Estimate Regarding Al Qaeda.  Joint Hearing.  110th Congress, 1st session, July 25, 2007.  Washington, U.S. GPO, 2007.  113 p. (H.A.S.C. No. 110-77)
Also available online at:
http://purl.access.gpo.gov/GPO/LPS124536
Book call no.: 363.320973 U58i

United States.  Congress.  House.  Committee on Government Reform.  The Need to Know: Information Sharing Lessons for Disaster Response.  Hearing.  109th Congress, 2nd session, March 30, 2006.  Washington, U.S. GPO, 2006.  112 p.
Also available online at:
http://purl.access.gpo.gov/GPO/LPS73615
Book call no.: 353.950973 U58n

United States.  Congress.  House.  Committee on Homeland Security.  Report on Legislative and Oversight Activities of the House Committee on Homeland Security: Together with Additional Views.  Report.  109th Congress, 2nd session, January 2, 2007.  Washington, U.S. GPO, 2007.  345 p. (Rept. 109-741)
Also available online at:
http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=109_cong_reports&docid=f:hr741.pdf
Book call no.: 353.30973 U582r

United States.  Congress.  House.  Committee on Homeland Security.  WMD Prevention and Preparedness Act of 2010: Report Together with Additional Views (to accompany H. R. 5498) (Including cost estimate of the Congressional Budget Office).  Report.  111th Congress, 2nd session, November 18, 2010.  Washington, U.S. GPO, 2010.  108 p. (Rept. 111-659)
Also available online at:
http://purl.fdlp.gov/GPO/gpo1928
Book call no.: 343.01 U581w

United States.  Congress.  House.  Committee on the Judiciary.  USA Patriot Amendments Act of 2009: Report Together With Dissenting Views (to accompany H.R. 3845) (Including cost estimate of the Congressional Budget Office).  Report.  111th Congress, 1st session, December 16, 2009.  Washington, U.S. GPO, 2009.  79 p. (Rept. 111-382) 
Also available online at:
http://purl.access.gpo.gov/GPO/LPS118343
Book call no.: 345.7302 U582u

United States.  Congress.  House.  Permanent Select Committee on Intelligence.  Intelligence Authorization Act for Fiscal Year 2011: Report Together With Minority Views (to accompany H.R. 754) (Including cost estimate of the Congressional Budget Office).  Report.  112th Congress, 1st session, May 3, 2011.  Washington, U.S. GPO, 2011.  20 p. (Rept. 112-72)
Also available online at:
http://purl.fdlp.gov/GPO/gpo7306
Book call no.: 353.170973 U581i 2011

United States.  Congress.  House.  Permanent Select Committee on Intelligence.  Intelligence Authorization Act for Fiscal Year 2009: Report Together With Minority Views (to accompany H.R. 5959). Report.  110th Congress, 2nd session.  Washington, U.S. GPO, 2008.  121 p. (Rept. 110-665) 
Library has part 1, dated May 21, 2008. 
Also available online at: http://purl.access.gpo.gov/GPO/LPS94786
Part 2, dated July 10, 2008 can be accessed at:
http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=110_cong_reports&docid=f:hr665.110
Book call no.: 353.170973 U58ia 2009

United States.  Congress.  House.  Permanent Select Committee on Intelligence.  Record of Proceedings on H.R. 3829, The Intelligence Community Whistleblower Protection Act of the House Permanent Select Committee on Intelligence, May 20, 1998 and June 10, 1998, 105th Congress, 2nd session.  Washington, U.S. GPO, 1999.  232 p.
Book call no.: 342.0684 U58ra

United States.  Congress.  House.  Permanent Select Committee on Intelligence.  Subcommittee on Intelligence Community Management.  Classification of National Security Information.  Hearing.  110th Congress, 1st session, July 12, 2007.  Washington, U.S. GPO, 2008.  40 p.
Also available online at:
http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=110_house_hearings&docid=f:38190.pdf
Book call no.: 352.379 U58ce

United States.  Congress.  Senate.  Committee on Armed Services.  Current and Future Worldwide Threats to the National Security of the United States.  Hearing.  110th Congress, 1st session, February 27, 2007.  Washington, U.S. GPO, 2008.  90 p.
Book call no.: 355.033073 U584ca 2008

United States.  Congress.  Senate.  Select Committee on Intelligence.  Attorney General Guidelines for FBI Criminal Investigations, National Security Investigations, and the Collection of Foreign Intelligence.  Hearing.  110th Congress, 2nd session, September 23, 2008.  Washington, U.S. GPO, 2009.  32 p. (S. hrg. 110-846)
Also available online at:
http://www.gpo.gov/fdsys/pkg/CHRG-110shrg48395/pdf/CHRG-110shrg48395.pdf
Book call no.: 363.250973 U581a

United States.  Congress.  Senate.  Select Committee on Intelligence.  Current and Projected National Security Threats to the United States.  Hearing.  111th Congress, 2nd session, February 2, 2010.  Washington, U.S. GPO, 2010.  134 p. (S. hrg. 111-557)
Also available online at:
http://purl.access.gpo.gov/GPO/LPS125999
Book call no.: 355.033073 U584cb 2010

United States.  Congress.  Senate.  Select Committee on Intelligence.  Current and Projected National Security Threats to the United States.  Hearing.  111th Congress, 1st session, February 12, 2009.  Washington, U.S. G.P.O., 2009.  123 p. (S. hrg. 111-62)
Also available online at:
http://purl.access.gpo.gov/GPO/FDLP177
Book call no.: 355.033073 U584cb 2009

United States.  Congress.  Senate.  Select Committee on Intelligence.  Current and Projected National Security Threats to the United States.  Hearing.  110th Congress, 1st session, January 11, 2007.  Washington, U.S. GPO, 2009.  200 p. (S. hrg. 110-835)
Also available online at:
http://purl.access.gpo.gov/GPO/LPS114666
Book call no.: 355.033073 U584cb 2007

United States.  Congress.  Senate.  Select Committee on Intelligence.  Current and Projected Threats to the National Security.  Hearing.  110th Congress, 2nd session, February 5, 2008.  Washington, U.S. GPO, 2009.  116 p. (S. hrg. 110-824)
Also available online at:
http://purl.access.gpo.gov/GPO/LPS114079
Book call no.: 355.033073 U584cc

United States.  Congress.  Senate.  Select Committee on Intelligence.  Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2007: Report Together With Additional and Minority Views (to accompany S. 2248).  Report.  110th Congress, 1st session, October 26, 2007.  Washington, U.S. GPO, 2007.  48 p. (Rept. 110-209)
Also available online at:
http://www.gpo.gov/fdsys/pkg/CRPT-110srpt209/pdf/CRPT-110srpt209.pdf
Book call no.: 345.73052 U581f

United States.  Congress.  Senate.  Select Committee on Intelligence.  Intelligence Authorization Act for Fiscal Year 2010: Report Together With Additional Views (to accompany S. 3611).  Report.  111th Congress, 2nd session, July 19, 2010.  Washington, U.S. GPO, 2010.  70 p. (Rept. 111-223) 
Also available online at:
http://purl.access.gpo.gov/GPO/LPS124796
Book call no.: 353.170973 U581i 2010a

United States.  Congress.  Senate.  Select Committee on Intelligence.  Intelligence Authorization Act for Fiscal Year 2010: Report Together With Additional Views (to accompany S. 1494).  Report.  111th Congress, 1st session, July 22, 2009.  Washington , U.S. GPO, 2009.  78 p. (Rept. 111-55)
Also available online at:
http://www.gpo.gov/fdsys/pkg/CRPT-111srpt55/pdf/CRPT-111srpt55.pdf
Book call no.: 353.170973 U581i 2010

United States.  Congress.  Senate.  Select Committee on Intelligence.  Intelligence Authorization Act for Fiscal Year 2011: Report Together With Additional and Minority Views (to accompany S. 719).  Report.  112th Congress, 1st session, April 4, 2011.  Washington, U.S. GPO, 2011.  12 p. (Rept. 112-12)
Also available online at:
http://purl.fdlp.gov/GPO/gpo5850
Book call no.: 353.170973 U581i 2011a

United States.  Congress.  Senate.  Select Committee on Intelligence.  Modernization of the Foreign Intelligence Surveillance Act.  Hearing.  110th Congress, 1st session, May 1, 2007.  Washington, U.S. GPO, 2008.  265 p. (S. hrg. 110-399)
Also available online at:
http://purl.access.gpo.gov/GPO/LPS96270
Book call no.: 345.73052 U581m

United States.  Congress.  Senate.  Select Committee on Intelligence.  Report of the Select Committee on Intelligence on Prewar Intelligence Assessments About Postwar Iraq Together With Additional and Minority Views.  Report.  110th Congress, 1st session, May 25, 2007.  Washington, U.S. GPO, 2007.  226 p. (Rept. 110-76)
Unclassified version.
Also available online at:
http://purl.access.gpo.gov/GPO/LPS83568
Book call no.: 956.70443 U581rc

United States.  Congress.  Senate.  Select Committee on Intelligence.  Report of the Select Committee on Intelligence on the U.S. Intelligence Community's Prewar Intelligence Assessments on Iraq Together With Additional Views.  Report.  108th Congress, 2nd session, July 9, 2004.  Washington, U.S. GPO, 2004.  511 p. (Rept. 108-301)
Also available online at:
http://purl.access.gpo.gov/GPO/LPS51511
Book call no.: 956.70443 U581r

United States.  Congress.  Senate.  Select Committee on Intelligence.  Report of the Select Committee on Intelligence, United States Senate.  Washington, U.S. GPO, 2005. 
Library has: 2005/2006,2007/2009-2009/2011 reports.
Book call no.: 328.3658 U58r

United States.  Department of Defense.  Unclassified Report on the President's Surveillance Program.  Washington, U.S. Department of Defense, July 10, 2009.  38 p. (Report no. 2009-0013-AS)
Also available online at:
http://handle.dtic.mil/100.2/ADA502760
Book call no.: 345.73052 U54

United States.  Intelligence Science Board.  Concept Paper on Trusted Information Sharing.  Washington, Intelligence Science Board, 2004.  7 p.
Also available online at:
http://www.fas.org/irp/dni/isb/trusted.pdf
Book call no.: 353.17238 U58c

United States.  Office of the Director of National Intelligence.  Information Sharing Strategy.  Washington, Director of National Intelligence, February 22, 2008.  24 p.
Also available online at:
http://permanent.access.gpo.gov/lps93306/iss.pdf
Book call no.: 353.170973 U585i

United States.  Office of the Director of National Intelligence.  An Overview of the United States Intelligence Community for the 111th Congress.  Washington, Director of National Intelligence, 2009.  26 p.
Also available online at: http://www.fas.org/irp/eprint/overview.pdf
Book call no.: 327.1273 U585o

United States.  Office of the Director of National Intelligence.  United States Intelligence Community 500 Day Plan: Integration and Collaboration: Follow-Up Report.  Washington, Office of the Director of National Intelligence, 2009.  1 vol.
"Report on plans for interagency collaboration and integration related to the sharing of intelligence in order to meet current and future national security challenges."--Abstract. 
Also available online at: http://purl.access.gpo.gov/GPO/LPS111994

Part 2 can be accessed at: http://purl.access.gpo.gov/GPO/LPS111995
Book call no.: 327.1273 U585uc

United States.  Office of the National Counterintelligence Executive.  The National Counterintelligence Strategy of the United States of America.  Washington, National Counterintelligence Executive, 2009. 
Annual report.  Library has 2005, 2007-2009.
Also available online at: http://permanent.access.gpo.gov/lps65178/NatlCIStrategy2009.pdf
Book call no.: 327.1273 N2771


Documents

Bazan, Elizabeth B.  The Foreign Intelligence Surveillance Act: A Brief Overview of Selected Issues.  Washington, Congressional Research Service, December 7, 2007.  15 p. (CRS report for Congress, RL34279)
Link provides access to other versions of this report.
Also available online at:
https://opencrs.com/document/RL34279/2007-12-07/
Doc. call no.: M-U 42953-1 no.07-RL34279

Best, Richard A., Jr.  The Intelligence Community and 9/11: Congressional Hearings and the Status of the Investigation.  Washington, Congressional Research Service, January 16, 2003.  21 p. (CRS report for Congress, RL31650
Also available online at:
http://opencrs.com/document/RL31650/2003-01-16/
Doc. call no.: M-U 42953-1 no.03-RL31650

Best, Richard A., Jr.  Intelligence Community Reorganization.  Washington, Congressional Research Service, December 21, 2004.  16 p. (CRS report for Congress, RL32515)
Link also provides access to other versions of this report.
Also available online at: https://opencrs.com/document/RL32515/2004-12-21/
Doc. call no.: M-U 42953-1 no.04-RL32515

Best, Richard A., Jr.  Intelligence Estimates: How Useful to Congress?  Washington, Congressional Research Service, December 14, 2007.  15 p. (CRS report for Congress, RL33733)
Link provides access to other versions of this report.
Also available online at:
http://opencrs.com/document/RL33733/
Doc. call no.: M-U 42953-1 no.07-RL33733

Best, Richard A., Jr.  Intelligence Issues for Congress.  Washington, Congressional Research Service, March 3, 2011.  27 p. (CRS report for Congress, RL33539)
Link provides access to other versions of this report.
Also available
online at:https://opencrs.com/document/RL33539/
Doc. call no.: M-U42953-1 no.RL33539

