Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-m42fx Total loading time: 0 Render date: 2024-07-16T16:52:08.371Z Has data issue: false hasContentIssue false

Notes

Published online by Cambridge University Press:  05 August 2012

Gregory F. Treverton
Affiliation:
RAND Corporation, Santa Monica
Get access

Summary

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2009

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

,National Commission on Terrorist Attacks Upon the United States, The 9/11 Commission Report (Washington, DC, 2004)Google Scholar
Final Report of the Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction (Washington, DC, 2005)
Review of Intelligence on Weapons of Mass Destruction (London, 2004)
Taylor, Peter, Brits (London: Bloomsbury Publishing, 2001), p. 265Google Scholar
Treverton, Gregory F., “Estimating Beyond the Cold War,” Defense Intelligence Journal, 3, 2 (Fall 1994)Google Scholar
Nye, Jr. Joseph S., “Peering into the Future,” Foreign Affairs, 77, 4 (July/August 1994), 82–93CrossRefGoogle Scholar
Platt, Suzy (ed.), Respectfully Quoted: A Dictionary of Quotations Requested from the Congressional Research Service (Washington, DC: Library of Congress, 1989), p. 80
Johnson, Loch K., A Season of Inquiry: The Senate Intelligence Investigation (Lexington, KY: University Press of Kentucky, 1985)Google Scholar
Snowden, Dave, “Complex Acts of Knowing: Paradox and Descriptive Self-Awareness,” Journal of Knowledge Management, Special Issue, September 2002CrossRefGoogle Scholar
Enemies of Intelligence: Knowledge and Power in American National Security (Columbia University Press, 2007), pp. 115–16
Fursenko, Alexander and Naftali, Timothy, “One Hell of a Gamble”: Khrushchev, Kennedy, Castro and the Cuban Missile Crisis, 1958–1964 (London: John Murray, 1997)Google Scholar
Rethinking National Intelligence for an Age of Information (Cambridge: Cambridge University Press, 2001), pp. 43–6
Slovic, Paul, “Perceptions of Risk,” Science, 236 (April 17, 1987), 281Google Scholar
Gilman, Nils, Schwartz, Peter, and Randall, Doug, Impacts of Climate Change: A System Vulnerability Approach to Consider the Potential Impacts to 2050 of a Mid-upper Greenhouse Gas Emissions Scenario (San Francisco, CA: Global Business Network, March 2007)Google Scholar
Masse, Todd and others, Fusion Centers: Issues and Opportunities for Congress (Washington, DC: Congressional Research Service, July 6, 2007), p. 26Google Scholar
Rosenau, James N., “Patterned Chaos in Global Life: Structure and Process in the Two Worlds of World Politics,” International Political Science Review, 9, 4 (1988), 327–64CrossRefGoogle Scholar
Barabasi, Albert-Laszlo, Linked: How Everything Is Connected to Everything Else and What It Means (New York: Plume, 2003)Google Scholar
Yoo, John, “The Terrorist Surveillance Program and the Constitution,” George Mason Law Review, 14, 3 (Spring 2007)Google Scholar
Sensemaking in Organizations (London: Sage Publications, 1995)
National Security Strategy of the United States of America (Washington, DC: September 2002), pp. 14–15
Nuclear Weapons in Europe, Adelphi Paper No. 168 (London: International Institute for Strategic Studies, 1981)
Russell, Richard L., Sharpening Strategic Intelligence: Why the CIA Gets It Wrong and What Needs to Be Done to Get It Right (Cambridge University Press, 2007), pp. 47–8CrossRefGoogle Scholar
Pearl, Judea, Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference (San Mateo, CA: Morgan Kaufmann Publishers, 1991)Google Scholar
Russell, Richard L., Sharpening Strategic Intelligence: Why the CIA Gets It Wrong and What Needs to Be Done to Get It Right (Cambridge: Cambridge University Press, 2007)CrossRefGoogle Scholar
