|
|
Books > Business & Economics > Industry & industrial studies > Service industries > Security services
The response of the U.S. federal government to the events of
September 11, 2001 has reflected the challenge of striking a
balance between implementing security measures to deter terrorist
attacks while at the same time limiting disruption to air commerce.
Airport and Aviation Security: U.S. Policy and Strategy in the Age
of Global Terrorism is a comprehensive reference that examines the
persistent threats to aviation security that led up to the
terrorist attacks of September 11th, describes subsequent terror
plots against aviation assets, and explores U.S. efforts to counter
and mitigate these threats. Addressing the homeland security
challenges facing the U.S. in the age of terrorism, this text
explores: Security protocol prior to 9/11 Precursors to 9/11 The
rising threat of Al Qaeda Tactical and congressional response to
9/11, including new legislation The broader context of risk
assessment Intelligence gathering Airport security, including
passenger, baggage, and employee screening Airline in-flight
security measures Airport perimeter security The threat of
shoulder-fired missiles Security for GA (general aviation)
operations and airports Beginning with a historical backdrop
describing the dawn of the age of global terrorism in the 1960s and
continuing up until the present time, the book demonstrates the
broad social and political context underlying recent changes in the
aviation security system as a direct result of the 9/11 attacks.
Coverage examines ongoing threats and vulnerabilities to the
aviation infrastructure, including an exploration of how past
terrorist incidents have come to shape U.S. policy and strategy.
Frequently characterized as either mercenaries in modern guise or
the market's response to a security vacuum, private military
companies are commercial firms offering military services ranging
from combat and military training and advice to logistical support,
and which play an increasingly important role in armed conflicts,
UN peace operations, and providing security in unstable states.
Executive Outcomes turned around an orphaned conflict in Sierra
Leone in the mid-1990s; Military Professional Resources
Incorporated (MPRI) was instrumental in shifting the balance of
power in the Balkans, enabling the Croatian military to defeat Serb
forces and clear the way for the Dayton negotiations; in Iraq,
estimates of the number of private contractors on the ground are in
the tens of thousands. As they assume more responsibilities in
conflict and post-conflict settings, their growing significance
raises fundamental questions about their nature, their role in
different regions and contexts, and their regulation. This volume
examines these issues with a focus on governance, in particular the
interaction between regulation and market forces. It analyzes the
current legal framework and the needs and possibilities for
regulation in the years ahead. The book as a whole is organized
around four sets of questions, which are reflected in the four
parts of the book. First, why and how is regulation of PMCs now a
challenging issue? Secondly, how have problems leading to a call
for regulation manifested in different regions and contexts? Third,
what regulatory norms and institutions currently exist and how
effective are they? And, fourth, what role has the market to play
in regulation?
This book is the first attempt to understand Britain's night-time economy, the violence that pervades it, and the bouncers whose job it is to prevent it. Walk down any high street after dark and the shadows of bouncers will loom large, for they are the most visible form of control available in the youth-orientated zones of our cities after dark. Britain's rapidly expanding night-life is one of the country's most vibrant economic spheres, but it has created huge problems of violence and disorder. Using ethnography, participant observation, and extensive interviews with all the main players, this controversial book charts the emergence of the bouncer as one of the most graphic symbols in the iconography of post industrial Britain.
One of the most serious crises since the end of the Cold War began
with Russia's seizure and annexation of Crimea in March 2014 and
subsequent 'secret' war in Eastern Ukraine. As more territory was
taken from Eastern Ukraine, Western countries countered with
economic sanctions directed against Russia. While the conflict did
not escalate to the levels originally feared, over time, it became
apparent that President Putin had failed to affect the regime
change intended in Ukraine, and Russia's economy had been damaged.
In Ukraine and the Art of Strategy, Sir Lawrence Freedman provides
an account of the origins and course of the Russia-Ukraine conflict
through the lens of the theory and practice of strategy. That is,
he explores Putin's near, medium, and long-term strategies when he
decided to initiate the conflict. How successful has he been? In
contrast to many who see Putin as a master operator who has
resuscitated a supine Russia against all odds, Freedman is less
impressed with his strategic acumen in terms of the long-term
fallout. By exploring concepts such as coercive diplomacy, limited
war, escalation and information operations, Freedman brings the
story up to the present, where a low-level conflict between
Ukrainian and breakaway rebel forces in the east grinds on, and
illuminates the external challenges faced by the governments'
involved. Freedman's application of his unique strategic
perspective to this supremely important conflict has the potential
to reshape our understanding of it, and his analysis of the likely
outcomes will force readers to reconsider the idea that Vladimir
Putin is unmatched as a strategic mastermind.