Best, Richard A., Jr.  Intelligence, Surveillance, and Reconnaissance (ISR) Acquisition: Issues for Congress.  Washington, Congressional Research Service, June 15, 2010.  23 p. (CRS report for Congress, RL41284)
Link provides access to other versions of this report.
Also available online at:
http://opencrs.com/document/R41284/2010-06-15/
Doc. call no.: M-U 42953-1 no.R41284

Best, Richard A., Jr.  Intelligence to Counter Terrorism: Issues for Congress.  Washington, Congressional Research Service, February 21, 2002.  18 p. (CRS report for Congress, RL31292)
Link provides access to other versions of this report.
Also available online at:
http://opencrs.com/document/RL31292/2002-02-21/
Doc. call no.: M-U 42953-1 no.02-RL31292

Best, Richard A., Jr.  The National Counterterrorism Center (NCTC): Responsibilities and Potential Congressional Concerns.  Washington, Congressional Research Service, January 15, 2010.  10 p. (CRS report for Congress, R41022)
Link provides access to other versions of this report.
Also available online at:
http://opencrs.com/document/R41022/2010-01-15/
Doc. call no.: M-U 42953-1 no.R41022

Best, Richard A., Jr.  The National Intelligence Council: Issues and Options for Congress.  Washington, Congressional Research Service, September 2, 2009.  17 p. (CRS report for Congress, R40505)
Link provides access to other versions of this report.
Also available online at:
http://opencrs.com/document/R40505/
Doc. call no.: M-U 42953-1 no.R40505

Best, Richard A., Jr. and Bazan, Elizabeth B.  Intelligence Spending: Public Disclosure Issues.  Washington, Congressional Research Service, September 25, 2006.  45 p. (CRS report for Congress, 94-261)
Link provides access to other versions of this report.
Also available online at:
http://opencrs.com/document/94-261/
Doc. call no.: M-U 42953-1 no.94-261

Best, Richard A., Jr. and Cumming, Alfred.  Open Source Intelligence (OSINT): Issues for Congress.  Washington, Congressional Research Service, January 28, 2008  24 p. (CRS report for Congress, RL34270)
Link provides access to other versions of this report.
Also available online at:
http://opencrs.com/document/RL34270/2008-01-28/
Doc. call no.: M-U 42953-1 no.RL34270

Best, Richard A., Jr. and Elsea, Jennifer K.  Satellite Surveillance: Domestic Issues.  Washington, Congressional Research Service, February 1, 2010.  24 p.  (CRS report for Congress, RL34421)
Link provides access to other versions of this report.
Also available online at:
http://opencrs.com/document/RL34421/2011-01-13/
Doc. call no.: M-U 42953-1 no.RL34421

Cumming, Alfred.  Congress as a Consumer of Intelligence Information.  Washington, Congressional Research Service, January 28, 2010.  10 p. (CRS report for Congress, R40136)
Link provides access to other versions of this report.
Also available online at:
http://opencrs.com/document/R40136/2010-01-28/
Doc. call no.: M-U 42953-1 no.R40136

Cumming, Alfred.  Covert Action: Legislative Background and Possible Policy Questions.  Washington, Congressional Research Service, December 1, 2008.  8 p. (CRS report for Congress, RL33715)
Link provides access to other versions of this report.
Also available online at:
http://opencrs.com/document/RL33715/2008-12-01/
Doc. call no.: M-U 42953-1 no.RL33715

D'Agostino, Davi M.  Intelligence, Surveillance, and Reconnaissance: Overarching Guidance is Needed to Advance Information Sharing: Testimony before the Subcommittees on Air and Land Forces and Seapower and Expeditionary Forces, Committee on Armed Services, House of Representatives.  Washington, U.S. GAO, March 17, 2010.  10 p. (Testimony, GAO-10-500T)
Also available online at:
http://www.gao.gov/assets/130/124234.pdf
Doc. call no.: M-U 41026-173 no.10-500T

Kaiser, Frederick M.  Congressional Oversight of Intelligence: Current Structure and Alternatives.  Washington, Congressional Research Service, February 15, 2007.  23 p. (CRS report for Congress, RL32525)
Link provides access to other versions of this report.
Also available online at:
https://opencrs.com/document/RL32525/2007-02-15/
Doc. call no.: M-U 42953-1 no.RL32525

United States.  Congress.  Senate.  Committee on Homeland Security and Governmental Affairs.  Subcommittee on Oversight of Government Management, the Federal Workforce and the District of Columbia.  Personnel Security Clearances: Progress Has Been Made to Reduce Delays but Further Actions are Needed to Enhance Quality and Sustain Reform Efforts.  Testimony.  September 15, 2009.  Washington, U.S. GAO, 2009.  15 p. (Testimony, GAO-09-684T)
Statement/testimony of Brenda S. Farrell, Director Defense Capabilities and Management.  Highlights the personnel issues in the IC trying to conform to the Intelligence Reform and Terrorism Prevention Act of 2004 (IRTPA) requirements.
Also available online at:
http://www.gao.gov/assets/130/125407.pdf
Doc. call no.: M-U 41026-173 no.09-684T

United States.  Congress.  Senate.  Committee on Homeland Security and Governmental Affairs.  United States.  Government Accountability Office.  Terrorist Watchlist Screening: FBI Has Enhanced Its use of Information from Firearm and Explosives Background Checks to Support Counterterrorism Efforts.  Testimony.  Statement of Eileen R. Larence, May 5, 2010.  Washington, U.S. GAO, 2010.  12 p. (Testimony, GAO-10-703T)
Also available online at:
http://www.gao.gov/new.items/d10703t.pdf
Doc. call no.: M-U 41026-173 no.10-703T

United States.  Department of Defense.  Intelligence Science Board.  Report of the Joint Defense Science Board Intelligence Science Board Task Force on Integrating Sensor-Collected Intelligence.  Washington, Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics, 2008.  117 p.
Also available online at:
http://handle.dtic.mil/100.2/ADA491047
Doc. call no.: M-U 40607-222


Periodicals

Connors, Timothy.  Putting the “L” into Intelligence-Led Policing: How Police Leaders Can Leverage Intelligence Capability.  International Journal of Intelligence & CounterIntelligence  22:237-245  Summer 2009.
"The article focuses on the 'Radicalization in the West: The Homegrown Threat,' an intelligence assessment report compiled by the New York Police Department (NYPD) in 2007."--Abstract.

Hulnick, Arthur S.  Intelligence Producer-Consumer Relations in the Electronic Era.  International Journal of Intelligence & CounterIntelligence  24:747-756  Winter 2011-2012.
"The article explains the relationship between intelligence analysts and the government policy officials who utilize intelligence, with emphasis given to the U.S. intelligence system."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=65412796&site=ehost-live&scope=site&custid=airuniv

Matei, Florina Cristiana and Bruneau, Thomas C.  Policymakers and Intelligence Reform in the New Democracies.  International Journal of Intelligence & CounterIntelligence  24:656-691  Winter 2011-2012.
"The article examines reforms made to intelligence services by the governments of emerging democracies.  Countries discussed include Brazil, Argentina, and Russia."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=65412781&site=ehost-live&scope=site&custid=airuniv

Meydani, Assaf.  The Interrogation Policy of the Israeli General Security Service: Between Law and Politics.  International Journal of Intelligence & CounterIntelligence  21:26-39  Spring 2008.
"In 1999, the High Court of Justice (HCJ) forbid the use of physical pressure or torture in interrogation...considers public opinion, the investigation of terrorism, national security, and the use of physical pressure in special circumstances."--Abstract.

Zegart, Amy and Quinn, Julie.  Congressional Intelligence Oversight: The Electoral Disconnection.  Intelligence & National Security  25:744-766  December 2010.
"Political scientists have argued that Congress controls the bureaucracy - and in surprisingly efficient ways.  Yet the history of intelligence oversight suggests the opposite."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=56448419&site=ehost-live&scope=site&custid=airuniv


Types of Intelligence


Internet Resources

Barron, Eric.  Environmental Intelligence.  Research Penn State  23:30-31  May 2002.
Available online at: http://www.rps.psu.edu/0205/intelligence.html
A Special Report from the 2002 Penn State Lectures on the Frontiers of Science.

Doel, Ronald E.  Does Scientific Intelligence Matter?  Centaurus  52:311-322  November 2010.
Available online at: http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=54565325&site=ehost-live&custid=airuniv
"Some of the subjects explored include the U.S. State Department, the Central Intelligence Agency and its Office of Scientific Intelligence, the administration of U.S. President Harry S. Truman, the Marshall Plan for the reconstruction of Europe after World War II, American interventionism during the Cold War, and scientific internationalism and congresses."--Abstract.

Foreign Spies Stealing US Economic Secrets in Cyberspace: Report to Congress on Foreign Economic Collection and Industrial Espionage, 2009-2011.  Office of the National Counterintelligence Executive, October 2011.  31 p.
Available online at: http://www.ncix.gov/publications/reports/fecie_all/index.php
Other reports available via the web, from 1995.

Nakashima, Ellen.  U.S. Cyber-Spying Report Points to China, Russia.  The Washington Post, p A1, November 4, 2011.
Available online at: http://www.lexisnexis.com/lnacui2api/api/version1/getDocCui?lni=545T-7RT1-DXXY-33BG&csi=8075&hl=t&hv=t&hnsd=f&hns=t&hgn=t&oc=00240&perma=true

Office of the National Counterintelligence Executive.  Economic Espionage. 
Available online at: http://www.ncix.gov/issues/economic/index.php


Internet Resource (Student Research)

Levytskyi, Valentyn.  Economic Intelligence of the Modern State.  Monterey, CA, Naval Postgraduate School, March 2001.  87 p.
Available online at: http://handle.dtic.mil/100.2/ADA389697


Books

Ahern, Thomas L., Jr.  Vietnam Declassified: The CIA and Counterinsurgency.  Lexington, KY, University Press of Kentucky, 2010.  450 p.
Book call no.: 959.70438 A285v

Andreas, Peter.  Border Games: Policing the U.S.-Mexico Divide.  2nd ed.  Ithaca, NY, Cornell University Press, 2009.  180 p. (Cornell studies in political economy Cornell paperbacks)
Book call no.: 363.4509721 A557b 2009

Bowman, Marion Eugene.  Counterterrorism Activities of the FBI: At Home and Abroad.  Fort Lesley J. McNair, Washington, Center for Technology and National Security Policy, August 2007.  17 p. (Case studies in national security transformation no. 8)
Also available online at:
http://handle.dtic.mil/100.2/ADA471233
Book call no.: 363.32516 B787c

Carr, Jeffrey and Shepherd, Lewis.  Inside Cyber Warfare.  Sebastopol, CA, O'Reilly Media, 2010.  212 p.
"This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries."--Book jacket.
Book call no.: 303.625 C311i

Cassara, John A.  Hide & Seek: Intelligence, Law Enforcement, and the Stalled War on Terrorist Finance.  Washington, Potomac Books, 2007.  264 p.
Book call no.: 363.32517 C343h

The Challenge of Domestic Intelligence in a Free Society: A Multidisciplinary Look at the Creation of a U.S. Domestic Counterterrorism Intelligence Agency, edited by Brian A. Jackson.  Santa Monica, CA, RAND Corp., 2009.  283 p.
Also available online at:
http://handle.dtic.mil/100.2/ADA493749 http://www.rand.org/pubs/monographs/2009/RAND_MG804.pdf
Book call no.: 363.3251630973 C437

Clift, Arthur Denis.  Clift Notes: Intelligence and the Nation's Security, edited by James S. Major.  Washington, Joint Military Intelligence College, January 2000.  219 p.
"Speeches and essays examining 'the origins, evolution, and structure of intelligence in America, its place in the nation's defense and national security construct."--Abstract.
Provides an insight to intelligence just before 9/11.
Book call no.: 327.1273 C639c

Cooper, H. H. A. and Redlinger, Lawrence J.  Terrorism and Espionage in the Middle East: Deception, Displacement and Denial.  Lewiston, NY, Edwin Mellen Press, 2005.  773 p.
Book call no.: 303.6250956 C777t

Economic Security: Neglected Dimension of National Security? edited by Sheila R. Ronis.  Washington, National Defense University Press, 2011.  116 p.
Selected papers from the National Defense University Conference held on August 24-25, 2010.  Economic and energy security topics are discussed. 
Book call no.: 330.973 E196

Ellis, Jason D. and Kiefer, Geoffrey D.  Combating Proliferation: Strategic Intelligence and Security Policy.  Baltimore, MD, Johns Hopkins University Press, 2004.  287 p.
"In this comprehensive analysis...disturbing trends in both the collection and analysis of intelligence and in its use in the development and implementation of security policy."--Book jacket.
Book call no.: 358.30973 E47c

Field Evaluation in the Intelligence and Counterintelligence Context, rapporteur Robert Pool.  Washington, National Academies Press, 2010.  104 p.
"Summary of September 22-23, 2009, National Research Council workshop on the field evaluation of behavioral and cognitive sciences--based methods and tools for use in the areas of intelligence and counterintelligence."--Publisher.
Book call no.: 327.12 F453

Fundamental Elements of the Counterintelligence Discipline, edited by Andreas H. Golovin.  New York, Nova Science Publishers, 2009.  83 p. (Intelligence and Counterintelligence Studies Series)
Book call no.: 353.170973 F981

Grayson, Robert.  The FBI and National Security.  Broomall, PA, Mason Crest Publishers, 2010.  64 p. (FBI story)
Book call no.: 355.033073 G784f

