Confronting "the enemy within" : : security intelligence, the police, and counterterrorism in four democracies / / Peter Chalk, William Roseanau.

Since the September 11, 2001, terrorist attacks, critics have charged that the Federal Bureau of Investigation, while qualified to investigate terrorist incidents after the fact, is not well equipped enough to adequately gather and assess information to prevent attacks. More intrinsically, many beli...

Full description

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Year of Publication:2004
Edition:1st ed.
Language:English
Physical Description:1 online resource (91 p.)
Notes:"MG-100."
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993628404404498
ctrlnum (CKB)111090529191300
(EBL)197450
(OCoLC)55204026
(SSID)ssj0000128673
(PQKBManifestationID)11152377
(PQKBTitleCode)TC0000128673
(PQKBWorkID)10069164
(PQKB)10129175
(MiAaPQ)EBC197450
(Au-PeEL)EBL197450
(CaPaEBR)ebr10056223
(EXLCZ)99111090529191300
collection bib_alma
record_format marc
spelling Chalk, Peter.
Confronting "the enemy within" : security intelligence, the police, and counterterrorism in four democracies / Peter Chalk, William Roseanau.
1st ed.
Santa Monica, CA : RAND, 2004.
1 online resource (91 p.)
text txt
computer c
online resource cr
Cover; Preface; The RAND Corporation Quality Assurance Process; Contents; Table; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Chapter Two - Security Intelligence in the United Kingdom; The Terrorist Threat; The Security Service ("MI5"); Chapter Three - Security Intelligence in France; The Terrorist Threat; La Direction de la Surveillance du Territoire; Chapter Four - Security Intelligence in Canada; The Terrorist Threat; The Canadian Security Intelligence Service; Chapter Five - Security Intelligence in Australia; The Terrorist Threat
The Australian Security Intelligence OrganisationChapter Six - Assessment and Observations; Strengths; Weaknesses; Chapter Seven - Conclusion; Appendix - The Australian Security Intelligence OrganisationLegislation Amendment (Terrorism) Act, 2003:Background Information; Bibliography; About the Authors
Since the September 11, 2001, terrorist attacks, critics have charged that the Federal Bureau of Investigation, while qualified to investigate terrorist incidents after the fact, is not well equipped enough to adequately gather and assess information to prevent attacks. More intrinsically, many believe that given a predominant and deeply rooted law enforcement and prosecutorial culture, the bureau may not be able to change operational focus toward dedicated counterterrorism intelligence gathering and analysis. To better inform debate, researchers analyzed the domestic security structures of
English
"MG-100."
Includes bibliographical references.
Terrorism Prevention Cross-cultural studies.
Intelligence service Cross-cultural studies.
Internal security Cross-cultural studies.
Great Britain. MI5.
France. Direction de la surveillance du territoire.
Canadian Security Intelligence Service.
Australian Security Intelligence Organization.
0-8330-3513-4
Rand Corporation.
Rosenau, William.
language English
format eBook
author Chalk, Peter.
spellingShingle Chalk, Peter.
Confronting "the enemy within" : security intelligence, the police, and counterterrorism in four democracies /
Cover; Preface; The RAND Corporation Quality Assurance Process; Contents; Table; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Chapter Two - Security Intelligence in the United Kingdom; The Terrorist Threat; The Security Service ("MI5"); Chapter Three - Security Intelligence in France; The Terrorist Threat; La Direction de la Surveillance du Territoire; Chapter Four - Security Intelligence in Canada; The Terrorist Threat; The Canadian Security Intelligence Service; Chapter Five - Security Intelligence in Australia; The Terrorist Threat
The Australian Security Intelligence OrganisationChapter Six - Assessment and Observations; Strengths; Weaknesses; Chapter Seven - Conclusion; Appendix - The Australian Security Intelligence OrganisationLegislation Amendment (Terrorism) Act, 2003:Background Information; Bibliography; About the Authors
author_facet Chalk, Peter.
Rosenau, William.
Rand Corporation.
Rand Corporation.
author_variant p c pc
author2 Rosenau, William.
Rand Corporation.
author2_variant w r wr
author2_role TeilnehmendeR
TeilnehmendeR
author_corporate Rand Corporation.
author_sort Chalk, Peter.
title Confronting "the enemy within" : security intelligence, the police, and counterterrorism in four democracies /
title_sub security intelligence, the police, and counterterrorism in four democracies /
title_full Confronting "the enemy within" : security intelligence, the police, and counterterrorism in four democracies / Peter Chalk, William Roseanau.
title_fullStr Confronting "the enemy within" : security intelligence, the police, and counterterrorism in four democracies / Peter Chalk, William Roseanau.
title_full_unstemmed Confronting "the enemy within" : security intelligence, the police, and counterterrorism in four democracies / Peter Chalk, William Roseanau.
title_auth Confronting "the enemy within" : security intelligence, the police, and counterterrorism in four democracies /
title_new Confronting "the enemy within" :
title_sort confronting "the enemy within" : security intelligence, the police, and counterterrorism in four democracies /
publisher RAND,
publishDate 2004
physical 1 online resource (91 p.)
edition 1st ed.
contents Cover; Preface; The RAND Corporation Quality Assurance Process; Contents; Table; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Chapter Two - Security Intelligence in the United Kingdom; The Terrorist Threat; The Security Service ("MI5"); Chapter Three - Security Intelligence in France; The Terrorist Threat; La Direction de la Surveillance du Territoire; Chapter Four - Security Intelligence in Canada; The Terrorist Threat; The Canadian Security Intelligence Service; Chapter Five - Security Intelligence in Australia; The Terrorist Threat
The Australian Security Intelligence OrganisationChapter Six - Assessment and Observations; Strengths; Weaknesses; Chapter Seven - Conclusion; Appendix - The Australian Security Intelligence OrganisationLegislation Amendment (Terrorism) Act, 2003:Background Information; Bibliography; About the Authors
isbn 1-282-45137-5
9780833036149
9786612451379
0-8330-3614-9
0-8330-3513-4
callnumber-first H - Social Science