Zegart, Amy, Flawed by Design: The Evolution of the CIA, JCS, and NSC (Stanford, CA: Stanford University Press, 1999)Google Scholar
The Powers of War and Peace: The Constitution and Foreign Affairs After 9/11 (Chicago: University of Chicago Press, 2005)
Carré, John, The Night Manager (New York: Knopf, 1993), p. 42Google Scholar
Weisburd, David and Braga, Anthony A. (eds.), Police Innovation: Contrasting Perspectives (Cambridge: Cambridge University Press, 2006)CrossRef
Milligan, Darric et al., Intelligence-Led Policing Tool: Intelligence-Led Policing Technology for State and Local Law Enforcement Agencies (Bedford, MA: Mitretek Corporation, MTR-2006-016, 2006)Google Scholar
Ratcliffe, Jerry H., “Intelligence-Led Policing and the Problems of Turning Rhetoric into Practice,” Policing and Society, 12, 1 (2002), 53–66CrossRefGoogle Scholar
Reshaping National Intelligence for an Age of Information (Cambridge: Cambridge University Press, 2001), pp. 139ff
Lundberg, Kristen, The SS-9 Controversy: Intelligence as Political Football (Harvard University, Kennedy School of Government, 1989), C16-89-884.0Google Scholar
Friedman, Lawrence, U.S. Intelligence and the Soviet Strategic Threat (Princeton, NJ: Princeton University Press, 1986), p. 139Google Scholar
Kessler, Ronald, The Bureau: The Secret History of the FBI (New York: St. Martin's Press, 2002), pp. 438–43Google Scholar
Reinforcing Security at the FBI, DRR-2930-FBI (Santa Monica, CA: RAND, January 2003)
A Review of FBI Security Programs (Washington, DC: Commission for Review of FBI Security Programs, March 2002)
Ripley, Amanda, “The Fort Dix Conspiracy,” Time, December 6, 2007Google Scholar
“National Commission on Terrorist Attacks Upon the United States,” The 9/11 Commission Report (Washington, DC, 2004)
“National Commission on Terrorist Attacks Upon the United States,” The 9/11 Commission Report (Washington, DC, 2004)
Pincus, Walter and Eggen, Don, “CIA Gave FBI Warning on Hijacker,” Washington Post, June 4, 2002, p. A1Google Scholar
Drogin, Bob, Lichtblau, Eric, and Krikorian, Greg, “CIA, FBI Disagree on Urgency of Warning,” Los Angeles Times, October 18, 2001, p. A1Google Scholar
Klein, Joe, “Closework: Why We Couldn't See What Was Right in Front of Us,” The New Yorker, October 1, 2001, pp. 44–9Google Scholar
Preparing for the 21st Century: An Appraisal of U.S. Intelligence (Washington, DC, 1996)
Treverton, Gregory F., Reshaping National Intelligence for an Age of Information (Cambridge: Cambridge University Press, 2001)CrossRefGoogle Scholar
Cumming, Alfred, The Position of Director of National Intelligence: Issues for Congress (Washington, DC: Congressional Research Service, July 29, 2004)Google Scholar
Stiefler, Todd, Intelligence Restructuring: Patterns and Pitfalls, RAND Corporation (forthcoming)
Best, Jr. Richard A., Proposals for Intelligence Reorganization, 1949–2004 (Washington, DC: Congressional Research Service, July 29, 2004)Google Scholar
Johnson, Loch K., “A Centralized Intelligence System: Truman's Dream Deferred,” American Intelligence Journal, 23 (Autumn/Winter 2005), 6–15Google Scholar
Pincus, Walter, “Military Espionage Cuts Eyed,” Washington Post, March 17, 1995, p. A1Google Scholar
Davis, Lynn et al., Coordinating the War on Terrorism, OP-110-RC (Santa Monica, CA: RAND Corporation, 2004)Google Scholar
Treverton, Gregory F. and Gabbard, C. Bryan, Assessing the Tradecraft of Intelligence Analysis, TR-293 (Santa Monica, CA: RAND Corporation, 2008)Google Scholar
Colby, William, with Forbath, Peter, Honorable Men: My Life in the CIA (New York: Simon and Schuster, 1978), pp. 352–3Google Scholar