Hitz, Frederick Porter.  Why Spy?: Espionage in an Age of Uncertainty.  New York, Thomas Dunne Books, 2008.  212 p.
"Structure of the U.S. intelligence community (which agency handles which?), traces the careers and pitfalls of such infamous spies as Robert Hanssen and Aldrich Ames, and explains how the United States must meet the challenges set forth in the Intelligence Reform and Terrorism Prevention Act of 2004."-Book jacket.
Book call no.: 327.1273 H676w

Intelligence: The Secret World of Spies: An Anthology, edited with introductions by Loch K. Johnson and James J. Wirtz.  3rd ed.  New York, Oxford University Press, 2011.  564 p.
"Includes the history of intelligence, how the United States gathers and interprets global information, the meaning of security intelligence, methods of intelligence collection, intelligence analysis...and intelligence as practiced in other nations."--Publisher.
Book call no.: 327.12 I616

Intelligence and National Security Policymaking on Iraq: British and American Perspectives, edited by James P. Pfiffner and Mark Phythian.  College Station, TX, Texas A&M University Press, 2008.  296 p. (Joseph V. Hughes, Jr. and Holly O. Hughes series on the presidency and leadership)
Book call no.: 956.704431 I61

Kent, Sherman.  Strategic Intelligence for American World Policy.  Princeton, NJ, Princeton University Press, 1966.  226 p.
Book call no.: 351.74 K37s 1966

Lance, Peter.  1000 Years for Revenge: International Terrorism and the FBI--The Untold Story.  New York, Regan Books, 2004.  539 p.
"Journalist Peter Lance reveals how the FBI missed dozens of opportunities to stop the attacks of September 11, dating back to 1989."--Book jacket.
Book call no.: 303.625 L246o

Mackinlay, John and Al-Baddawy, Alison.  Rethinking Counterinsurgency.  Santa Monica, CA, RAND Corp., 2008.  65 p. (RAND counterinsurgency study v. 5, RAND Corporation monograph series)
"British and U.S. counterinsurgency (COIN) operations have been slow to respond and adapt to the rise of the global jihadist insurgency.  Operational failures in Iraq and Afghanistan have highlighted the need for the West to rethink and retool its current COIN strategy."--RAND website.
Also available online at:
http://www.rand.org/pubs/monographs/2008/RAND_MG595.5.pdf
Book call no.: 355.0218 M158r

Norris, Pat.  Spies in the Sky: Surveillance Satellites in War and Peace.  New York, Springer-Praxis Publishing, 2008.  220 p. (Springer-Praxis books in space exploration)
Book call no.: 358.83 N857s

Perry, Walt L. and Gordon, John, IV.  Analytic Support to Intelligence in Counterinsurgencies.  Santa Monica, CA, RAND Corp., 2008.  57 p. (RAND Corporation monograph series)
"Examines the stages of an insurgency and discuss the kinds of intelligence that are needed at each stage."--RAND website.
Also available online at:
http://www.rand.org/pubs/monographs/2008/RAND_MG682.pdf
Book call no.: 355.34320973 P465a

Price, David H.  Weaponizing Anthropology: Social Science in Service of the Militarized State.  Oakland, CA, AK Press Distribution, 2011.  219 p.
"'Weaponizing Anthropology' documents how anthropological knowlege (sic) and ethnographic methods are harnessed by military and intelligence agencies in post-9/11 America to placate hostile foreign populations."--Abstract.
Book call no.: 301.0973 P945s

Rustmann, F. W., Jr.  CIA, Inc.: Espionage and the Craft of Business Intelligence.  Washington, Brassey's, 2002.  217 p.
"This book teaches the principles of intelligence and counterintelligence using the CIA's methods as a model for the business world."--Book jacket.
Book call no.: 658.47 R971c

Sibley, Katherine A. S.  Red Spies in America: Stolen Secrets and the Dawn of the Cold War.  Lawrence, KS, University Press of Kansas, 2004.  370 p.
Book call no.: 327.1247073 S564r

Sims, Jennifer E. and Gerber, Burton L.  Vaults, Mirrors, and Masks: Rediscovering U.S. Counterintelligence, editors Jennifer E. Sims and Burton Gerber.  Washington, Georgetown University Press, 2009.  310 p.
Book call no.: 327.1273 V376

Strategic Intelligence: Windows Into a Secret World: An Anthology, edited with Introductions by Loch K. Johnson, James J. Wirtz.  Los Angeles, Roxbury Pub. Co., 2004.  473 p.
Book call no.: 327.1273 S898

Svendsen, Adam D. M.  Intelligence Cooperation and the War on Terror: Anglo-American Security Relations After 9/11.  New York, Routledge, 2010.  236 p. (Studies in intelligence series)
Book call no.: 363.325163 S968i

Taubman, Philip.  Secret Empire: Eisenhower, the CIA, and the Hidden Story of America's Space Espionage.  New York, Simon & Schuster, 2003.  441 p.
Book call no.: 327.1273 T222s

Treverton, Gregory F.  Moving Toward the Future of Policing.  Santa Monica, CA, RAND, National Security Research Division, 2011.  156 p. (RAND corporation monograph series, MG1102)
"This book explores potential visions of the future of policing, based on the drivers of jurisdiction, technology, and threat, and includes concrete steps for implementation."--Abstract.
Also available online at:  http://www.rand.org/content/dam/rand/pubs/monographs/2011/RAND_MG1102.pdf
Book call no.: 363.20973 M935

Turbiville, Graham Hall, Jr.  Guerrilla Counterintelligence: Insurgent Approaches to Neutralizing Adversary Intelligence Operations.  Hulbert Field, FL, JSOU Press, January 2009.  79 p. (JSOU report no. 09-1)
Also available online at:
https://jsou.socom.mil/JSOU%20Publications/JSOU09-1turbivilleGuerrillaCI_final.pdf
Book call no.: 355.0218 T931g

United States.  Joint Forces Command.  Joint Irregular Warfare Center.  Irregular Adversaries and Hybrid Threats: An Assessment--2011.  Norfolk, VA, Joint Irregular Warfare Center, United States Joint Forces Command, 2011.  33 p.
Book call no.: 355.0218 I711

Van Cleave, Michelle K.  Counterintelligence and National Security.  Washington, National Defense University, School for National Security Executive Education, National Defense University Press, April 2007.  37 p.
Book call no.: 353.170973 V222c

Wiil, Uffe Kock.  Counterterrorism and Open Source Intelligence.  New York, Springer, 2011.  458 p. (Lecture notes in social networks v. 2)
Book call no.: 363.325170113 C855


Documents (Student Research)

Coble, Mark L.  National Guard Intelligence Support to Domestic Operations: A Monograph.  Fort Leavenworth, KS, School of Advanced Military Studies, U.S. Army Command and General Staff College, May 21, 2009.  46 p.
Also available online at:
http://handle.dtic.mil/100.2/ADA505038
Doc. call no.: M-U 42022-2 C656n

Degnan, Kevin J.  America's Soft Underbelly: Economic Espionage.  Carlisle Barracks, PA, U.S. Army War College, 2009.  26 p. (USAWC strategy research project)
"Foreign companies and governments seek to acquire U.S. technology capabilities in order to achieve technological parity and a competitive advantage with which to enhance their military capabilities."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA500584
Doc. call no.: M-U 39080-537 D318a

Repik, Keith A.  Defeating Adversary Network Intelligence Efforts With Active Cyber Defense Techniques.  Wright-Patterson AFB, OH, Air Force Institute of Technology, June 2008.  57 p.
Also available online at:
http://handle.dtic.mil/100.2/ADA488411
Doc. call no.: M-U 39567-5 R425d

Rourke, Kellie S.  U.S. Counterinsurgency Doctrine: Is It Adequate to Defeat Hezbollah as a Threat Model of Future Insurgencies?  Fort Leavenworth, KS, U.S. Army Command and General Staff College, June 12, 2009.  74 p.
"Specific areas to be studied against COIN doctrine include: ...advanced intelligence network and political and social advancements."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA502050
Doc. call no.: M-U 42022 R862u


Periodicals

Crawford, Michael.  Exploring the Maze: Counter-Proliferation Intelligence.  Survival  53:131-157  April-May 2011.
"Constrained by increasingly tight resources, Western intelligence agencies will have to take their relationships with one other to a new level of trust."--Abstract from Ebscohost.
Also available online at:  http://search.ebscohost.com.aufric.idm.oclc.org/login.aspx?direct=true&db=mth&AN=59755052&site=ehost-live&scope=site&custid=airuniv

Herzog, Jeffrey Owen.  Using Economic Intelligence to Achieve Regional Security Objectives.  International Journal of Intelligence & CounterIntelligence  21:302-313  Summer 2008.
"Accurate economic information about other nations provides an advantage in diplomatic confrontations and in armed conflict, according to the author."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=31134366&site=ehost-live&scope=site&custid=airuniv

Ilardi, Gaetano Joe.  Al-Qaeda's Counterintelligence Doctrine: The Pursuit of Operational Certainty and Control.  International Journal of Intelligence & CounterIntelligence  22:246-274  Summer 2009.
"Considers al-Qaeda'a logistics, organization, and counterintelligence...international cooperation of intelligence agencies, anti-terrorist efforts which have provided information regarding al-Qaeda, and the religious aspects of Islamic terrorist groups."--Abstract.

Kardell, Robert L.  Analysis of Digital Financial Data.  FBI Law Enforcement Bulletin  80:1-7  August 2011.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=64872094&site=ehost-live&scope=site&custid=airuniv

Michaels, Jeffrey H.  Agents for Stability or Chaos: Conceptualizing Intelligence "Relevance" in Counterinsurgency.  Studies in Conflict & Terrorism  34:212-227  March 2011.
Also available online at:
http://www.informaworld.com/openurl?genre=article&issn=1057%2d610X&volume=34&issue=3&spage=212

Parker, Marc and Taylor, Max.  Financial Intelligence: A Price Worth Paying?  Studies in Conflict & Terrorism  33:949-959  November 2010.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=54594497&site=ehost-live&scope=site&custid=airuniv

Shircliffe, James E., Jr.  Investing in Stability: The Need for Intelligence Preparation for Economic Operations.  Military Review  90:86-92  March-April 2010.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=50332472&site=ehost-live&scope=site&custid=airuniv

Sullivan, John P. and Wirtz, James J.  Terrorism Early Warning and Counterterrorism Intelligence.  International Journal of Intelligence & CounterIntelligence  21:13-25  Spring 2008.
"The article discusses how transnational terrorist networks exploit cracks in security and intelligence services, and what can be done to seal those cracks."--Abstract.


Disciplines/Sources/Collection Methods


Internet Resources

Central Intelligence Agency.  INTellingence: Open Source Intelligence  July 23, 2010.
Available online at: https://www.cia.gov/news-information/featured-story-archive/2010-featured-story-archive/open-source-intelligence.html

CIA Center on Climate Change and National Security.  Background Information Summaries, 2011  1 p.
Available online at: http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=70067298&site=ehost-live&scope=site&custid=airuniv
"In addition to serving as a resource for US policymakers, the Center was designed to work with the greater Intelligence Community (such as the National Geospatial-Intelligence Agency) to review, declassify, and disseminate data and imagery to civilian scientists."--Summary.

Crowe, June and Davidson, Thomas S., II.  The "Grey" Intersection of Open Source Information and Intelligence.  Conference Papers: International Conference on Grey Literature  10:82-91  2009.
Available online at: http://www.opengrey.eu/data/69/79/94/GL10_Crowe_and_Davidson_2009_Conference_Preprint.pdf
"This paper will define 'open source information' and look at specific government actions that have boosted support of open source information intelligence (OSINT), as well as the ongoing struggles within the IC to accept the new paradigm."--Abstract.

Defense Science Board Task Force.  Trends and Implications of Climate Change for National and International Security.  Washington, Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics, October 2011.  175 p.
Available online at: http://handle.dtic.mil/100.2/ADA553407

Dupré, Robert E.  Guide to Imagery Intelligence.  The Intelligencer: Journal of U.S. Intelligence Studies  18:61-64  Winter-Spring 2011.
Available online at: http://www.afio.com/publications/Dupre_IMINT_in_AFIO_INTEL_WinterSpring2011.pdf
Retired Air Force imagery specialist Robert E. Dupré covers the growth of imagery intelligence from the invention of photography in the 1830s through the world wars to today’s multispectral and radar imagery and commercial imagery satellites.

Faint, Charles D.  Exploitation Intelligence (EXINT): A New Intelligence Discipline?  American Intelligence Journal  29:65-69  March 2011.
Available online at: http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=65095486&site=ehost-live&scope=site&custid=airuniv
"The article focuses on the intelligence discipline exploitation intelligence (EXINT).  ...It mentions that exploitation of captured enemy personnel and materiel for intelligence has been practiced a long time ago."--Abstract from Ebscohost.

Fisher, Lynn F.  Espionage: Why Does it Happen?  DoD Security Institute, October 3, 2000.  10 p.
Available online at: http://www.au.af.mil/au/awc/awcgate/dod/espionage_whyhappens.pdf

GEOINT.  Military Intelligence Professional Bulletin July-September 2009.
Available online at: http://www.fas.org/irp/agency/army/mipb/2009_03.pdf
This issue contains several articles related to Geospatial Intelligence.  MSFRIC holds January 1994-December 2005 copies.

Norton, R. A.  Guide to Open Source Intelligence: A Growing Window into the World.  The Intelligencer: Journal of U.S. Intelligence Studies  18:65-67  Winter-Spring 2011.
Available online at: http://www.afio.com/publications/Norton_Open_Source_in_AFIO_INTEL_WinterSpring2011.pdf
His detailed footnotes and bibliography provide many avenues for further research and reading.

