The International Politics of Intelligence Sharing / / James Igoe Walsh.
The cross-border sharing of intelligence is fundamental to the establishment and preservation of security and stability. The American invasion of Iraq in 2003 was based in part on flawed intelligence, and current efforts to defeat al Qaeda would not be possible without an exchange of information amo...
Saved in:
Superior document: | Title is part of eBook package: De Gruyter Columbia University Press eBook-Package Backlist 2000-2013 |
---|---|
VerfasserIn: | |
Place / Publishing House: | New York, NY : : Columbia University Press, , [2009] ©2009 |
Year of Publication: | 2009 |
Language: | English |
Online Access: | |
Physical Description: | 1 online resource (208 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
9780231520881 |
---|---|
lccn |
2009019568 |
ctrlnum |
(DE-B1597)459424 (OCoLC)956785435 |
collection |
bib_alma |
record_format |
marc |
spelling |
Walsh, James Igoe, author. aut http://id.loc.gov/vocabulary/relators/aut The International Politics of Intelligence Sharing / James Igoe Walsh. New York, NY : Columbia University Press, [2009] ©2009 1 online resource (208 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file PDF rda Frontmatter -- Contents -- Acknowledgments -- 1. Understanding Intelligence Sharing: Curveball and KSM -- 2. Transatlantic Intelligence Sharing During the Cold War -- 3. Intelligence Sharing for Counterinsurgency: Vietnam and Colombia -- 4. Intelligence Sharing in the European Union: Institutions Are Not Enough -- 5. Intelligence Sharing and U.S. Counterterrorism Policy -- 6. Findings and Implications -- Notes -- Index restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star The cross-border sharing of intelligence is fundamental to the establishment and preservation of security and stability. The American invasion of Iraq in 2003 was based in part on flawed intelligence, and current efforts to defeat al Qaeda would not be possible without an exchange of information among Britain, Pakistan, Indonesia, and the United States. While critical to national security and political campaigns, intelligence sharing can also be a minefield of manipulation and maneuvering, especially when secrecy makes independent verification of sources impossible. In The International Politics of Intelligence Sharing, James Igoe Walsh advances novel strategies for securing more reliable intelligence. His approach puts states that seek information in control of other states' intelligence efforts. According to this hierarchical framework, states regularly draw agreements in which one power directly monitors and acts on another power's information-gathering activities-a more streamlined approach that prevents the dissemination of false "secrets." In developing this strategy, Walsh draws on recent theories of international cooperation and evaluates both historical and contemporary case studies of intelligence sharing. Readers with an interest in intelligence matters cannot ignore this urgent, timely, and evidence-based book. Issued also in print. Mode of access: Internet via World Wide Web. In English. Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Mrz 2022) Communication in law enforcement -- International cooperation. Intelligence service -- International cooperation. Intelligence service International cooperation. POLITICAL SCIENCE / International Relations / Diplomacy. bisacsh Title is part of eBook package: De Gruyter Columbia University Press eBook-Package Backlist 2000-2013 9783110442472 print 9780231154109 https://doi.org/10.7312/wals15410 https://www.degruyter.com/isbn/9780231520881 Cover https://www.degruyter.com/document/cover/isbn/9780231520881/original |
language |
English |
format |
eBook |
author |
Walsh, James Igoe, Walsh, James Igoe, |
spellingShingle |
Walsh, James Igoe, Walsh, James Igoe, The International Politics of Intelligence Sharing / Frontmatter -- Contents -- Acknowledgments -- 1. Understanding Intelligence Sharing: Curveball and KSM -- 2. Transatlantic Intelligence Sharing During the Cold War -- 3. Intelligence Sharing for Counterinsurgency: Vietnam and Colombia -- 4. Intelligence Sharing in the European Union: Institutions Are Not Enough -- 5. Intelligence Sharing and U.S. Counterterrorism Policy -- 6. Findings and Implications -- Notes -- Index |
author_facet |
Walsh, James Igoe, Walsh, James Igoe, |
author_variant |
j i w ji jiw j i w ji jiw |
author_role |
VerfasserIn VerfasserIn |
author_sort |
Walsh, James Igoe, |
title |
The International Politics of Intelligence Sharing / |
title_full |
The International Politics of Intelligence Sharing / James Igoe Walsh. |
title_fullStr |
The International Politics of Intelligence Sharing / James Igoe Walsh. |
title_full_unstemmed |
The International Politics of Intelligence Sharing / James Igoe Walsh. |
title_auth |
The International Politics of Intelligence Sharing / |
title_alt |
Frontmatter -- Contents -- Acknowledgments -- 1. Understanding Intelligence Sharing: Curveball and KSM -- 2. Transatlantic Intelligence Sharing During the Cold War -- 3. Intelligence Sharing for Counterinsurgency: Vietnam and Colombia -- 4. Intelligence Sharing in the European Union: Institutions Are Not Enough -- 5. Intelligence Sharing and U.S. Counterterrorism Policy -- 6. Findings and Implications -- Notes -- Index |
title_new |
The International Politics of Intelligence Sharing / |
title_sort |
the international politics of intelligence sharing / |
publisher |
Columbia University Press, |
publishDate |
2009 |
physical |
1 online resource (208 p.) Issued also in print. |
contents |
Frontmatter -- Contents -- Acknowledgments -- 1. Understanding Intelligence Sharing: Curveball and KSM -- 2. Transatlantic Intelligence Sharing During the Cold War -- 3. Intelligence Sharing for Counterinsurgency: Vietnam and Colombia -- 4. Intelligence Sharing in the European Union: Institutions Are Not Enough -- 5. Intelligence Sharing and U.S. Counterterrorism Policy -- 6. Findings and Implications -- Notes -- Index |
isbn |
9780231520881 9783110442472 9780231154109 |
callnumber-first |
J - Political Science |
callnumber-subject |
JF - Public Administration |
callnumber-label |
JF1525 |