Pincus, Walter, “U.S. Strike Kills Six in Al Qaeda: Missile Fired by Predator Drone; Key Figure in Yemen Among Dead,” Washington Post, November 5, 2002, p. A01Google Scholar
Taubman, Philip, “Failure to Launch: In Death of Spy Satellite Program, Lofty Plans and Unrealistic Bids, New York Times, November 11, 2007Google Scholar
Best, Jr. Richard A., Intelligence Issues and the 104th Congress, CRS Issues Brief 95018, updated September 26, 1996, available at http://www.fas.org/irp/crs/95-018.htm
Baer, Robert, “Wanted: Spies Unlike Us,” Foreign Policy (March–April 2005)Google Scholar
The Need to Know, Report of the Twentieth Century Fund Task Force on Covert Action and American Democracy (New York: Twentieth Century Fund, 1992), pp. 23–4
Lowenthal, Mark M., Intelligence: From Secrets to Policy, 3rd ed. (Washington, DC: CG Press, 2003), pp. 45–7Google Scholar
Cahink, George, “National Security: Breaking the Code,” Government Executive, September 1, 2001Google Scholar
Friedman, V., L. Lipschitz, and Popper, M., “The Mystification of Organizational Learning,” Journal of Management Inquiry, 14, 1 (2005), 19–30CrossRefGoogle Scholar
,General Accounting Office, Forum: High-Performing Organizations – Metrics, Means and Mechanisms for Achieving High Performance in the 21st Century Public Management Environment, GAO-04-343SP (Washington, DC, February 2004)Google Scholar
Treverton, Gregory F., “The State of Federal Management,” Government Executive, January 2004Google Scholar
Treverton, Gregory F. and Gabbard, C. Bryan, Assessing the Tradecraft of Intelligence Analysis, TR-293 (Santa Monica, CA: RAND Corporation, 2008)Google Scholar
Treverton, Gregory F. and Bikson, Tora K., New Challenges for International Leadership: Positioning the United States for the 21st Century, Issue Paper IP-233-IP (Santa Monica, CA: RAND Corporation, 2003)Google Scholar
Treverton, Gregory F. and Bikson, Tora K., New Challenges for International Leadership: Positioning the United States for the 21st Century, RAND, IP-233-IP, 2002Google Scholar
Johnston, Rob, The Culture of Analytic Tradecraft: An Ethnography of the IC (Washington, DC: Center for the Study of Intelligence, Central Intelligence Agency, 2005)Google Scholar
Tucker, Nancy Bernkopf, “The Cultural Revolution in Intelligence: Interim Report,” The Washington Quarterly, 31, 2 (Spring 2008), 52Google Scholar
,National Academy of Public Administration, Transforming the FBI: Roadmap to an Effective Human Capital Program (Washington, DC, September 2005)Google Scholar
Kerr, Steven, “On the Folly of Rewarding A, While Hoping for B,” The Academy of Management Journal, 18, 4 (December 1975), 769–83Google ScholarPubMed
,Business Executives for National Security, Pay for Performance at the CIA: Restoring Equity, Transparency and Accountability: The Assessment of the Independent Panel on the Central Intelligence Agency's Compensation Reform Proposals (Washington, DC, January 2004)Google Scholar
Frank, Thomas, “Push Is on to Overhaul FBI,” Newsday, December 29, 2002Google Scholar
Posner, Richard A., Uncertain Shield: The U.S. Intelligence System in the Throes of Reform (Lanham, MD: Rowman & Littlefield Publishers, Inc., 2006)Google Scholar
Rivkin, Jan W. and Roberto, Michael A., Federal Bureau of Investigation (A) (Boston, MA: Harvard Business School, 2007), p. 3Google Scholar
Shane, Scott and Bergman, Lowell, “FBI Struggling to Reinvent Itself,” New York Times, October 9, 2006Google Scholar
Reorganizing U.S. Domestic Intelligence: Assessing the Options, MG-767 (Santa Monica, CA: RAND Corporation, 2008)
Burch, James, “A Domestic Intelligence Agency for the United States? A Comparative Analysis of Domestic Intelligence Agencies and Their Implications for Homeland Security,” Homeland Security Affairs III/2 (June 2007), 3Google Scholar