Strebel, Ian.  Improving Non-Lethal Targeting in COIN.  Ft. Huachuca, AZ, University of Military Intelligence, Dept. of the Army, 2008.  7 p.
Available online at: http://handle.dtic.mil/100.2/ADA494917
"There are two relatively untapped sources of intelligence collection that if used correctly can help achieve the goal of isolating the insurgents from the local population: open source intelligence (OSINT) and signals intelligence (SIGINT)."--Abstract.

Windrem, Robert.  How the CIA Diagnoses World Leaders from Afar.  MSNBC News, August 3, 2006.
Available online at: http://www.msnbc.msn.com/id/14173327/ns/world_news-americas/t/how-cia-diagnoses-world-leaders-afar/


Books

Applications of Information Systems to Homeland Security and Defense, edited by Hussein A. Abbass and Daryl Essam.  Hershey, PA, Idea Group Pub., 2006.  257 p.
"This book provides an overview of complex systems' techniques and presents both guidelines and specific instances of how they can be applied to security and defense applications"--Publisher.
Book call no.: 363.320285 A652

Arnold, David Christopher.  Spying From Space: Constructing America's Satellite Command and Control Systems.  College Station, TX, Texas A & M University Press, 2005.  209 p. (Centennial of flight series no. 12)
"Fills a gap in space history by telling the story of the command and control systems that made rockets and satellites useful."--Book jacket.
Book call no.: 358.8 A753s

Bamford, James.  The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America.  New York, Doubleday, 2008.  395 p.
"Bamford closely follows several of the 9/11 hijackers as they lived, plotted, and traveled in the United States for nearly two years...Incredibly, under Director Michael Hayden, the NSA was listening in - but never alerted anyone that the suspected terrorists were in America."--Book jacket.
Book call no.: 327.1273 B199s

Bean, Hamilton.  No More Secrets: Open Source Information and the Reshaping of U.S. Intelligence.  Santa Barbara, CA, Praeger, 2011.  218 p. (Praeger security international)
Book call no.: 327.1273 B367n

Berntsen, Gary.  Human Intelligence, Counterterrorism, & National Leadership: A Practical Guide.  Washington, Potomac Books, 2008.  136 p.
The author has written this book "as a guide for an incoming president and White House staff so that they may master current human intelligence and counterterrorism operations."--Book jacket.
Book call no.: 327.1273 B531h

Crowdy, Terry.  The Enemy Within: A History of Espionage.  New York, Osprey, 2006.  368 p.
Book call no.: 327.12 C953e

Daugherty, William J.  Executive Secrets: Covert Action and the Presidency.  Lexington, KY, University Press of Kentucky, 2004.  298 p.
Book call no.: 327.1273 D238e

Eyes on You: Background and Issues Surrounding Surveillance from the Sky, edited by Kyle P. Murphy.  New York, Nova Science Publishers, 2009.  150 p. (Intelligence and counterintelligence studies series)
"Discussion of legal considerations...within the meaning of the Fourth Amendment; an overview of statutory authorities...and a brief description of executive branch authorities and Department of Defense directives that might apply."--P. vii.
Book call no.: 323.44820973 E97

Gerolymatos, André.  Castles Made of Sand: A Century of Anglo-American Espionage and Intervention in the Middle East.  New York, Thomas Dunne Books, 2010.  347 p.
"How the United States and other Western powers have tried to establish control over the region's resources and commerce, while at the same time working to prevent the spread of communism."--Abstract.
Book call no.: 327.1241 G377c

Gibson, Bryan R.  Covert Relationship: American Foreign Policy, Intelligence, and the Iran-Iraq War, 1980-1988.  Santa Barbara, CA, Praeger, 2010.  291 p. (PSI reports)
Book call no.: 955.054220973 G448c

Graham, Thomas and Hansen, Keith A.  Spy Satellites: and Other Intelligence Technologies that Changed History.  Seattle, WA, University of Washington Press, 2007.  171 p.
"Focus on the role of intelligence collection systems in promoting arms control and disarmament...on the quality of the intelligence that has made possible accurate assessments of WMD programs in North Korea, Iran, and Libya."--Book jacket.
Book call no.: 327.1273047 G742s

Hastedt, Glenn P.  Espionage: A Reference Handbook.  Santa Barbara, CA, ABC-CLIO, 2003.  225 p. (Contemporary world issues)
"Explores the role that espionage plays in world politics today, discussing how it has changed over time, profiling famous spies, and pointing out the key role that advanced warning plays in national security."--Abstract.
Book call no.: 327.12 H356e

Hitz, Frederick Porter.  The Great Game: The Myth and Reality of Espionage.  New York, Alfred A. Knopf, 2004.  211 p.
Book call no.: 823.087 H676g

National Research Council (U.S.) and others.  New Research Directions for the National Geospatial-Intelligence Agency: Workshop Report.  Washington, National Academies Press, 2010.  59 p.
Book call no.: 910.285 N532

Net-Centric Approaches to Intelligence and National Security, edited by Roy Ladner and Frederick E. Petry.  New York, Springer Science+Business Media, 2005.  178 p.
Book call no.: 327.120285 N469

Pageln, Trevor.  Covert Operations and Classified Landscapes.  New York, Aperture, 2010.  159 p.
"Author Paglen, uses an array of tactics to explore 'the limits of the visible world, the nature of evidence, and the fuzzy and contradictory relationship between vision, imaging, knowing, belief, and truth.'"--Abstract.
Book call no.: 779.932712 P138i

Secrets of Signals Intelligence During the Cold War and Beyond, edited by Matthew M. Aid and Cees Wiebes.  Portland, OR, Frank Cass, 2001.  350 p. (Cass series--studies in intelligence)
Book call no.: 327.12 S4461

Steele, Robert David.  Human Intelligence: All Humans, All Minds, All the Time.  Carlisle Barracks, PA, Strategic Studies Institute, U.S. Army War College, May 10, 2010.  96 p. (Advancing strategic thought series)
Also available online at:
http://handle.dtic.mil/100.2/ADA522234
Book call no.: 355.343 S814h

Temple, L. Parker.  Shades of Gray: National Security and the Evolution of Space Reconnaissance.  Reston, VA, American Institute of Aeronautics and Astronautics, 2005.  613 p.
Book call no.: 358.84 T286s

Trahair, R. C. S. and Miller, Robert L.  Encyclopedia of Cold War Espionage, Spies, and Secret Operations.  New York, Enigma Books, 2009.  572 p.
Book call no.: 327.1209 T765e 2009

Trenear-Harvey, Glenmore S.  Historical Dictionary of Atomic Espionage.  Lanham, MD, Scarecrow Press, 2011.  243 p. (Historical dictionaries of intelligence and counterintelligence)
Book call no.: 327.12009 T794h

Wiil, Uffe Kock.  Counterterrorism and Open Source Intelligence.  New York, Springer, 2011.  458 p. (Lecture notes in social networks v. 2)
Book call no.: 363.325170113 C855


Documents (Student Research)

Bramble, Vincent Paul.  Covert Action Lead: Central Intelligence Agency or Special Forces: A Monograph.  Fort Leavenworth, KS, School of Advanced Military Studies, U.S. Army Command and General Staff College, May 2007.  49 p.
Also available online at:
http://handle.dtic.mil/100.2/ADA470469
Doc. call no.: M-U 42022-2 B815c

Finn, Michael, II.  Cognition 2035: Surviving a Complex Environment Through Unprecedented Intelligence.  Maxwell AFB, AL, Air War College, February 12, 2009.  42 p.
"This paper discusses inability of the human mind to comprehend and predict the environment of accelerating change in the year 2035.  It explores the current state of research in the areas of Artificial Intelligence and Enhanced Human Intelligence as means of overcoming the limits of natural human cognition."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA539862
Doc. call no.: M-U 43117 F5141c

Gross, Richard C.  Different Worlds: Unacknowledged Special Operations and Covert Action.  Carlisle Barracks, PA, U.S. Army War College, February 24, 2009.  22 p. (Student papers USAWC strategy research project)
Also available online at:
http://handle.dtic.mil/100.2/ADA494716
Doc. call no.: M-U 39080-537 G8782d

Gulden, Ryan J.  Near-Space Airships: The Solution to Persistent ISR.  Maxwell AFB, AL, Air Command and Staff College, March 2010.  11 p.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=31071
Doc. call no.: M-U 43122 G9712n

Hayford, Scott E.  Human Intelligence: America's Achilles.  Maxwell AFB, AL, Air Command and Staff College, April 2005.  47 p.
"...a problem is developing due to the continued exposure of classified methods, sources, capabilities, and limitations of America's intelligence system."--Abstract.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=25462
Doc. call no.: M-U 43122 H4184h

Menard, Jeffrey M.  Operationalizing Intelligence in Irregular Warfare.  Maxwell AFB, AL, Air Command and Staff College, March 2010.  10 p.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=42774
Doc. call no.: M-U 43122 M5351o

Moyer, Kevin J.  Intelligence Sharing in Counterproliferation.  Monterey, CA, Naval Postgraduate School, September 2007.  89 p.
"The purpose is to determine if we can prevent the spread of Weapons of Mass Destruction (WMD) material and related technology by improving working relationships with allies via intelligence sharing."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA474392
Doc. call no.: M-U 42525 M9383i

Pearce, Mark W.  The Evolution of Defense HUMINT Through Post Conflict Iraq.  Carlisle Barracks, PA, U.S. Army War College, March 20, 2009.  26 p. (USAWC strategy research project)
"Examines some of the historical experience of (human intelligence) HUMINT within the Department of Defense and proposes a set of recommendations for a more effective HUMINT effort in post conflict Iraq."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA497791
Doc. call no.: M-U 39080-537 P359e

Purdy, Donald D., Jr.  Prioritizing ISR to Attack the Seams of Irregular Networks.  Maxwell AFB, AL, Air Command and Staff College, April 2008.  35 p.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=36776
Doc. call no.: M-U 43122 P9855p

Robson, Thomas A.  A Burning Need to Know: The Use of Open Source Intelligence in the Fire Service.  Monterey, CA, Naval Postgraduate School, March 2009.  81 p.
Also available online at:
http://handle.dtic.mil/100.2/ADA497362
Also available online at: http://edocs.nps.edu/npspubs/scholarly/theses/2009/Mar/09Mar%5FRobson.pdf
Doc. call no.: M-U 42525 R667b

Sanchez, Andy.  Leveraging Geospatial Intelligence (GEOINT) in Mission Command: A Monograph.  Fort Leavenworth, KS, School of Advanced Military Studies, U.S. Army Command and General Staff College, March 21, 2009.  43 p.
Also available online at:
http://handle.dtic.mil/100.2/ADA506270
Doc. call no.: M-U 42022-2 S211L

Thomas, Jeffrey L.  Developing Geospatial Intelligence Stewardship for Multinational Operations.  Fort Leavenworth, KS, U.S. Army Command and General Staff College, June 11, 2010.  124 p.
Also available online at:
http://handle.dtic.mil/100.2/ADA524227
Doc. call no.: M-U 42022 T4581d

Tougaw, Ronald L., Jr.  Improving Collaboration Between Air Force Human Intelligence and Counterintelligence.  Maxwell AFB, AL, Air Command and Staff College, April 2009.  24 p.
Also available online at:
http://handle.dtic.mil/100.2/ADA539934
Doc. call no.: M-U 43122 T722i

Tussing, Amber C.  Reforming Domestic Intelligence: Bridging the Gap Between Domestic Intelligence and Law Enforcement.  Maxwell AFB, AL, Air Command and Staff College, April 2008.  36 p.
"This paper will examine past and current domestic terrorism threats and analyze current limitations impacting domestic intelligence and law enforcement effectiveness in domestic counterterrorism efforts."--Abstract.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=28020
Doc. call no.: M-U 43122 T965r

Wells, Leonard E.  Military Deception: Equivalent to Intelligence, Maneuver and Fires.  Newport, RI, Naval War College, October 31, 2008.  23 p.
"Argues that MILDEC (Military deception) should be included as a joint function in U.S. military doctrine to achieve desired effects with respect to adversarial leader decisions and decision making."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA494225
Doc. call no.: M-U 41662 W454m


Periodicals

Button, Keith.  SIGINT Question Marks.  C4ISR Journal  10:27  April 2011.
Congress has been assertively inquiring the Navy and intelligence officials to clarify their long-term plans for collecting airborne signals intelligence given the age of the Navy's EP-3E aircraft and the decision to cancel development of a successor.

Clemente, Jonathan.  CIA's Medical and Psychological Analysis Center (MPAC) and the Health of Foreign Leaders.  International Journal of Intelligence & CounterIntelligence  19:385-423  Fall 2006.
"The article discusses the functions of CIA's Medical and Psychological Analysis Center in monitoring the health of world leaders and its importance in the conduct of U.S. foreign policy."--Abstract.

Clemente, Jonathan D.  The Fate of an Orphan: The Hawley Board and the Debates over the Postwar Organization of Medical Intelligence.  Intelligence & National Security  20:264-287  June 2005.
"The principal reasons behind the failure of the Hawley plan were the re-emergence of prewar interservice rivalries, the dominant role of the Army medical intelligence program, and the lack of a joint military–CIA vision of a centralized medical intelligence service."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=17575495&site=ehost-live&scope=site&custid=airuniv

Clemente, Jonathan D.  In Sickness + In Health.  Bulletin of the Atomic Scientists  63:38-44+  March-April 2007.
"The article talks about the health conditions of political leaders."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=24825495&site=ehost-live&scope=site&custid=airuniv

Daugherty, William J.  Approval and Review of Covert Action Programs Since Reagan.  International Journal of Intelligence & CounterIntelligence  17:62-80  Spring 2004.