callnumber-subject HV - Social Pathology, Criminology
callnumber-label HV6431
callnumber-sort HV 46431 C443 42004
genre_facet Cross-cultural studies.
illustrated Not Illustrated
dewey-hundreds 300 - Social sciences
dewey-tens 360 - Social problems & social services
dewey-ones 363 - Other social problems & services
dewey-full 363.32
dewey-sort 3363.32
dewey-raw 363.32
dewey-search 363.32
oclc_num 55204026
work_keys_str_mv AT chalkpeter confrontingtheenemywithinsecurityintelligencethepoliceandcounterterrorisminfourdemocracies
AT randcorporation confrontingtheenemywithinsecurityintelligencethepoliceandcounterterrorisminfourdemocracies
AT rosenauwilliam confrontingtheenemywithinsecurityintelligencethepoliceandcounterterrorisminfourdemocracies
status_str n
ids_txt_mv (CKB)111090529191300
(EBL)197450
(OCoLC)55204026
(SSID)ssj0000128673
(PQKBManifestationID)11152377
(PQKBTitleCode)TC0000128673
(PQKBWorkID)10069164
(PQKB)10129175
(MiAaPQ)EBC197450
(Au-PeEL)EBL197450
(CaPaEBR)ebr10056223
(EXLCZ)99111090529191300
carrierType_str_mv cr
is_hierarchy_title Confronting "the enemy within" : security intelligence, the police, and counterterrorism in four democracies /
author2_original_writing_str_mv noLinkedField
noLinkedField
_version_ 1806387781577998336
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01478nam a2200373Ia 4500</leader><controlfield tag="001">993628404404498</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr#-n---------</controlfield><controlfield tag="008">031107s2004 cau ob 000 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-282-45137-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833036149</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786612451379</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-8330-3614-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)111090529191300</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EBL)197450</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)55204026</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0000128673</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)11152377</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0000128673</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)10069164</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)10129175</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC197450</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL197450</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10056223</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)99111090529191300</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6431</subfield><subfield code="b">.C443 2004</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.32</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Chalk, Peter.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Confronting "the enemy within" :</subfield><subfield code="b">security intelligence, the police, and counterterrorism in four democracies /</subfield><subfield code="c">Peter Chalk, William Roseanau.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Santa Monica, CA :</subfield><subfield code="b">RAND,</subfield><subfield code="c">2004.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (91 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Preface; The RAND Corporation Quality Assurance Process; Contents; Table; Summary; Acknowledgments; Abbreviations; Chapter One - Introduction; Chapter Two - Security Intelligence in the United Kingdom; The Terrorist Threat; The Security Service ("MI5"); Chapter Three - Security Intelligence in France; The Terrorist Threat; La Direction de la Surveillance du Territoire; Chapter Four - Security Intelligence in Canada; The Terrorist Threat; The Canadian Security Intelligence Service; Chapter Five - Security Intelligence in Australia; The Terrorist Threat</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The Australian Security Intelligence OrganisationChapter Six - Assessment and Observations; Strengths; Weaknesses; Chapter Seven - Conclusion; Appendix - The Australian Security Intelligence OrganisationLegislation Amendment (Terrorism) Act, 2003:Background Information; Bibliography; About the Authors</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Since the September 11, 2001, terrorist attacks, critics have charged that the Federal Bureau of Investigation, while qualified to investigate terrorist incidents after the fact, is not well equipped enough to adequately gather and assess information to prevent attacks. More intrinsically, many believe that given a predominant and deeply rooted law enforcement and prosecutorial culture, the bureau may not be able to change operational focus toward dedicated counterterrorism intelligence gathering and analysis. To better inform debate, researchers analyzed the domestic security structures of</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"MG-100."</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Terrorism</subfield><subfield code="x">Prevention</subfield><subfield code="v">Cross-cultural studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Intelligence service</subfield><subfield code="v">Cross-cultural studies.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internal security</subfield><subfield code="v">Cross-cultural studies.</subfield></datafield><datafield tag="610" ind1="1" ind2="0"><subfield code="a">Great Britain.</subfield><subfield code="b">MI5.</subfield></datafield><datafield tag="610" ind1="1" ind2="0"><subfield code="a">France.</subfield><subfield code="b">Direction de la surveillance du territoire.</subfield></datafield><datafield tag="610" ind1="2" ind2="0"><subfield code="a">Canadian Security Intelligence Service.</subfield></datafield><datafield tag="610" ind1="2" ind2="0"><subfield code="a">Australian Security Intelligence Organization.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-8330-3513-4</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Rand Corporation.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rosenau, William.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-08-03 14:06:42 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2012-02-26 00:12:33 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5350480710004498&amp;Force_direct=true</subfield><subfield code="Z">5350480710004498</subfield><subfield code="b">Available</subfield><subfield code="8">5350480710004498</subfield></datafield></record></collection>