Rishikof, Harvey, “The Role of the Federal Bureau of Investigation in National Security,” in George, Roger and Kline, Robert (eds.), Intelligence and National Security Strategist: Enduring Issues and Challenges (New York: Rowman and Littlefield Publishers, 2006), p. 126Google Scholar
Foundation, Markel, Protecting America's Freedom in the Information Age: A Report of the Markle Foundation Task Force (New York: Markle Foundation, 2002), p. 21Google Scholar
,General Accounting Office, Combating Terrorism: How Five Countries Are Organized to Combat Terrorism (Washington, DC: GAO, April 2002), p. 8Google Scholar
Moe, Terry, “The Politics of Bureaucratic Structure,” in Chubb, John E. and Peterson, Paul E. (eds.), Can the Government Govern? (Washington, DC: The Brookings Institution, 1989), p. 267Google Scholar
The 9/11 Commission Report (Washington, DC, 2004)
Treverton, Gregory F., “Iran, 1978–1979: Coping with the Unthinkable,” in May, Ernest R. and Zelikow, Philip (eds.), Dealing with Dictators: Dilemmas of U.S. Diplomacy and Intelligence Analysis, 1945–1990 (MIT Press, 2006)Google Scholar
Sick, Gary, All Fall Down: America's Tragic Encounter with Iran (New York: Random House, 1985)Google Scholar
Marrin, Stephen, “Preventing Intelligence Failures by Learning from the Past,” International Journal of Intelligence and Counterintelligence, 17 (2004), 657Google Scholar
Imai, Masaaki, Kaizen: The Key to Japan's Competitive Success (New York: McGraw-Hill/Irwin, 1986)Google Scholar
Dewar, James et al., Assumption-Based Planning: A Planning Tool for Very Uncertain Times (Santa Monica, CA: RAND Corporation, 1993)Google Scholar
Transforming the Intelligence Community: Improving the Collection and Management of Information (Washington, DC: IBM Center for the Business of Government, October 2005), p. 9
Snowden, Dave, “Complex Acts of Knowing: Paradox and Descriptive Self-Awareness,” Journal of Knowledge Management, Special Issue, September 2002CrossRefGoogle Scholar
The Limits of Intelligence: Iraq's Lessons,” Survival, 46, 3 (Autumn 2004), 15ff
Blink: The Power of Thinking Without Thinking (New York: Little Brown, 2005)
Klein, Gary, Intuition at Work: Why Developing Your Gut Instinct Will Make You Better at What You Do (New York: Doubleday, 2002)Google Scholar
Sternberg, R. J., Beyond IQ: A Triarchic Theory of Human Intelligence (New York: Cambridge University Press, 1985)Google Scholar
Ray, Tim and Little, Stephen, Managing Knowledge: An Essential Reader (London: Sage Publications, 2005)Google Scholar
Gottfredson, Linda, “Dissecting Practical Intelligence Theory: Its Claims and Evidence,” Intelligence, 31, 4 (2003), 343–97, 415–24.CrossRefGoogle Scholar
Expert Political Judgment: How Good Is It? How Can We Know? (Princeton, NJ: Princeton University Press, 2005)
Dalkey, N., Brown, B., and Cochran, S., The Delphi Method, III: Use of Self Ratings to Improve Group Estimates (Santa Monica, CA: The RAND Corporation, 1969)Google Scholar
Mesquita, Bueno, Forecasting Political Events: The Future of Hong Kong (New Haven, CT: Yale University Press, 1985), pp. 11–54Google Scholar
Newman, David and Rabushka, Alvin, Red Flag Over Hong Kong (Chatham, NJ: Chatham House, 1996), pp. 165–86Google Scholar
Stokman, Frans N., European Community Decision Making: Models Applications, and Comparisons (New Haven, CT: Yale University Press, 1994, pp. 71–104Google Scholar
A Decision Making Model: Its Structure and Form,” International Interactions, 23 (1997), 235–66CrossRef
Predicting Politics (Columbus: Ohio State University Press, 2002).