Foryst, Carole A.  Rethinking National Security Strategy Priorities.  International Journal of Intelligence & CounterIntelligence  23:399-425  Fall 2010.

Grow, Brian and others.  The New E-spionage Threat.  Business Week  no. 4080:32-41  April 21, 2008.
"The article discusses digital spies, the dangers of Internet espionage, 'spear-fishing,' and how computer technology is changing to develop stronger protections."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=31629701&site=ehost-live&scope=site&custid=airuniv

Ho, Shirley J.  An Economic Analysis of Military Intelligence.  Defence & Peace Economics  18:485-493  December 2007.
"Understand when a spy will be hired by a country, why a spy will defect, and how the enemy can use a double agent to fight back...provides four solutions to this defection problem in a spy contract using related discussions in the economic literature."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=27406144&site=ehost-live&scope=site&custid=airuniv

Innocenti, Charles W. ("Bill") and others.  Direct Support HUMINT in Operation Iraqi Freedom.  Military Review  89:48-56  May-June 2009.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=43247729&site=ehost-live&scope=site&custid=airuniv

Johnson, Loch.  Evaluating 'Humint': The Role of Foreign Agents in U.S. Security.  Comparative Strategy  29:308-332  September-October 2010.
"Survey data from inside the intelligence community indicates a high level of reliance on humint by Washington decision makers."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=54167370&site=ehost-live&scope=site&custid=airuniv

Kuromiya, Hiroaki.  Stalin's Great Terror and International Espionage.  Journal of Slavic Military Studies  24:238-252  April-June 2011.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=60849610&site=ehost-live&scope=site&custid=airuniv

Le Gallo, André.  Covert Action: A Vital Option in U.S. National Security Policy.  International Journal of Intelligence & CounterIntelligence  18:354-359  Summer 2005.
"Discusses role in the advancement of the country's interest in the war on terrorism; importance in facilitating democratization; capacity of CA to manipulate polices."--Abstract.

Lewis, James Andrew.  The Threat.  Government Executive  43:16-21  August 2011.
"Discusses the espionage as the biggest hurdle to cybersecurity in the U.S...mentions that cyber espionage is often invisible and is costly and damaging."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=65089371&site=ehost-live&scope=site&custid=airuniv

Magee, Aden C.  Countering Nontraditional HUMINT Collection Threats.  International Journal of Intelligence & CounterIntelligence  23:509-520  Fall 2010.
"U.S. National Counterintelligence Strategy and other national guidelines that address the relevance of nontraditional adversaries as active threats."--Abstract.

McDermott, Rose.  The Use and Abuse of Medical Intelligence.  Intelligence and National Security  22:491-520  August 2007.
"Systematic use of medical intelligence on foreign leaders can provide early warning to American leaders about the potential for destabilization in particular regimes where leaders are gravely ill."--Abstract.

Mercado, Stephen C.  Sailing the Sea of OSINT in the Information Age: A Venerable Source in a New Era.  Studies in Intelligence  48, no. 3:45-55  2004.
Also available online at:
https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol48no3/article05.html

Miller, Bowman H.  Improving All-Source Intelligence Analysis: Elevate Knowledge in the Equation.  International Journal of Intelligence & CounterIntelligence  21:337-354  Summer 2008.
"...Also examined is the fact that the general public expects too much of the intelligence community, the unmanageable amount of information to be analyzed and the analysis of intelligence to fit a preformed set of assumptions."--Abstract.

O'Conner, Sean.  Eye Spy: Satellites Change Military Concealment Tactics.  IHS Jane's Intelligence Review  24:8-13  May 2012.

Peruzzi, Luca.  Europe's Leading EW and SIGINT (Signal Intelligence) Programs.  Journal of Electronic Defense  34:30-32+  May 2011.
"This article presents updates on electronic warfare (EW) and signals intelligence (SIGINT) programs in Europe as of May 2011."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=64366020&site=ehost-live&scope=site&custid=airuniv

Porch, Douglas and Delgado, Jorge.  'Masters of Today': Military Intelligence and Counterinsurgency in Colombia, 1990-2009.  Small Wars & Insurgencies  21:277-302  June 2010.
"...like all intelligence services, that of the Colombian military continues to experience problems of structure and political outlook."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=51624174&site=ehost-live&scope=site&custid=airuniv

Reilly, Sean.  Automated Classification?  U.S. Looks to AI (Artificial Intelligence) as Workload Grows.  Defense News  26:48  June 20, 2011.

Spies for Hire.  Foreign Policy  165:23  March-April 2008.
"The article discusses the outsourcing of U.S. intelligence work to private firms.  The transmission of state secrets by defense companies is examined.  The practice of recruiting government analysts to private defense companies is also explored."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=31295993&site=ehost-live&scope=site&custid=airuniv

Stiefler, Todd.  CIA's Leadership and Major Covert Operations: Rogue Elephants or Risk-Averse Bureaucrats?  Intelligence & National Security  19:632-654  Winter 2004.
Discusses "accusations that the Central Intelligence Agency has distorted intelligence analysis to encourage covert operations."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=15496503&site=ehost-live&scope=site&custid=airuniv

Streetly, Martin.  Briefing: Airborne Intelligence, Surveillance and Reconnaissance.  Jane's Defence Weekly  48:22-24  August 31, 2011.

Streetly, Martin.  Briefing: Combat ISTAR (Intelligence, Surveillance, Targeting and Reconnaissance).  Jane's Defence Weekly  48:62-64  September 14, 2011.

Streetly, Martin.  Executive Snooper: The Rise and Rise of the King Air as an ISR Platform.  Jane's International Defence Review  44:62-65  April 2011.

Streetly, Martin.  The New Face of Airborne Sigint (Signals Intelligence): Global, Civil and in Real Time.  Jane's International Defence Review  44:48-53  January 2011.

Taylor, Daniel P.  Actionable Intelligence: As Data Pours in, Navy Officials Must Decide How Best to Use It.  Sea Power  54:16-18  February 2011.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=58829920&site=ehost-live&scope=site&custid=airuniv

Thompson, Clive.  Open-Source Spying.  New York Times Magazine  December 3, 2006.
Also available online at:
http://www.nytimes.com/2006/12/03/magazine/03intelligence.html

Varouhakis, Miron.  An Institution-Level Theoretical Approach for Counterintelligence.  International Journal of Intelligence & CounterIntelligence  24:494-509  Fall 2011.
"The article focuses on the creation of a theoretical framework for counterintelligence (CI).  It states that traditional CI operations and training were modeled from psychological and behavioral science theories and applied on a case-by-case basis."--Abstract.

Wilder, Matthew.  Geospatial-Intelligence in Tactical Operations and Planning.  Infantry  100:11-14  June-August 2011.
"The article explores geospatial intelligence (GEOINT), which proved itself as a invaluable instrument during Operation Iraqi Freedom.  An intelligence discipline, GEOINT includes imagery, advanced geospatial data and imagery analysis and its products provide situational awareness."--Abstract.
Also available online at:
hhttp://search.ebscohost.com/login.aspx?direct=true&db=f5h&AN=66723426&site=ehost-live&scope=site&custid=airuniv

Wirtz, James J. and Rosenwasser, Jon J.  From Combined Arms to Combined Intelligence: Philosophy, Doctrine and Operations.  Intelligence & National Security  25:725-743  December 2010.
"The article advances the combined arms concept as a way to foster synergies across the intelligence disciplines - geospatial, signals, measures and signals, human, and most recently open source intelligence."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=56448424&site=ehost-live&scope=site&custid=airuniv


Processing Intelligence


Internet Resource

Negulescu, Florin.  Intelligence Sharing and Dissemination in Combined Joint Special Operations.  Journal of Defense Resources Management  2:99-104  October 2011.
Available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=66933755&site=ehost-live&scope=site&custid=airuniv


Books

Analyzing Intelligence: Origins, Obstacles, and Innovations, edited by Roger Z. George and James B. Bruce.  Washington, Georgetown University Press, 2008.  340 p.
Book call no.: 327.1273 A532

Appel, Edward J.  Internet Searches for Vetting, Investigations, and Open-Source Intelligence.  Boca Raton, FL, CRC Press, 2011.  302 p.
Book call no.: 303.4833 A646i

Applications of Information Systems to Homeland Security and Defense, edited by Hussein A. Abbass and Daryl Essam.  Hershey, PA, Idea Group Pub., 2006.  257 p.
"This book provides an overview of complex systems' techniques and presents both guidelines and specific instances of how they can be applied to security and defense applications."--Publisher.
Book call no.: 363.320285 A652

Betts, Richard K.  Enemies of Intelligence: Knowledge and Power in American National Security.  New York, Columbia University Press, 2007.  241 p.
"Outlines strategies for better intelligence gathering and assessment."--Book jacket.
Book call no.: 327.1273 B565e

Connable, Ben.  Embracing the Fog of War: Assessment and Metrics in Counterinsurgency.  Santa Monica, CA, RAND, 2012.  308 p.
"The author proposes an alternative process -- contextual assessment -- that accounts for the realities of the COIN environment and the needs of both policymakers and commanders."--Abstract. 
Since this manuscript was completed in mid-2011, various elements of DoD have published new doctrine on assessment, some of which addresses criticisms raised in this report.
Also available online at:
http://www.rand.org/content/dam/rand/pubs/monographs/2012/RAND_MG1086.pdf
Book call no.: 355.02180973 C752e

Deakin, Richard S.  Battlespace Technologies Network-Enabled Information Dominance.  Boston, Artech House, 2010.  509 p. (Artech house intelligence and information operations library)
"Shows you what factors need to be taken into account when designing systems and equipment for use in a network-enabled environment...explores what evolving requirements to consider for future air, land, and sea battlespace scenarios."--Abstract.
Book call no.: 355.070973 D278b

Fingar, Thomas.  Reducing Uncertainty: Intelligence Analysis and National Security.  Stanford, CA, Stanford Security Studies, 2011.  176 p.
Book call no.: 327.1273 F497r

Hall, Wayne Michael and Citrenbaum, Gary.  Intelligence Analysis: How to Think in Complex Environments.  Santa Barbara, CA, Praeger Security International, 2010.  440 p. (An AUSA book)
"This book offers a vast conceptual and theoretical exploration of the ways intelligence analysis must change in order to succeed against today's most dangerous combatants and most complex irregular theatres of conflict."--Abstract.
Book call no.: 327.12 H181i

Heuer, Richards J.  Psychology of Intelligence Analysis.  Washington, Center for the Study of Intelligence, 1999.  184 p.
Book call no.: 355.3432 H592p

Institute of Land Warfare.  Key Issues Relevant to Army Intelligence Transformation.  Arlington, VA, Institute of Land Warfare, Association of the United States Army, July 2007.  15 p. (Torchbearer national security report)
Also available online at:
http://www.ausa.org/publications/torchbearercampaign/tnsr/Documents/TNSR_07-07_Intel.pdf
Book call no.: 355.343 K44

Larson, Eric V. and others.  Assessing Irregular Warfare: A Framework for Intelligence Analysis.  Santa Monica, CA, RAND Arroyo Center, 2008.  67 p. (RAND corporation monograph series)
"Includes a list of references to IW-relevant doctrinal publications."--Book jacket.
Also available online at:
http://www.rand.org/pubs/monographs/2008/RAND_MG668.pdf
Book call no.: 355.3432 A846

Menthe, Lance and Sullivan, Jeffrey.  A RAND Analysis Tool for Intelligence, Surveillance, and Reconnaissance: The Collections Operations Model.  Santa Monica, CA, RAND, 2008.  20 p.
Also available online at:
http://www.rand.org/pubs/technical_reports/TR557.html
Book call no.: 355.33041 M549r

Nilsson, Nils J.  The Quest for Artificial Intelligence: A History of Ideas and Achievements.  New York, Cambridge University Press, 2010.  562 p.
Book call no.: 006.3 N712q

Poole, David L. and Mackworth, Alan K.  Artificial Intelligence: Foundations of Computational Agents.  New York, Cambridge University Press, 2010.  662 p.
"AI is a rapidly developing field: this book encapsulates the latest results without being exhaustive and encyclopedic.  It teaches the main principles and tools that will allow readers to explore and learn on their own."--Publisher.
Book call no.: 006.3 P822a

Spinning Intelligence: Why Intelligence Needs the Media, Why the Media Needs Intelligence, edited by Robert Dover and Michael S. Goodman.  London, Hurst & Co., 2009.  263 p.
Book call no.: 070.44932712 S757

Treverton, Gregory F.  Reshaping National Intelligence for an Age of Information.  New York, Cambridge University Press, 2003.  266 p. (RAND studies in policy analysis)
"Suggests why intelligence needs to be both contrarian, leaning against the conventional wisdom, and attentive to the longer term, leaning against the shrinking time horizons of Washington policy makers."--Book jacket.
Book call no.: 327.1273 T812r

Treverton, Gregory F. and Gabbard, C. Bryan.  Assessing the Tradecraft of Intelligence Analysis.  Santa Monica, CA, RAND Corporation, 2008.  54 p. (Technical report)
Also available online at:
http://www.rand.org/content/dam/rand/pubs/technical_reports/2008/RAND_TR293.pdf
Book call no.: 327.1273 T812a

United States.  Bureau of Justice Assistance.  Fusion Center Guidelines: Developing and Sharing Information and Intelligence in a New Era.  Washington, Department of Justice, Office of Justice Programs, Bureau of Justice Assistance, August 2006.  119 p.
Guidelines for establishing and operating fusion centers at the local, state, and federal levels.
Also available online at:
http://it.ojp.gov/documents/fusion_center_guidelines_law_enforcement.pdf
Book call no.: 363.24 F993

United States.  Intelligence Science Board.  Concept Paper on Trusted Information Sharing.  Washington, Intelligence Science Board, 2004.  7 p.
Also available online at:
http://www.fas.org/irp/dni/isb/trusted.pdf
Book call no.: 353.17238 U58c

Walsh, Patrick F.  Intelligence and Intelligence Analysis.  New York, Routledge, 2011.  332 p.
Book call no.: 327.12 W226i

Walton, Timothy R.  Challenges in Intelligence Analysis: Lessons From 1300 BCE to the Present.  New York, Cambridge University Press, 2010.  294 p.
"Offers concrete, reality-based ways to improve intelligence analysis...global in scope and deal with a variety of political, military, economic, and social issues."--Publisher.
Book call no.: 355.343209 W241c


Document (Student Research)

Schafer, David C.  A Systems Engineering Survey of Artificial Intelligence and Smart Sensor Networks in a Network-Centric Environment.  Monterey, CA, Naval Postgraduate School, September 2009.  91 p.
Also available online at:
http://handle.dtic.mil/100.2/ADA509294
Also available online at:
http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FSchafer%5FDavid.pdf
Doc. call no.: M-U 42525 S296s


Periodicals

Canton, Belinda.  The Active Management of Uncertainty.  International Journal of Intelligence & CounterIntelligence  21:487-518  Fall 2008.
"The author urges the Defense Intelligence Agency and the Central Intelligence Agency to improve the analysis of information gained through espionage."--Abstract.

