The International Politics of Intelligence Sharing / / James Igoe Walsh.

The cross-border sharing of intelligence is fundamental to the establishment and preservation of security and stability. The American invasion of Iraq in 2003 was based in part on flawed intelligence, and current efforts to defeat al Qaeda would not be possible without an exchange of information amo...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter Columbia University Press eBook-Package Backlist 2000-2013
VerfasserIn:
Place / Publishing House:New York, NY : : Columbia University Press, , [2009]
©2009
Year of Publication:2009
Language:English
Online Access:
Physical Description:1 online resource (208 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9780231520881
lccn 2009019568
ctrlnum (DE-B1597)459424
(OCoLC)956785435
collection bib_alma
record_format marc
spelling Walsh, James Igoe, author. aut http://id.loc.gov/vocabulary/relators/aut
The International Politics of Intelligence Sharing / James Igoe Walsh.
New York, NY : Columbia University Press, [2009]
©2009
1 online resource (208 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Frontmatter -- Contents -- Acknowledgments -- 1. Understanding Intelligence Sharing: Curveball and KSM -- 2. Transatlantic Intelligence Sharing During the Cold War -- 3. Intelligence Sharing for Counterinsurgency: Vietnam and Colombia -- 4. Intelligence Sharing in the European Union: Institutions Are Not Enough -- 5. Intelligence Sharing and U.S. Counterterrorism Policy -- 6. Findings and Implications -- Notes -- Index
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
The cross-border sharing of intelligence is fundamental to the establishment and preservation of security and stability. The American invasion of Iraq in 2003 was based in part on flawed intelligence, and current efforts to defeat al Qaeda would not be possible without an exchange of information among Britain, Pakistan, Indonesia, and the United States. While critical to national security and political campaigns, intelligence sharing can also be a minefield of manipulation and maneuvering, especially when secrecy makes independent verification of sources impossible. In The International Politics of Intelligence Sharing, James Igoe Walsh advances novel strategies for securing more reliable intelligence. His approach puts states that seek information in control of other states' intelligence efforts. According to this hierarchical framework, states regularly draw agreements in which one power directly monitors and acts on another power's information-gathering activities-a more streamlined approach that prevents the dissemination of false "secrets." In developing this strategy, Walsh draws on recent theories of international cooperation and evaluates both historical and contemporary case studies of intelligence sharing. Readers with an interest in intelligence matters cannot ignore this urgent, timely, and evidence-based book.
Issued also in print.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Mrz 2022)
Communication in law enforcement -- International cooperation.
Intelligence service -- International cooperation.
Intelligence service International cooperation.
POLITICAL SCIENCE / International Relations / Diplomacy. bisacsh
Title is part of eBook package: De Gruyter Columbia University Press eBook-Package Backlist 2000-2013 9783110442472
print 9780231154109
https://doi.org/10.7312/wals15410
https://www.degruyter.com/isbn/9780231520881
Cover https://www.degruyter.com/document/cover/isbn/9780231520881/original
language English
format eBook
author Walsh, James Igoe,
Walsh, James Igoe,
spellingShingle Walsh, James Igoe,
Walsh, James Igoe,
The International Politics of Intelligence Sharing /
Frontmatter --
Contents --
Acknowledgments --
1. Understanding Intelligence Sharing: Curveball and KSM --
2. Transatlantic Intelligence Sharing During the Cold War --
3. Intelligence Sharing for Counterinsurgency: Vietnam and Colombia --
4. Intelligence Sharing in the European Union: Institutions Are Not Enough --
5. Intelligence Sharing and U.S. Counterterrorism Policy --
6. Findings and Implications --
Notes --
Index
author_facet Walsh, James Igoe,
Walsh, James Igoe,
author_variant j i w ji jiw
j i w ji jiw
author_role VerfasserIn
VerfasserIn
author_sort Walsh, James Igoe,
title The International Politics of Intelligence Sharing /
title_full The International Politics of Intelligence Sharing / James Igoe Walsh.
title_fullStr The International Politics of Intelligence Sharing / James Igoe Walsh.
title_full_unstemmed The International Politics of Intelligence Sharing / James Igoe Walsh.
title_auth The International Politics of Intelligence Sharing /
title_alt Frontmatter --
Contents --
Acknowledgments --
1. Understanding Intelligence Sharing: Curveball and KSM --
2. Transatlantic Intelligence Sharing During the Cold War --
3. Intelligence Sharing for Counterinsurgency: Vietnam and Colombia --
4. Intelligence Sharing in the European Union: Institutions Are Not Enough --
5. Intelligence Sharing and U.S. Counterterrorism Policy --
6. Findings and Implications --
Notes --
Index
title_new The International Politics of Intelligence Sharing /
title_sort the international politics of intelligence sharing /
publisher Columbia University Press,
publishDate 2009
physical 1 online resource (208 p.)