Jackson, William, “Consultant: Good Theory Behind DARPA's ‘Terrorism Futures’,” Government Computer News, August 6, 2003Google Scholar
Heuer, Jr. Richards S., The Psychology of Intelligence Analysis (Washington, DC: Center for the Study of Intelligence, 1999)Google Scholar
Janis, Irving L., Victims of Groupthink: Psychological Study of Foreign-Policy Decisions and Fiascos (Boston, MA: Houghton Mifflin, 1972)Google Scholar
Sunstein, Cass R., Infotopia: How Many Minds Produce Knowledge (New York: Oxford University Press, 2006)Google Scholar
Armstrong, J. Scott (ed.), Principles of Forecasting: A Handbook for Researchers and Practitioners (Norwell, MA: Kluwer Academic, 2001)CrossRef
Drazin, R., Glynn, M. A., and Kazanjian, R. K., “Multilevel Theorizing About Creativity in Organizations: A Sensemaking Perspective,” Academy of Management Review, 24, 2 (1999), 286–307CrossRefGoogle Scholar
Oldham, G. R. and Cummings, Anne, “Employee Creativity: Personal and Contextual Factors at Work,” The Academy of Management Journal, 39, 3 (June 1996), 607–34.Google Scholar
George, Roger, “Fixing the Mindset Problem: Alternative Analysis,” in International Journal of Intelligence and Counterintelligence, 17, 3 (Fall 2004), 385–405CrossRefGoogle Scholar
Nemeth, Charlane, Brown, Keith, and Rogers, John, “Devil's Advocate vs. Authentic Dissent: Stimulating Quantity and Quality,” European Journal of Social Psychology, 31 (2001), 707–20CrossRefGoogle Scholar
Weick, Karl, Sensemaking in Organizations (London: Sage Publications, 1995)Google Scholar
Weick, Karl and Sutcliffe, K. M., Managing the Unexpected: Assuring High Performance in an Age of Complexity (San Francisco, CA: Jossey-Bass, 2001)Google Scholar
Johnson, Loch K., Bombs, Bugs, Drugs and Thugs: Intelligence and America's Quest for Security (New York: New York University Press, 2000)Google Scholar
Gannon, John, “Managing Analysis in the Information Age,” in George, Roger Z. and Bruce, James B. (eds.), Analyzing Intelligence: Origins, Obstacles and Innovation (Washington, DC: Georgetown University Press, 2008), pp. 221–2Google Scholar
Final Report of the Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction (Washington, DC, 2005)
Intelligence, Policy, and the War in Iraq,” Foreign Affairs, 85, 2 (March/April 2006), 15–28CrossRef
Pollack, Kenneth M., “Spies, Lies, and Weapons: What Went Wrong,” The Atlantic Monthly, Januay/February 2004Google Scholar
Hersh, Seymour, “Selective Intelligence,” New Yorker, May 12, 2003Google Scholar
May, Ernest R., Strange Victory: Hitler's Conquest of France (New York: Farrar, Straus and Giroux, 2000)Google Scholar
Quandt, William B., Peace Process: American Diplomacy and the Arab–Israeli Conflict Since 1967 (Washington, DC: Brookings Institution Press, 1990)Google Scholar
Schwartz, Peter, The Art of the Long View (New York: Doubleday, 1991), p. 220Google Scholar
Gormley, Dennis M., “The Limits of Intelligence: Iraq's Lessons,” Survival, 46, 3 (Autumn 2004), 10Google Scholar
Sims, Jennifer (ed.), “Mission-Based Counterintelligence: An Approach to Counterintelligence and Homeland Defense,” Sims, Jennifer and Gerber, Burton, Vaults, Mirrors and Masks: The Future of US Counterintelligence (Washington DC: Georgetown University Press, 2008)Google Scholar
Cirincione, Joseph et al., WMD in Iraq: Evidence and Implications (Washington, DC: Carnegie Endowment, January 2004)Google ScholarPubMed
Wright, Lawrence, “The Spymaster,” The New Yorker, January 21, 2008, p. 59Google Scholar
Mandeles, D. et al., Managing Command and Control in the Persian Gulf War (Westport, CT: Greenwood, 1996), pp. 91ffGoogle Scholar
Worthen, James, “The Gates Hearings: Politicization and Soviet Analysis at the CIA,” Studies in Intelligence (Spring 1994)Google Scholar
Freedman, Lawrence, U.S. Intelligence and the Soviet Strategic Threat, 2nd ed. (Princeton, NJ: Princeton University Press, 1986)Google Scholar
Prados, John, The Soviet Estimate: U.S. Intelligence Analysis and Russian Military Strength (New York: Dial Press, 1982)Google Scholar
Treverton, Gregory F., “Intelligence: Welcome to the American Government,” in Mann, Thomas E. (ed.), A Question of Balance: The President, the Congress and Foreign Policy (Washington, DC: The Brookings Institution, 1990)Google Scholar