Donovan, G. Murphy.  Escaping the New Wilderness of Mirrors.  International Journal of Intelligence & CounterIntelligence  22:730-738  Winter 2009.
"The article discusses the need for changes to the paradigm for U.S. National Intelligence Estimates (NIEs)."--Abstract.

Foryst, Carole A.  Missing from U.S. Intelligence Analysis: The Concept of “Total U.S.”.  International Journal of Intelligence & CounterIntelligence  22:396-420  Fall 2009.
"According to the author, the IC is driven by seven kinds of thinking which are defensive thinking, stale assumptions, reactive posture, constrained imagination, no national strategy, constrained perceptions, and failures that it has experienced."--Abstract.

Gardner, Greg and Killebrew, Robert.  Gangs, Drugs, Terrorism- and Information-Sharing.  JFQ: Joint Force Quarterly  54:68-73  3rd Quarter 2009.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=aph&AN=44242053&site=ehost-live&scope=site&custid=airuniv

Hulnick, Arthur S.  Intelligence Producer-Consumer Relations in the Electronic Era.  International Journal of Intelligence & CounterIntelligence  24:747-756  Winter 2011-2012.
"The article explains the relationship between intelligence analysts and the government policy officials who utilize intelligence, with emphasis given to the U.S. intelligence system."Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=65412796&site=ehost-live&scope=site&custid=airuniv

Kahn, Martin.  Russia Will Assuredly Be Defeated: Anglo-American Government Assessments of Soviet War Potential before Operation Barbarossa.  Journal of Slavic Military Studies  25:220-240  April-June 2012.
"The sources reveal much detail about the perceived weakness of Soviet war potential, and in what specific respects the Anglo-Americans underestimated Soviet strength."--Abstract.

Lawlor, Maryann.  Economics Seeps into Intelligence Assessments.  Signal  64:41-45  October 2009.
"According to a senior U.S. intelligence official, an economic downturn affects the way the intelligence community identifies, assesses and predicts trends, challenges and opportunities."--Summary.
Also available online at:
http://search.proquest.com/docview/216183850?accountid=4332

Segell, Glen M.  Creating Intelligence: Information Operations in Iraq.  International Journal of Intelligence & CounterIntelligence  22:89-109  Spring 2009.
Also available online at: 
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=35656425&site=ehost-live&scope=site&custid=airuniv


Global


Internet Resources

Australia Defence Signals Directorate. 
Available online at: http://www.dsd.gov.au/

Canadian Security Intelligence Service. 
Available online at: https://www.csis.gc.ca/index-eng.asp

Cronin, Patrick M. and Giarra, Paul S.  Robotic Skies: Intelligence, Surveillance, Reconnaissance and the Strategic Defense of Japan.  Washington, Center for a New American Security, December 2010.  17 p. (Working paper)
Available online at: http://handle.dtic.mil/100.2/ADA540997

Medar, Sergui.  Military Intelligence Transformation: Accomplishing New Missions in Response to the Recent NATO Strategic Concept.  American Intelligence Journal  29:12-16  March 2011.
Available online at: http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=65095480&site=ehost-live&scope=site&custid=airuniv

Shootdown in Peru: The Secret U.S. Debate Over Intelligence Sharing with Peru and Colombia, edited by Michael L. Evans.  The National Security Archive, George Washington University, April 23, 2001.
Available online at: http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB44/

United Kingdom MI5 The Security Service. 
Available online at: https://www.mi5.gov.uk/

United States.  Congress.  House.  Committee on House Foreign Affairs. Subcommittee on Oversight and Investigations.  Chinese Cyberattacks and Espionage.   April 15, 2011.
Available online at: http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=32Y2072512673&site=ehost-live&scope=site&custid=airuniv
Congressional testimony of Pat Choate director of The Manufacturing Policy Project, a non-profit public policy research institute that studies the U.S. and global economy.

Wege, Carl Anthony.  Hizbollah--Syrian Intelligence Affairs: A Marriage of Convenience.  Journal of Strategic Security  4:1-14  August 2011.
Available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=65469932&site=ehost-live&scope=site&custid=airuniv

Wise, David.  China’s Spies Are Catching Up.  The New York Times December 10, 2011.
Available online at: http://www.nytimes.com/2011/12/11/opinion/sunday/chinas-spies-are-catching-up.html?_r=1&ref=espionage
American intelligence agencies have ignored China for too long.  Now Beijing’s spies are catching up.


Books

Alexander, John B.  Intelligence Scotomas in Central and South America.  Carlisle Barracks, PA, Proteus USA, March 2008.  113 p. (Proteus monograph series, vol. 1, no. 4)
"The United States needs a strategic shift in policy if we are to foster harmonious relations with our southern neighbors and hope to stem the tide of a far larger infestation of crime and terrorism."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA509054
Book call no.: 320.98 A376i

Andrew, Christopher M.  Defend the Realm: The Authorized History of MI5.  New York, Alfred A. Knopf, 2009.  1032 p.
Book call no.: 327.1241 A562d

Bergman, Ronen.  The Secret War With Iran: The 30-Year Clandestine Struggle Against the World's Most Dangerous Terrorist Power, translated by Ronnie Hope.  New York, Free Press, 2008.  419 p.
"A vast clandestine war has been fought with Iran and Hizballah on one side and the CIA, Israel's Mossad, and their European counterparts on the other."--Abstract.
Book call no.: 955.054 B4991s

Boer, Peter.  Canadian Security Intelligence Service.  Edmonton, Canada, Folklore Pub., 2010.  255 p.
"The Canadian Security Intelligence Service (CSIS) was created to safeguard Canada's national security, but hot on the heels of its successes have come controversies and scandals."--Publisher.
Book call no.: 327.1271 B672c

Chalk, Peter and Rosenau, William.  Confronting "The Enemy Within": Security Intelligence, The Police, and Counterterrorism in Four Democracies.  Santa Monica, CA, RAND, 2004.  67 p.
"Analysis of the domestic security services of four allied countries - the United Kingdom, France, Canada, and Australia."--Book jacket.
Also available online at:
http://www.rand.org/content/dam/rand/pubs/monographs/2004/RAND_MG100.pdf
Book call no.: 363.32516 C436c

Considering the Creation of a Domestic Intelligence Agency in the United States: Lessons From the Experiences of Australia, Canada, France, Germany, and the United Kingdom, edited by Brian A. Jackson.  Santa Monica, CA, RAND Homeland Security Program and the Intelligence Policy Center, 2009.  194 p. (RAND corporation monograph series)
"Prepared for the Department of Homeland Security."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA494510
http://www.rand.org/pubs/monographs/2009/RAND_MG805.pdf
Book call no.: 363.325163 C755

Herman, Michael.  Intelligence Power in Peace and War.  New York, Royal Institute of International Affairs, Cambridge University Press, 1996.  414 p.
Book call no.: 327.1241 H551i

Hooker, Gregory.  Shaping the Plan for Operation Iraqi Freedom: The Role of Military Intelligence Assessments.  Rev. ed.  Washington, Washington Institute for Near East Policy, 2005.  114 p. (Military research papers no. 4)
"In this study, Gregory Hooker provides a detailed narrative of the war planning process, spanning the military's initial attempts to refocus on regime change and the government's ineffective preparation for the postwar environment."--Book jacket.
Book call no.: 956.70443 H783s

Inside Canadian Intelligence: Exposing the New Realities of Espionage and International Terrorism, edited by Dwight Hamilton.  2nd ed.  Tonawanda, NY, Dundurn Press, 2011.  316 p.
"Provides a concise exposé of every government organization in the Canadian national security sector."--P. 4 of cover.
Book call no.: 327.1271 I59 2011

Intelligence and National Security Policymaking on Iraq: British and American Perspectives, edited by James P. Pfiffner and Mark Phythian.  College Station, TX, Texas A&M University Press, 2008.  296 p. (Joseph V. Hughes, Jr. and Holly O. Hughes series on the presidency and leadership)
Book call no.: 956.704431 I61

Intelligence: The Secret World of Spies: An Anthology, edited with introductions by Loch K. Johnson and James J. Wirtz.  3rd ed.  New York, Oxford University Press, 2011.  564 p.
"Includes the history of intelligence, how the United States gathers and interprets global information, the meaning of security intelligence, methods of intelligence collection, intelligence analysis...and intelligence as practiced in other nations."--Publisher.
Book call no.: 327.12 I616

Jeffery, Keith.  The Secret History of MI6.  New York, Penguin Press, 2010.  810 p.
"An authorized history of the world's oldest foreign intelligence service covers MI6's alliance with the United States, its contributions to wars, and its relationship with the CIA."--Abstract.
Book call no.: 327.1241009 J45s

Kahana, Ephraim and Suwaed, Muhammad.  Historical Dictionary of Middle Eastern Intelligence.  Lanham, MD, Scarecrow Press, 2009.  362 p. (Historical dictionaries of intelligence and counterintelligence no. 10)
Book call no.: 327.1256003 K11h

O'Connell, Jack.  King's Counsel: A Memoir of War, Espionage, and Diplomacy in the Middle East.  New York, W.W. Norton & Co., 2011.  266 p.
"Hussein, the Middle East's only bona-fide peacemaker, wanted simply the return of the West Bank, seized in the Six-Day War.  Despite American promises, the clear directive of UN Resolution 242, and the years of secret negotiations with Israel, that never happened."--Abstract.
Book call no.: 956.04 O18k

Pedahzur, Ami.  The Israeli Secret Services and the Struggle Against Terrorism.  New York, Columbia University Press, 2009.  215 p.
"An expert on terror and political extremism, Ami Pedahzur argues that Israel's strict reliance on the elite units of the intelligence community is fundamentally flawed."--Book jacket.
Book call no.: 363.325156095694 P371i

Posner, Richard A.  Remaking Domestic Intelligence.  Stanford, CA, Hoover Institution Press, 2005.  95 p. (Hoover Institution Press publication no. 541)
Book call no.: 363.250973 P855r

Satia, Priya.  Spies in Arabia: The Great War and the Cultural Foundations of Britain's Covert Empire in the Middle East.  New York, Oxford University Press, 2008.  458 p.
"Tracks the intelligence community's tactical grappling with this problem and the myriad cultural, institutional, and political consequences of their methodological choices during and after the Great War."--Book jacket.
Book call no.: 940.486410956 S253s

Schecter, Jerrold L. and Schecter, Leona.  Sacred Secrets: How Soviet Intelligence Operations Changed American History.  Washington, Brassey's, 2002.  403 p.
Book call no.: 327.1247 S314s

Seliktar, Ofira.  The Politics of Intelligence and American Wars with Iraq.  New York, Palgrave Macmillan, 2008.  214 p. (The Middle East in focus)
Book call no.: 956.704428 S465p

Thom, William G.  African Wars: A Defense Intelligence Perspective.  Calgary, Canada, University of Calgary Press, 2010.  257 p. (Africa, missing voices series no. 7, ADST-DACOR diplomats and diplomacy series)
"This book provides a concise summary of four decades of warfare in sub-Saharan Africa, with expert commentary by an experienced and highly respected senior U.S. intelligence officer."--Product description.
Book call no.: 355.033067 T452a

Who's Watching the Spies?: Establishing Intelligence Service Accountability, edited by Hans Born and others.  Washington, Potomac Books, 2005.  255 p.
"Experts...use a structured approach, they examine the strengths and weaknesses of the intelligence systems of Argentina, Canada, Germany, Norway, Poland, South Africa, South Korea, the United Kingdom, and the United States."--Book jacket.
Book call no.: 353.17235 W628

Wilford, Timothy.  Canada's Road to the Pacific War: Intelligence, Strategy, and the Far East Crisis.  Vancouver, Canada, UBC Press, 2011.  286 p. (Studies in Canadian military history)
Book call no.: 940.5426 W677c