Issued also in print.
contents Frontmatter --
Contents --
Acknowledgments --
1. Understanding Intelligence Sharing: Curveball and KSM --
2. Transatlantic Intelligence Sharing During the Cold War --
3. Intelligence Sharing for Counterinsurgency: Vietnam and Colombia --
4. Intelligence Sharing in the European Union: Institutions Are Not Enough --
5. Intelligence Sharing and U.S. Counterterrorism Policy --
6. Findings and Implications --
Notes --
Index
isbn 9780231520881
9783110442472
9780231154109
callnumber-first J - Political Science
callnumber-subject JF - Public Administration
callnumber-label JF1525
callnumber-sort JF 41525 I6 W38 42010
url https://doi.org/10.7312/wals15410
https://www.degruyter.com/isbn/9780231520881
https://www.degruyter.com/document/cover/isbn/9780231520881/original
illustrated Not Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 320 - Political science
dewey-ones 327 - International relations
dewey-full 327.12
dewey-sort 3327.12
dewey-raw 327.12
dewey-search 327.12
doi_str_mv 10.7312/wals15410
oclc_num 956785435
work_keys_str_mv AT walshjamesigoe theinternationalpoliticsofintelligencesharing
AT walshjamesigoe internationalpoliticsofintelligencesharing
status_str n
ids_txt_mv (DE-B1597)459424
(OCoLC)956785435
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter Columbia University Press eBook-Package Backlist 2000-2013
is_hierarchy_title The International Politics of Intelligence Sharing /
container_title Title is part of eBook package: De Gruyter Columbia University Press eBook-Package Backlist 2000-2013
_version_ 1770176041101295616
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04519nam a22007575i 4500</leader><controlfield tag="001">9780231520881</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20220302035458.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">220302t20092009nyu fo d z eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2009019568</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1013937914</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780231520881</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.7312/wals15410</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)459424</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)956785435</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">nyu</subfield><subfield code="c">US-NY</subfield></datafield><datafield tag="050" ind1="0" ind2="0"><subfield code="a">JF1525.I6</subfield><subfield code="b">W38 2010</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">JF1525.I6</subfield><subfield code="b">.W38 2010</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL011010</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">327.12</subfield><subfield code="b">W223in</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Walsh, James Igoe, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The International Politics of Intelligence Sharing /</subfield><subfield code="c">James Igoe Walsh.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY : </subfield><subfield code="b">Columbia University Press, </subfield><subfield code="c">[2009]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (208 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">1. Understanding Intelligence Sharing: Curveball and KSM -- </subfield><subfield code="t">2. Transatlantic Intelligence Sharing During the Cold War -- </subfield><subfield code="t">3. Intelligence Sharing for Counterinsurgency: Vietnam and Colombia -- </subfield><subfield code="t">4. Intelligence Sharing in the European Union: Institutions Are Not Enough -- </subfield><subfield code="t">5. Intelligence Sharing and U.S. Counterterrorism Policy -- </subfield><subfield code="t">6. Findings and Implications -- </subfield><subfield code="t">Notes -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The cross-border sharing of intelligence is fundamental to the establishment and preservation of security and stability. The American invasion of Iraq in 2003 was based in part on flawed intelligence, and current efforts to defeat al Qaeda would not be possible without an exchange of information among Britain, Pakistan, Indonesia, and the United States. While critical to national security and political campaigns, intelligence sharing can also be a minefield of manipulation and maneuvering, especially when secrecy makes independent verification of sources impossible. In The International Politics of Intelligence Sharing, James Igoe Walsh advances novel strategies for securing more reliable intelligence. His approach puts states that seek information in control of other states' intelligence efforts. According to this hierarchical framework, states regularly draw agreements in which one power directly monitors and acts on another power's information-gathering activities-a more streamlined approach that prevents the dissemination of false "secrets." In developing this strategy, Walsh draws on recent theories of international cooperation and evaluates both historical and contemporary case studies of intelligence sharing. Readers with an interest in intelligence matters cannot ignore this urgent, timely, and evidence-based book.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Mrz 2022)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Communication in law enforcement -- International cooperation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Intelligence service -- International cooperation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Intelligence service</subfield><subfield code="x">International cooperation.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / International Relations / Diplomacy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Columbia University Press eBook-Package Backlist 2000-2013</subfield><subfield code="z">9783110442472</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9780231154109</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.7312/wals15410</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9780231520881</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9780231520881/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-044247-2 Columbia University Press eBook-Package Backlist 2000-2013</subfield><subfield code="c">2000</subfield><subfield code="d">2013</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield></record></collection>