,GAO, Rail Safety and Security: Some Actions Already Taken to Enhance Rail Security, but Risk-Based Plan Needed, GAO-03-43 (Washington, DC, April 2003)Google Scholar
“Intelligence Gathering, Sharing and Analysis,” in Kettle, Donald (ed.), The Department of Homeland Security's First Year: A Report Card (The Century Foundation, March 2004)
The 9/11 Commission Report (Washington, DC, 2004)
Final Report of the Commission on the Intelligence Capabilities of the United States Regarding Weapons of Mass Destruction (Washington, DC, 2005)
Treverton, Gregory F. and Gabbard, C. Bryan, Assessing the Tradecraft of Intelligence Analysis (Santa Monica, CA: The RAND Corporation, 2008)Google Scholar
Wright, Lawrence, “The Spymaster,” The New Yorker, January 21, 2008, p. 57Google Scholar
Riley, K. Jack et al., State and Local Intelligence in the War on Terrorism MG-394-RC (Santa Monica, CA: RAND Corporation, 2005)CrossRefGoogle Scholar
Davis, Lois M. et al., When Terrorism Hits Home: How Prepared Are State and Local Law Enforcement? MG-104-MIPT (Santa Monica, CA: RAND Corporation, 2004)Google Scholar
Kennedy, Charles H. and Swire, Peter P., “State Wiretaps and Electronic Surveillance after September 11,” Hastings Law Journal, 54 (2003)Google Scholar
Schulhofer, Stephen J., The Enemy Within: Intelligence Gathering, Law Enforcement, and Civil Liberties in the Wake of September 11 (New York: Century Foundation Press, 2002), p. 52Google Scholar
Kibbe, Jennifer D., “Covert Action and the Pentagon,” Intelligence and National Security, 22, 1 (February 2007), 57CrossRefGoogle Scholar
Johnson, Loch K., “Congressional Supervision of America's Secret Agencies: The Experience and Legacy of the Church Committee,” Public Administration Review, 64 (January 2004), 3–14CrossRefGoogle Scholar
Treverton, Gregory F., Covert Action: The Limits of Intervention in the Postwar World (New York: Basic Books, 1987)Google Scholar
Treverton, Gregory F., “Covert Action and Open Society,” Foreign Affairs, 65, 5 (Summer 1987)CrossRefGoogle Scholar
Report of the President's Special Review Board (the Tower Commission), Washington, DC: U.S. Government Printing Office, 1987
Leary, William M. (ed.), The Central Intelligence Agency: History and Documents (Tuscaloosa, AL: University of Alabama Press, 1984), pp. 131–3
Roosevelt, Kermit, Countercoup: The Struggle for the Control of Iran (New York: McGraw-Hill, 1979), p. 199Google Scholar
Immerman, Richard H., The CIA in Guatemala: The Foreign Policy of Intervention (Austin, TX: University of Texas Press, 1982)Google Scholar
Sorensen, Theodore C., Kennedy (New York: Harper & Row, 1965), p. 309Google Scholar
O'Brien, Conor Cruise, “How Hot Was Chile?” in The New Republic, August 26, 1985, p. 37Google Scholar
Phillips, David Atlee, The Night Watch (New York: Atheneum, 1977), p. 53Google Scholar
Prados, John, Presidents' Secret Wars: CIA and Pentagon Covert Operations Since World War II (New York: Morrow, 1986)Google Scholar
Coll, Steve, Ghost Wars: The Secret History of the CIA, Afghanistan, and Bin Laden, from the Soviet Invasion to September 10, 2001 (New York: Penguin Press, 2004)Google Scholar
Schroen, Gary C., First In: How the CIA Spearheaded the War on Terror in Afghanistan (New York: Random House, 2005)Google Scholar
The 9/11 Commission Report (Washington, DC, 2004)
Priest, Dana, “U.S. Citizen Among Those Killed in Yemen Predator Missile Strike,” The Washington Post, November 8, 2002Google Scholar
Pincus, Walter, “U.S. Strike Kills Six in Al Qaeda: Missile Fired by Predator Drone; Key Figure in Yemen Among Dead,” The Washington Post, November 5, 2002, p. A01Google Scholar
Kibbe, Jennifer D., “The Rise of the Shadow Warriors,” Foreign Affairs (March/April 2004)CrossRefGoogle Scholar
“The Limits of Avowal: Secret Intelligence in an Age of Public Scrutiny,” in Treverton, Gregory F. and Agrell, Wilhelm (eds.), National Intelligence Services: Current Research and Future Prospects, forthcoming from Cambridge University Press
Priest, Dana, “CIA Holds Terror Suspect in Secret Prisons,” The Washington Post, November 2, 2005; p. A01Google Scholar