Wise, David.  Tiger Trap: America's Secret Spy War with China.  Boston, Houghton Mifflin Harcourt, 2011.  292 p.
Book call no.: 327.51073 W812t

Ziadeh, Radwan.  Power and Policy in Syria: The Intelligence Services, Foreign Relations and Democracy in the Modern Middle East.  New York, I.B. Tauris and Co., 2011.  228 p. (Library of modern Middle East studies no. 98)
Book call no.: 320.95691 Z64p


Documents (Student Research)

Hensley, Thomas K.  Smart Intelligence for Smart Power: Improving Early Warning for Civil-Military Operations in Africa.  Maxwell AFB, AL, Air University, April 2010.  61 p.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=37333
Doc. call no.: M-U 42252-91 H526s

Karver, Kirk S.  Leveraging U.S. Intelligence to Defeat Mexican Drug Trafficking Organization: A Framework for Strengthening Democracy, Sovereignty, and the Rule of Law in Mexico.  Washington, Office of the Director of National Intelligence, May 25, 2010.  77 p.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=28104
Doc. call no.: M-U 42252-91 K181L

Maceda, Steven E.  Dysfunction Junction: Intelligence, Peacekeeping, and the United Nations.  Monterey, CA, Naval Postgraduate School, September 2007.  103 p.
"This study concludes that the UN would be well-served by adopting the existing NATO model for OSINT production."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA473962
Doc. call no.: M-U 42525 M1411d

Madeley, Curtis J.  Israeli Intelligence: Lessons the United States Can Learn to Combat Terrorism.  Maxwell AFB, AL, Air Command and Staff College, April 2008.  42 p.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=49294
Doc. call no.: M-U 43122 M181i

Mixon, Laurence M.  Requirements and Challenges Facing the NATO Intelligence Fusion Center.  Maxwell AFB, AL, Air War College, January 12, 2007.  30 p.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=36953
Doc. call no.: M-U 43117 M6852r


Periodicals

Díaz Fernández, Antonio M.  The Spanish Intelligence Community: A Diffuse Reality.  Intelligence & National Security  25:223-244  April 2010.
"The functioning and composition of the Spanish Intelligence Community is not regulated in detail by any legal regulations, and neither the intelligence service nor the government have specified these despite the repeated references they make to them."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=51982003&site=ehost-live&scope=site&custid=airuniv

Filip, Valentin Fernand and Ştefureac, Remus Ioan.  The Dilemmas of Linking Romanian Intelligence, Universities, and Think Tanks.  International Journal of Intelligence & CounterIntelligence  24:711-732  Winter 2011-2012.
"Discusses the Romanian Intelligence Service (SRI)...obstacles that the SRI faces in integrating itself into civil society, due to the abuses of the former Communist regime's Securitatae intelligence apparatus, are described."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=65412785&site=ehost-live&scope=site&custid=airuniv

Gendron, Angela.  Confronting Terrorism in Saudi Arabia.  International Journal of Intelligence & CounterIntelligence  23:487-508  Fall 2010.

Huckabey, Jessica M. and Stout, Mark E.  Al Qaida's Views of Authoritarian Intelligence Services in the Middle East.  Intelligence & National Security  25:327-349  June 2010.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=52174231&site=ehost-live&scope=site&custid=airuniv

Iancu, Niculae and Tranciuc, Gabriela.  Planning and Strategy in Reforming Romania's SRI.  International Journal of Intelligence & CounterIntelligence  25:111-129  Spring 2012.

Lefebvre, Stéphane.  The Czech Experience With Intelligence Reforms, 1993-2010.  International Journal of Intelligence & CounterIntelligence  24:692-710  Winter 2011-2012.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=65412787&site=ehost-live&scope=site&custid=airuniv

Maddrell, Paul.  Failing Intelligence: U.S. Intelligence in the Age of Transnational Threats.  International Journal of Intelligence & CounterIntelligence  22:195-220  Summer 2009.
"The article focuses on challenges presented by transnational terrorists and rogue nations to American and Western intelligence services."--Abstract.

Norheim-Martinsen, Per Martin and Ravndal, Jacob Aasland.  Towards Intelligence-Driven Peace Operations?  The Evolution of UN and EU Intelligence Structures.  International Peacekeeping  18:454-467  August 2011.
"Identifies key determining factors behind the development of intelligence structures within international organizations – a capacity normally seen as belonging to the national domain."--Abstract.

Ramjoué, Melanie.  Improving UN Intelligence through Civil–Military Collaboration: Lessons from the Joint Mission Analysis Centres.  International Peacekeeping  18:468-484  August 2011.
"The article examines the contribution of the UN's Joint Mission Analysis Centre (JMAC) to UN intelligence capabilities and concludes that, in larger missions in particular, the multidisciplinary JMAC structure has delivered valuable intelligence to senior mission management."--Abstract.

Rogers, Mike.  Fresh Eyes on the IC.  C4ISR Journal  10:40-41  March 2011.

Stéphane, Lefebvre and McDermott, Roger N.  Russia and the Intelligence Services of Central Asia.  International Journal of Intelligence & CounterIntelligence  21:251-301  Summer 2008.
"In this article the authors examine the impact that the Soviet-era security agency, the KGB, has exerted on the post-Soviet republics of Central Asia."--Abstract.

Wippl, Joseph W.  Intelligence Exchange Through InterIntel.  International Journal of Intelligence & CounterIntelligence  25:1-18  March 30, 2012.
"The article discusses intelligence exchange between both foreign and domestic intelligence services.  It is suggested that intelligence exchange is key to combating multilateral threats such as terrorism and organized crime and will occur more often in the future."--Abstract.


History


Internet Resources

Air Force Intelligence, Surveillance and Reconnaissance Agency History. 
Available online at: http://www.afisr.af.mil/library/history/index.asp
"The Air Force established the Air Force Security Group in June 1948.  It was the precursor to today's Air Force Intelligence, Surveillance and Reconnaissance Agency."--Website.

Allen, Deane J.  Relationship of DIA and the DCS/J2.
Available online at: http://www.dia.mil/history/features/dia-and-the-JCSJ2/
Deane J. Allen, DIA Historian.

Berkowitz, Bruce.  National Reconnaissance Office at 50 Years: A Brief History.  Chantilly, VA, Center for the Study of National Reconnaissance, National Reconnaissance Office, September 2011.  44 p.
Available online at: http://www.nro.gov/history/csnr/programs/NRO_Brief_History.pdf

Central Intelligence Agency.  About CIA.
Available online at: https://cia.gov/about-cia/history-of-the-cia/interactive-timeline/index.html
The left navigation bar provides other interesting links about the CIA.

History: 50 Years of Excellence in Defense of the Nation.
Available online at: http://www.dia.mil/history/

Office of Naval Intelligence History. 
Available online at: http://www.oni.navy.mil/This_is_ONI/Proud_History.html

Rosen, Dave.  A Brief History of the USCG PACAREA Intelligence Division. 10 p.
Available online at: http://www.uscg.mil/history/articles/PiHistory2009.pdf

U.S. Army Military Intelligence History: A Sourcebook, edited by James P. Finley.  Fort Huachuca, AZ, U.S. Army Intelligence Center, 1995.  419 p.
Available online at: http://www.huachuca.army.mil/files/History_MIReader.pdf


Books

Aid, Matthew M.  Intel Wars: The Secret History of the Fight Against Terror.  New York, Bloomsbury Press, 2012.  261 p.
Book call no.: 363.325 A288i

Aid, Matthew M.  The Secret Sentry: The Untold History of the National Security Agency.  New York, Bloomsbury Press, 2009.  423 p.
Book call no.: 327.1273 A288s

Aldrich, Richard J.  Intelligence and the War Against Japan: Britain, America and the Politics of Secret Service.  New York, Cambridge University Press, 2000.  500 p.
"Intelligence and the War against Japan offers the first comprehensive scholarly history of the development of the British secret service and its relations with its American intelligence counterparts during the war with Japan."--Book jacket.
Book call no.: 940.548641 A365i

Andrew, Christopher M.  For the President's Eyes Only: Secret Intelligence and the American Presidency From Washington to Bush.  New York, HarperPerennial, 1996.  660 p.
Book call no.: 327.1273 A562f 1996

Arnold, David Christopher.  Spying From Space: Constructing America's Satellite Command and Control Systems.  College Station, TX, Texas A & M University Press, 2005.  209 p. (Centennial of flight series no. 12)
"Fills a gap in space history by telling the story of the command and control systems that made rockets and satellites useful."--Book jacket.
Book call no.: 358.8 A753s

Batvinis, Raymond J.  The Origins of FBI Counterintelligence.  Lawrence, KS, University Press of Kansas, 2007.  332 p. (Modern war studies)
Book call no.: 327.1273 B336o

Brugioni, Dino A.  Eyes in the Sky: Eisenhower, the CIA, and Cold War Aerial Espionage.  Annapolis, MD, Naval Institute Press, 2010.  466 p.
Doc. call no.: 327.1273009 B891e

Callanan, James.  Covert Action in the Cold War: US Policy, Intelligence, and CIA Operations.  London, I.B. Tauris, 2010.  268 p. (International library of twentieth century history no. 21)
"This comprehensive examination of a still controversial subject sheds valuable new light on the undercover operations mounted by the CIA during the Cold War."--Product description.
Book call no.: 327.1273009045 C156c

Carter, John J.  Covert Action as a Tool of Presidential Foreign Policy: From the Bay of Pigs to Iran-Contra.  Lewiston, NY, Edwin Mellen Press, 2006.  250 p.
Book call no.: 327.1273 C323c

Chandler, Stedman and Robb, Robert W.  Front-Line Intelligence.  Washington, Infantry Journal Press, 1946.  183 p.
Book call no.: 355.3432 C456f

Conant, Jennet.  A Covert Affair: Julia Child and Paul Child in the OSS.  New York, Simon & Schuster, 2011.  395 p.
"A stunning account of Julia Child's early life as an OSS agent in the Far East."--Abstract.
Doc. call no.: 940.5485 C743c

Crowdy, Terry.  The Enemy Within: A History of Espionage.  New York, Osprey, 2006.  368 p.
Book call no.: 327.12 C953e

Diamond, John M.  The CIA and the Culture of Failure: U.S. Intelligence from the End of the Cold War to the Invasion of Iraq.  Stanford, CA, Stanford Security Series, 2008.  536 p.
"The 9/11 attacks and the War in Iraq sprang in no small part from massive intelligence failures, that much is well understood.  How the CIA got to a point where it could fail so catastrophically is not."--Book jacket.
Book call no.: 327.1273 D537c

Dower, John W.  Cultures of War: Pearl Harbor, Hiroshima, 9-11, Iraq.  New York, New Press, 2010.  596 p.
A "comparative study of the dynamics and pathologies of war in modern times.  ...Dower also sets the U.S. occupations of Japan and Iraq side by side in strikingly original ways."--Abstract.
Book call no.: 355.00973 D746c

Faddis, Charles S.  Beyond Repair: The Decline and Fall of the CIA.  Guilford, CT, Lyons Press, 2010.  183 p.
Book call no.: 327.1273 F144b

Finnegan, John Patrick.  The Military Intelligence Story: A Photo History.  2nd ed.  Fort Belvoir, VA, History Office, Office of the Chief of Staff, U.S. Army Intelligence and Security Command, 1997. 
Also available online at:
http://www.asalives.org/ASAONLINE/mistory.htm
Book call no.: 355.3432 F514m 1997

Ford, Christopher A.  The Admirals' Advantage: U.S. Navy Operational Intelligence in World War II and the Cold War.  Annapolis, MD, Naval Institute Press, 2005.  219 p.
Book call no.: 359.34320973 F699a

Geraghty, Tony.  Black Ops: The Rise of Special Forces in the C.I.A., the S.A.S., and Mossad.  New York, Pegasus Books, 2010.  440 p.
"Unveils the evolution of this refined style of war-making from its roots in anti-guerrilla warfare in Ireland and Palestine, by way of the creation of the CIA, the SAS, the Green Berets, America's Office of Strategic Services (OSS), and many others."--Publisher.
Book call no.: 327.12 G354b

Gladman, Brad William.  Intelligence and Anglo-American Air Support in World War Two: The Western Desert and Tunisia, 1940-43.  New York, Palgrave Macmillan, 2009.  252 p. (Studies in military and strategic history)
Book call no.: 940.542311 G542i

Graham, Thomas and Hansen, Keith A.  Spy Satellites: And Other Intelligence Technologies that Changed History.  Seattle, WA, University of Washington Press, 2007.  171 p.
"Focus on the role of intelligence collection systems in promoting arms control and disarmament...on the quality of the intelligence that has made possible accurate assessments of WMD programs in North Korea, Iran, and Libya."--Book jacket.
Book call no.: 327.1273047 G742s

Harris, Charles H.  The Archaeologist was a Spy: Sylvanus G. Morley and the Office of Naval Intelligence.  Albuquerque, NM, University of New Mexico Press, 2003.  450 p.
Book call no.: 940.48673 H313a

Hitz, Frederick Porter.  The Great Game: The Myth and Reality of Espionage.  New York, Alfred A. Knopf, 2004.  211 p.
Book call no.: 823.087 H676g

Huchthausen, Peter A. and Sheldon-Duplaix, Alexandre.  Hide and Seek: The Untold Story of Cold War Naval Espionage.  Hoboken, NJ, John Wiley & Sons, 2009.  414 p.
"Cold War naval espionage, from the final months of World War II to the fall of the Soviet Union in 1991."--Book jacket.
Book call no.: 359.3432097309045 H882h