callnumber-sort |
JF 41525 I6 W38 42010 |
url |
https://doi.org/10.7312/wals15410 https://www.degruyter.com/isbn/9780231520881 https://www.degruyter.com/document/cover/isbn/9780231520881/original |
illustrated |
Not Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
320 - Political science |
dewey-ones |
327 - International relations |
dewey-full |
327.12 |
dewey-sort |
3327.12 |
dewey-raw |
327.12 |
dewey-search |
327.12 |
doi_str_mv |
10.7312/wals15410 |
oclc_num |
956785435 |
work_keys_str_mv |
AT walshjamesigoe theinternationalpoliticsofintelligencesharing AT walshjamesigoe internationalpoliticsofintelligencesharing |
status_str |
n |
ids_txt_mv |
(DE-B1597)459424 (OCoLC)956785435 |
carrierType_str_mv |
cr |
hierarchy_parent_title |
Title is part of eBook package: De Gruyter Columbia University Press eBook-Package Backlist 2000-2013 |
is_hierarchy_title |
The International Politics of Intelligence Sharing / |
container_title |
Title is part of eBook package: De Gruyter Columbia University Press eBook-Package Backlist 2000-2013 |
_version_ |
1770176041101295616 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04519nam a22007575i 4500</leader><controlfield tag="001">9780231520881</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20220302035458.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">220302t20092009nyu fo d z eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2009019568</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">(OCoLC)1013937914</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780231520881</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.7312/wals15410</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)459424</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)956785435</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">nyu</subfield><subfield code="c">US-NY</subfield></datafield><datafield tag="050" ind1="0" ind2="0"><subfield code="a">JF1525.I6</subfield><subfield code="b">W38 2010</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">JF1525.I6</subfield><subfield code="b">.W38 2010</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL011010</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">327.12</subfield><subfield code="b">W223in</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Walsh, James Igoe, </subfield><subfield code="e">author.</subfield><subfield code="4">aut</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The International Politics of Intelligence Sharing /</subfield><subfield code="c">James Igoe Walsh.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY : </subfield><subfield code="b">Columbia University Press, </subfield><subfield code="c">[2009]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (208 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">Acknowledgments -- </subfield><subfield code="t">1. Understanding Intelligence Sharing: Curveball and KSM -- </subfield><subfield code="t">2. Transatlantic Intelligence Sharing During the Cold War -- </subfield><subfield code="t">3. Intelligence Sharing for Counterinsurgency: Vietnam and Colombia -- </subfield><subfield code="t">4. Intelligence Sharing in the European Union: Institutions Are Not Enough -- </subfield><subfield code="t">5. Intelligence Sharing and U.S. Counterterrorism Policy -- </subfield><subfield code="t">6. Findings and Implications -- </subfield><subfield code="t">Notes -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The cross-border sharing of intelligence is fundamental to the establishment and preservation of security and stability. The American invasion of Iraq in 2003 was based in part on flawed intelligence, and current efforts to defeat al Qaeda would not be possible without an exchange of information among Britain, Pakistan, Indonesia, and the United States. While critical to national security and political campaigns, intelligence sharing can also be a minefield of manipulation and maneuvering, especially when secrecy makes independent verification of sources impossible. In The International Politics of Intelligence Sharing, James Igoe Walsh advances novel strategies for securing more reliable intelligence. His approach puts states that seek information in control of other states' intelligence efforts. According to this hierarchical framework, states regularly draw agreements in which one power directly monitors and acts on another power's information-gathering activities-a more streamlined approach that prevents the dissemination of false "secrets." In developing this strategy, Walsh draws on recent theories of international cooperation and evaluates both historical and contemporary case studies of intelligence sharing. Readers with an interest in intelligence matters cannot ignore this urgent, timely, and evidence-based book.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 02. Mrz 2022)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Communication in law enforcement -- International cooperation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Intelligence service -- International cooperation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Intelligence service</subfield><subfield code="x">International cooperation.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / International Relations / Diplomacy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">Columbia University Press eBook-Package Backlist 2000-2013</subfield><subfield code="z">9783110442472</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9780231154109</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.7312/wals15410</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9780231520881</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9780231520881/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-044247-2 Columbia University Press eBook-Package Backlist 2000-2013</subfield><subfield code="c">2000</subfield><subfield code="d">2013</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_BACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBACKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_SN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_PPALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield></record></collection> |