Wright, Lawrence, “The Spymaster,” The New Yorker, January 21, 2008, p. 52Google Scholar
Schulhofer, Stephen J., The Enemy Within: Intelligence Gathering, Law Enforcement and Civil Liberties in the Wake of September 11 (New York: The Century Foundation, 2002), p. 46Google Scholar
Betts, Richard K., Enemies of Intelligence: Knowledge and Power in American National Security (New York: Columbia University Press, 2007), p. 163Google Scholar
Eggen, Dan and O'Harrow, Jr. Robert, “U.S. Steps Up Secret Surveillance,” The Washington Post, March 23, 2003Google Scholar
Harris, Shane, “Total Information Awareness Official Responds to Criticism,” Government Executive, Daily Briefing, January 31, 2003Google Scholar
Stevens, Gina Marie, Privacy: Total Information Awareness Programs and Related Information Access, Collection and Protection Laws (Washington, DC: Congressional Research Service, March 21, 2003)Google Scholar
Lichtblau, Eric and Glaberson, William, “Millions Raised for Qaeda in Brooklyn, U.S. Says,” New York Times, March 5, 2003Google Scholar
,General Accounting Office, Information Technology: Terrorist Watch Lists Should Be Consolidated to Promote Better Integration and Sharing, GAO-03-322 (Washington, DC: April 15, 2003)Google Scholar
Lichtblau, Eric and Johnston, David, “Court to Oversee U.S. Wiretapping in Terror Cases,” The New York Times, January 18, 2007Google Scholar
Risen, James, “Administration Pulls Back on Surveillance Agreement,” The New York Times, May 2, 2007Google Scholar
Eggens, Dan and Kane, Paul, “Gonzalez Hospital Episode Detailed,” The Washington Post, May 16, 2007; p. A01Google Scholar
,Senate Select Committee on Intelligence, Foreign Intelligence Surveillance Act of 1978 – Amendments Act 2007: Report, 110 Cong., 2nd sess. (Washington, DC: October 26, 2007), p. 5Google Scholar
Jackson, Justice, “There is danger that, if the court does not temper its doctrinaire logic with a little practical wisdom, it will convert the constitutional Bill of Rights into a suicide pact.” Terminiello v. City of Chicago, 337 U.S. 1 (1949)Google Scholar
Schulhofer, Stephen J., The Enemy Within: Intelligence Gathering, Law Enforcement, and Civil Liberties in the Wake of September 11 (New York: Century Foundation Press, 2002), p. 52Google Scholar
Pincus, Walter, “Corralling Domestic Intelligence: Standards in the Works for Reports of Suspicious Activity,” The Washington Post, January 13, 2006, p. A5Google Scholar
Bain, Ben, “ODNI Releases Standards for Suspicious-Activity Reporting,” FCW.COM
Felcher, E. Marla, “Aviation Security,” in The Department of Homeland Security's First Year: A Report Card (New York: The Century Foundation, 2004)
Treverton, Gregory F. et al., “The Costs of Responding to the Terrorist Threats: The U.S. Case,” in Keefer, Philip and Loayza, Norman (eds.), Terrorism, Economic Development, and Political Openness (New York, Cambridge: Cambridge University Press, 2008)Google Scholar
,The White House, Homeland Security Presidential Directive/HSPD-6, Subject: Integration and Use of Screening Information (Washington, DC, September 16, 2003)Google Scholar
Rhodes, Jill D., “CAPPS II: Red Light, Green Light, or ‘Mother, May I?’,” The Homeland Security Journal, March 2004, p. 1Google Scholar
Turner, Admiral Stansfield, Secrecy and Democracy (London: Sidgwick and Jackson, 1986), p. 178Google Scholar
Unconquerable Nation: Knowing Our Enemy, Strengthening Ourselves (Santa Monica, CA: RAND Corporation, 2006), p. 176

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

  • Notes
  • Gregory F. Treverton
  • Book: Intelligence for an Age of Terror
  • Online publication: 05 August 2012
  • Chapter DOI: https://doi.org/10.1017/CBO9780511808708.012
Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

  • Notes
  • Gregory F. Treverton
  • Book: Intelligence for an Age of Terror
  • Online publication: 05 August 2012
  • Chapter DOI: https://doi.org/10.1017/CBO9780511808708.012
Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

  • Notes
  • Gregory F. Treverton
  • Book: Intelligence for an Age of Terror
  • Online publication: 05 August 2012
  • Chapter DOI: https://doi.org/10.1017/CBO9780511808708.012
Available formats
×