Skip to content

Introduction to Intelligence Studies

Best in textbook rentals since 2012!

ISBN-10: 1466500034

ISBN-13: 9781466500037

Edition: 2012

Authors: Carl J. Jensen, David H. McElreath, Melissa Graves

List price: $62.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Since the attacks of 9/11, the United States intelligence community has undergone an extensive overhaul, including the formation of the Office of the Director of National Intelligence. This book explores the history of intelligence and security, presenting a comprehensive examination of the pillars of American intelligence systems—collection, analysis, counterintelligence, and covert operations—and demonstrates how these work together. In addition, the text covers law and ethics, writing and briefing for the intelligence community, and emerging threats and challenges.
Customers also bought

Book details

List price: $62.99
Copyright year: 2012
Publisher: Taylor & Francis Group
Publication date: 1/18/2013
Binding: Hardcover
Pages: 374
Size: 7.00" wide x 10.00" long x 0.75" tall
Weight: 1.782
Language: English

Preface
Acknowledgments
Authors
An Overview of Intelligence
Introduction
What Is Intelligence?
The Challenge of Defining Intelligence
Information and Intelligence
Types of Intelligence
Functions of Intelligence Agencies
Policymakers and Decision-Makers
Intelligence Foundations in U.S. Government
U.S. Intelligence Community
Purpose of Intelligence
Limitations of Intelligence
Conclusion
Key Terms
References
History of Intelligence in the United States
Introduction
Revolutionary War to Civil War
Civil War to World War I
Law Enforcement Intelligence: The Palmer Raids
World War I to Pearl Harbor
World War II
The Cold War
National Security Act of 1947
Early Days of the CIA
Korean War
Creation of the National Security Agency
Evolution of IMINT
Cuba
Vietnam Era
War at Home
Watergate and the Pike and Church Committees
The Carter Years
The Reagan Years: End of the Cold War
End of the Soviet Union
Emergence of Terrorism
Espionage in 1980s and 1990s
The Clinton Years
9/11 and Its Aftermath
Intelligence Reform and Terrorism Prevention Act of 2004 and Creation of the Director of National Intelligence
Recent Developments in the Struggle against Terrorism
Conclusion
Key Terms
References
The IC Today
Introduction
Designated Federal Agencies and the DNI
Director of National Intelligence
Independent Agencies: CIA
Department of Energy: Office of Intelligence and Counterintelligence
DHS: Office of Intelligence and Analysis
DHS: Coast Guard Intelligence
Department of Justice: FBI
Department of Justice: DEA
Department of State: Bureau of Intelligence and Research
Department of the Treasury: Office of Terrorism and Financial Intelligence
Military Agencies: Army, Navy, Air Force, and Marines
Military Agencies: Defense Intelligence Agency
Military Agencies: National Geospatial-Intelligence Agency
Military Agencies: National Security Agency
Military Agencies: National Reconnaissance Office
Federal, State, and Local Agencies
Federal Agencies
State and Local Agencies
State and Local Police Departments
Fusion Centers
Private Sector
Conclusion
Key Terms
References
Collection
Introduction
Considerations for Collection
Credibility Issues: Vetting the Source
Information: How Much Is Enough?
Protecting Sources and Methods
First Step in Collection-You Need to Have a Plan
Collection Methods: The "INTs"
Human Intelligence
Signals Intelligence
The Special Case of "Chatter"
Law Enforcement Operations
Geospatial Intelligence
Measurement and Signatures Intelligence
Financial Intelligence
Open Source Intelligence
Conclusion
Key Terms
References
Barriers to Analysis
Introduction
Murky World of the IC
Psychological Barriers
Group Decision-Making
Bureaucratic Barriers: Politics and the Will of the Policymaker
Bureaucratic Barriers: Information Sharing
Security and Sharing: Inherent Tension
Conclusion
Key Terms
References
Analytical Methods
Introduction
Critical Thinking
Collaboration
Structured Analytical Techniques
Understanding Our Assumptions: Key Assumptions Check