Intelligence: The Secret World of Spies: An Anthology, edited with introductions by Loch K. Johnson and James J. Wirtz.  3rd ed.  New York, Oxford University Press, 2011.  564 p.
"Includes the history of intelligence, how the United States gathers and interprets global information, the meaning of security intelligence, methods of intelligence collection, intelligence analysis...and intelligence as practiced in other nations."--Publisher.
Book call no.: 327.12 I616

Jakub, Jay.  Spies and Saboteurs: Anglo-American Collaboration and Rivalry in Human Intelligence Collection and Special Operations, 1940-45.  New York, St. Martin's Press, 1999.  280 p.
Book call no.: 940.5486 J25s

Jeffery, Keith.  The Secret History of MI6.  New York, Penguin Press, 2010.  810 p.
"An authorized history of the world's oldest foreign intelligence service covers MI6's alliance with the United States, its contributions to wars, and its relationship with the CIA."--Abstract.
Book call no.: 327.1241009 J45s

Jeffreys-Jones, Rhodri.  The FBI: A History.  New Haven, CT, Yale University Press, 2007.  317 p.
"Common wisdom traces the origin of the bureau to 1908, but Jeffreys-Jones locates its true beginnings in the 1870s, when Congress acted in response to the Ku Klux Klan campaign of terror against black American voters."--Book jacket.
Book call no.: 363.250973 J46f

Kahana, Ephraim and Suwaed, Muhammad.  Historical Dictionary of Middle Eastern Intelligence.  Lanham, MD, Scarecrow Press, 2009.  362 p. (Historical dictionaries of intelligence and counterintelligence no. 10)
Book call no.: 327.1256003 K11h

Kahn, David.  The Reader of Gentlemen's Mail: Herbert O. Yardley and the Birth of American Codebreaking.  New Haven, CT, Yale University Press, 2004.  318 p.
"History of American intelligence up to World War I, and gives a short course in classical codes and ciphers...asserts that Yardley's disclosures not only did not hurt but actually helped American codebreaking during World War II."--Book jacket.
Book call no.: 92 Y27k

Keegan, John.  Intelligence in War: Knowledge of the Enemy From Napoleon to Al-Qaeda.  New York, Knopf, 2003.  387 p.
Book call no.: 355.3432 K26i

Keegan, John.  Intelligence in War: The Value--and Limitations--of What the Military Can Learn About the Enemy.  New York, Vintage Books, 2004.  387 p.
Book call no.: 355.3432 K26ib

Kent, Sherman.  Strategic Intelligence for American World Policy.  Princeton, NJ, Princeton University Press, 1966.  226 p.
Book call no.: 351.74 K37s 1966

Kiriakou, John.  The Reluctant Spy: My Secret Life in the CIA's War on Terror.  New York, Bantam Books, 2010.  192 p.
"Describes what it was like inside the CIA headquarters on the morning of 9/11, the agency leaders who stepped up and those who protected their careers...how the White House made plans to invade Iraq a full year before the CIA knew about it--or could attempt to stop it."--Abstract.
Book call no.: 327.12730092 K58r

Lilley, James R. and Lilley, Jeffrey.  China Hands: Nine Decades of Adventure, Espionage, and Diplomacy in Asia.  New York, PublicAffairs, 2004.  417 p.
Book call no.: 327.73051 L729c

Mahoney, Robert J.  The Mayaguez Incident: Testing America's Resolve in the Post-Vietnam Era.  Lubbock, TX, Texas Tech University Press, 2011.  336 p. (Modern Southeast Asia series)
"Focuses largely on the decisions made during the four days of the Mayaguez crisis (last battle of Vietnam War) and the results of those decisions at all strategic, operational, and tactical levels."--Abstract.
Book call no.: 327.73059609 M216m

Meyer, Michael B.  A History of Socio-Cultural Intelligence and Research Under the Occupation of Japan.  Carlisle Barracks, PA, Strategic Studies Institute, U.S. Army War College, April 2009.  23 p. (Carlisle papers in security strategy)
Also available online at:
http://www.strategicstudiesinstitute.army.mil/pdffiles/PUB914.pdf
Book call no.: 952.04 M613h

Miles, Anne Daugherty.  The Creation of the National Imagery and Mapping Agency: Congress' Role as Overseer.  Washington, Joint Military Intelligence College, April 2001.  109 p. (Occasional paper no. 9)
Book call no.: 352.379 M643c

O'Hern, Steven K.  The Intelligence Wars: Lessons From Baghdad.  Amherst, NY, Prometheus Books, 2008.  292 p.
"Offers a critical assessment of our intelligence failures and suggests ways of improving our ability to fight an often elusive enemy."--Book jacket.
Book call no.: 956.704438 O37i

Parker, Johnson.  Secrets of a Century: The Influence of Espionage & Secret Agreements.  Lanham, MD, University Press of America, 2004.  236 p.
"Includes clandestine agreements among the various European nations, attempts at code-breaking before World War II, and the affects of secrets upon the courses of the Korean, Vietnam, and Serbian wars."--Abstract.
Book call no.: 327.12 P241s

Pincher, Chapman.  Treachery: Betrayals, Blunders, and Cover-Ups: Six Decades of Espionage Against America and Great Britain.  New York, Random House, 2009.  679 p.
Book call no.: 327.1247073 P647t

Satia, Priya.  Spies in Arabia: The Great War and the Cultural Foundations of Britain's Covert Empire in the Middle East.  New York, Oxford University Press, 2008.  458 p.
"Tracks the intelligence community's tactical grappling with this problem and the myriad cultural, institutional, and political consequences of their methodological choices during and after the Great War."--Book jacket.
Book call no.: 940.486410956 S253s

Schecter, Jerrold L. and Schecter, Leona.  Sacred Secrets: How Soviet Intelligence Operations Changed American History.  Washington, Brassey's, 2002.  403 p.
Book call no.: 327.1247 S314s

Secrets of Signals Intelligence During the Cold War and Beyond, edited by Matthew M. Aid and Cees Wiebes.  Portland, OR, Frank Cass, 2001.  350 p. (Cass series--studies in intelligence)
Book call no.: 327.12 S4461

Sibley, Katherine A. S.  Red Spies in America: Stolen Secrets and the Dawn of the Cold War.  Lawrence, KS, University Press of Kansas, 2004.  370 p.
Book call no.: 327.1247073 S564r

Swenson, Russell George and Lemozy, Susana C.  Intelligence Professionalism in the Americas.  Rev. ed.  Washington, Center for Strategic Intelligence Research, Joint Military Intelligence College, U.S. GPO, 2004.  572 p.
Book call no.: 355.3432 I614 2004

Taubman, Philip.  Secret Empire: Eisenhower, the CIA, and the Hidden Story of America's Space Espionage.  New York, Simon & Schuster, 2003.  441 p.
Book call no.: 327.1273 T222s

Tenet, George.  At the Center of the Storm: My Years at the CIA.  New York, HarperCollins, 2007.  549 p.
Book call no.: 327.12730092 T292a

Theoharis, Athan G.  Abuse of Power: How Cold War Surveillance and Secrecy Policy Shaped the Response to 9/11.  Philadelphia, Temple University Press, 2011.  212 p.
Book call no.: 363.32516 T391a

Thomas, Martin.  Empires of Intelligence: Security Services and Colonial Disorder After 1914.  Berkeley, CA, University of California Press, 2008.  428 p.
"Argues that colonial control in the British and French empires depended on an elaborate security apparatus...shows for the crucial role of intelligence gathering in maintaining imperial control in the years before decolonization."--Book jacket.
Book call no.: 325.3 T459e

Trahair, R. C. S. and Miller, Robert L.  Encyclopedia of Cold War Espionage, Spies, and Secret Operations.  New York, Enigma Books, 2009.  572 p.
Book call no.: 327.1209 T765e 2009

Trenear-Harvey, Glenmore S.  Historical Dictionary of Atomic Espionage.  Lanham, MD, Scarecrow Press, 2011.  243 p. (Historical dictionaries of intelligence and counterintelligence)
Book call no.: 327.12009 T794h

Twentieth Century Fund.  Task Force on the Future of U.S. Intelligence.  In From the Cold: The Report of the Twentieth Century Fund Task Force on the Future of U.S. Intelligence.  New York, Twentieth Century Fund Press, 1996.  275 p.
Background papers by Allan E. Goodman, Gregory F. Treverton and Philip Zelikow.
Book call no.: 327.1273 I35

United States.  Defense Intelligence Agency.  Defense Intelligence Agency 50th Anniversary: An Illustrated History.  Arlington, VA, U.S. Defense Intelligence Agency, 2011.  89 p.
"Aided by numerous photographs, this volume tells the story of the first five decades of the Defense Intelligence Agency, how it grew in missions, abilities, size and credibility."--Abstract.
Book call no.: 355.34320973 D313

Waller, Douglas C.  Wild Bill Donovan: The Spymaster Who Created the OSS and Modern American Espionage.  New York, Free Press, 2011.  466 p.
"Donovan was director of the Office of Strategic Services (the country's first national intelligence agency) and the father of today's CIA."--Book jacket.
Book call no.: 940.548673092 W198w

Walton, Timothy R.  Challenges in Intelligence Analysis: Lessons From 1300 BCE to the Present.  New York, Cambridge University Press, 2010.  294 p.
"Offers concrete, reality-based ways to improve intelligence analysis...global in scope and deal with a variety of political, military, economic, and social issues."--Publisher.
Book call no.: 355.343209 W241c

Weiner, Tim.  Legacy of Ashes: The History of the CIA.  New York, Doubleday, 2007.  702 p.
Book call no.: 327.1273009 W423L

West, Nigel.  Historical Dictionary of Naval Intelligence.  Lanham, MD, Scarecrow Press, 2010.  406 p. (Historical dictionaries of intelligence and counterintelligence no. 13)
Book call no.: 359.343203 W519h

Wiebes, Cees.  Intelligence and the War in Bosnia, 1992-1995.  New Brunswick, Great Britain, Transaction Publishers, 2003.  463 p. (Studies in intelligence history, v.1)
Book call no.: 949.703 W642i

Wilford, Timothy.  Canada's Road to the Pacific War: Intelligence, Strategy, and the Far East Crisis.  Vancouver, Canada, UBC Press, 2011.  286 p. (Studies in Canadian military history)
Book call no.: 940.5426 W677c


Documents (Student Research)

Bird, John J.  Analysis of Intelligence Support to the 1991 Persian Gulf War: Enduring Lessons.  Carlisle Barracks, PA, U.S. Army War College, March 19, 2004.  20 p. (USAWC strategy research project)
Also available online at:
http://handle.dtic.mil/100.2/ADA423282
Doc. call no.: M-U 39080-537 B6181a

Fry, William J.  Thickening the Fog: The Truncation of Air Intelligence Since World War II.  Maxwell AFB, AL, School of Advanced Air and Space Studies, June 2010.  84 p.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=25766
Doc. call no.: M-U 43998-1 F947t

Murray, Scott F.  Intelligence Reform: The Historical Mind and Support to Military Operations.  Maxwell AFB, AL, Air University, April 2007.  48 p.
"Three historical vignettes serve as the analytical foundation for this research monograph: Gallipoli Campaign (1915), Tet Offensive (1968) and Operation ALLIED FORCE (1999)."--Abstract.
Also available online at:
http://dtlweb.au.af.mil/webclient/DeliveryManager?pid=25628
Doc. call no.: M-U 42252-91 M984i

Pearce, Mark W.  The Evolution of Defense HUMINT Through Post Conflict Iraq.  Carlisle Barracks, PA, U.S. Army War College, March 20, 2009.  26 p. (USAWC strategy research project)
"Examines some of the historical experience of (human intelligence) HUMINT within the Department of Defense and proposes a set of recommendations for a more effective HUMINT effort in post conflict Iraq."--Abstract.
Also available online at:
http://handle.dtic.mil/100.2/ADA497791
Doc. call no.: M-U 39080-537 P359e


Periodicals

Builta, Jeffrey A. and Heller, Eric N.  Reflections on 10 Years of Countering Terrorism.  Studies in Intelligence  55:1-15  September 2011.
Also available online at:
https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/vol.-55-no.-3/pdfs/Builta-Heller-CTBestPractices-Eversion-7-Oct-2011.pdf

Kuromiya, Hiroaki.  Stalin's Great Terror and International Espionage.  Journal of Slavic Military Studies  24:238-252  April-June 2011.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=tsh&AN=60849610&site=ehost-live&scope=site&custid=airuniv

Rath, Thomas J.  Tools of Change: Tactical C4IRS and Conflicts--Past, Present, and Future.  Air & Space Power Journal  25:100-114  Summer 2011.
"The author echoes the call for a purpose-built command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) aircraft for the irregular warfare environment, which the Air Force can share with partner nations."--Abstract.
Also available online at:
http://search.ebscohost.com/login.aspx?direct=true&db=mth&AN=64285937&site=ehost-live&scope=site&custid=airuniv


Authority Materials


AFM 200-3.  Handbook for Air Intelligence Officers.  May 1953.
Located in bound volume 47 in the Authority Section of the Fairchild Research Information Center.

AFPD 14-1.  Intelligence Applications and Requirements Planning.  June 1999.  1 vol.

AFPD 14-3.  Control, Protection, and Dissemination of Intelligence Information.  June 1993.  1 vol.


This page was last updated on 02/21/2014 01:47 PM

Back Arrow Return to Bibliography List
Back Arrow
Return to the Fairchild Research Information Center Homepage