Considering All Sides of the Issue: Analysis of Competing Hypotheses
Preparing for Whatever Comes: Scenarios
The Emperor s Clothes Are Fair Game: Contrarian Methods
Analytical Software
Conclusion
Key Terms
References
Putting It All Together: The Intelligence Cycle
Introduction
Information and the Origin of the Intelligence Cycle
The Intelligence Cycle
Step One: Planning and Direction
Step Two: Collection
Step Three: Processing and Exploitation
Step Four: Analysis and Production
Step Five: Dissemination
Step Six: Evaluation
Critical Reactions to the Intelligence Cycle
Conclusion
Key Terms
References
Counterintelligence
Introduction
Defensive Counterintelligence
Classification Systems
Security Clearances
Counterintelligence Operations
Offensive Counterintelligence
Catching Spies in the United States
International Operations
Disinformation
Counterintelligence Operations Today
Conclusion
Key Terms
References
Further Reading
Covert Operations
Introduction
Covert Operations
Clandestine Operations
Deception Operations
Recent History of Covert and Clandestine Operations by the United States
Military Covert Operations
Legal Requirements upon the President to Report Intelligence Operations
Covert Operations and the War on Terror
Are Covert Operations a Good Idea?
Conclusion
Key Terms
References
Constitutional Mandates-Overview of Executive, Legislative, and Judicial Roles
Introduction
Legal Origin of the Intelligence Community
Intelligence and International Law
Targeting and Assassination
Fourth Amendment: Right to Privacy
History of FISA
28 Code of Federal Regulations 23
First Amendment Issues and Intelligence
USA PATRIOT Act
Intelligence Reform and Terrorism Prevention Act
Terrorism and Legal Proceedings
Classified Information Procedures Act
Ethics
Conclusion
Key Terms
References
Writing and Briefing for the Intelligence Community
Introduction
Writing
Types of Intelligence Writing
Writing for an Audience
How to Write Intelligence Products
Good versus Bad Intelligence Writing
The Art of Writing
Sentence Structure
The Active Voice
Identifying Agents
Commas
Needless Words
Reading Level of the Analytic Piece
The Writing Process
Briefing
Basics of Public Speaking
Briefing Preparation
The Briefing
Conclusion
Key Terms
Additional Readings
References
Military Intelligence
Introduction
Purpose of Military Intelligence
Types of Military Intelligence
Command and Control
The Military Intelligence Cycle
Evolution of Military Intelligence
Current State of Military Intelligence
Intelligence Role of the Commander
Role of the Military Intelligence Officer
The "2 Section"
Military Intelligence Assets
Intelligence Preparation of the Battlefield and Today's Threat Structure
Military Intelligence within the National Defense Structure
United States Army
United States Navy
United States Marine Corps
United States Air Force
Conclusion
Key Terms
References
Criminal Intelligence and Crime Analysis
Introduction
History of Intelligence in Law Enforcement
Law Enforcement and Intelligence
Criminal Intelligence before the 9-11 Attacks
Intelligence-Led Policing in the United States and the National Criminal Intelligence Sharing Plan
Fusion Centers
Crime Analysis
Research behind Crime Analysis
Types of Crime Analysis
Crime Mapping
Tactical Crime Analysis
Criminal Investigative Analysis
Geographic Profiling
Conclusion
Key Terms
References
Threats and Challenges for the Twenty-First Century
Introduction
Threats
Natural Threats
Illicit Drug Production and Distribution
Border Security and Immigration Issues
Transnational Organized Crime
Human Trafficking
Intellectual Property Theft
Cyber Security
Weapons Trafficking
Conventional Weapons
Chemical Weapons
Biological Weapons
Nuclear and Radiological Weapons
Explosives
Terrorism
Failed States, Failing States, and Rogue Nations
Conclusion
Key Terms
References
Future of Intelligence
Introduction
Forecasting the Future
A Look Ahead
Technology
Demographics
Economic Trends
Politics/Governance
Vision 2015: How the DNI Defines the Future
Infrastructure and Technology
Policy
Personnel
Conclusion
Key Terms
References
Index