Collect data and build trust. With the rise of data science and
machine learning, companies are awash in customer data and powerful
new ways to gain insight from that data. But in the absence of
regulation and clear guidelines from most federal or state
governments, it's difficult for companies to understand what
qualifies as reasonable use and then determine how to act in the
best interest of their customers. How do they build, not erode,
trust? Customer Data and Privacy: The Insights You Need from
Harvard Business Review brings you today's most essential thinking
on customer data and privacy to help you understand the tangled
interdependencies and complexities of this evolving issue. The
lessons in this book will help you develop strategies that allow
your company to be a good steward, collecting, using, and storing
customer data responsibly. Business is changing. Will you adapt or
be left behind? Get up to speed and deepen your understanding of
the topics that are shaping your company's future with the Insights
You Need from Harvard Business Review series. Featuring HBR's
smartest thinking on fast-moving issues—blockchain,
cybersecurity, AI, and more—each book provides the
foundational introduction and practical case studies your
organization needs to compete today and collects the best research,
interviews, and analysis to get it ready for tomorrow. You can't
afford to ignore how these issues will transform the landscape of
business and society. The Insights You Need series will help you
grasp these critical ideas—and prepare you and your
company for the future.
There are a limited number of intelligence analysis books available on the market. Intelligence Analysis Fundamentals is an introductory, accessible text for college level undergraduate and graduate level courses. While the principles outlined in the book largely follow military intelligence terminology and practice, concepts are presented to correlate with intelligence gathering and analysis performed in law enforcement, homeland security, and corporate and business security roles. Most of the existing texts on intelligence gathering and analysis focus on specific types of intelligence such as ‘target centric’ intelligence, and many of these, detail information from a position of prior knowledge. In other words, they are most valuable to the consumer who has a working-level knowledge of the subject.
The book is general enough in nature that a lay student—interested in pursuing a career in intelligence, Homeland Security, or other related areas of law enforcement—will benefit from it. No prior knowledge of intelligence analysis, functions, or operations is assumed. Chapters illustrate methods and techniques that, over the years, have consistently demonstrate results, superior to those achieved with other means. Chapters describe such analytical methods that are most widely used in the intelligence community and serve as recognized standards and benchmarks in the practice of intelligence analysis. All techniques have been selected for inclusion for their specific application to homeland security, criminal investigations, and intelligence operations.
Uses numerous hands-on activities—that can easily be modified by instructors to be more or less challenging depending on the course level—to reinforce concepts
As current and active members of the intelligence community, the authors draw on their decades of experience in intelligence to offer real-world examples to illustrate concepts
All methodologies reflect the latest trends in the intelligence communities assessment, analysis, and reporting processes with all presented being open source, non-classified information
As such, the non-sensitive information presented is appropriate—and methods applicable—for use for education and training overseas and internationally
Military-style collection and analysis methods are the primary ones presented, but all are directly correlated intelligence to current concepts, functions and practices within Homeland Security and the law communities
Covers the counterterrorism environment where joint operations and investigative efforts combine military, private sector, and law enforcement action and information sharing
The book will be a welcome addition to the body of literature available and a widely used reference for professionals and students alike.
Table of Contents
1. Defining Intelligence Analysis 2. The Intelligence Cycle 3. Thinking About Thinking 4. Perception and Deception 5. Knowing Your Audience 6. Analytical Communication 7. Defining the Problem 8. Generating the Hypothesis 9. The Collection Process 10. Analytical Tradecraft 11. Cognitive Traps for Intelligence Analysis 12. Probability Estimation 13. Creating an Analytical Plan 14. Preparing and Conducting Intelligence Briefings 15. Best Practices 16. Operations Security OPSEC
Between 1994-2014, Israel's security service was transformed,
becoming one of the most extreme examples of privatised security in
the world. This book is an investigation into this period and the
conditions that created 'Occupation Inc.': the institution of a
private military-security-industrial complex. State sponsored
violence is increasing as a result of this securitisation, but why
is it necessary, and what are its implications? In this book, Shir
Hever considers the impact of the ongoing Palestinian resistance to
Israeli occupation, the influence of U.S. military aid and the rise
of neoliberalism in Israel, to make sense of this dramatic change
in security policy. Through the lens of political economy, this
book shows how the Israeli security elites turn violence into a
commodity in order to preserve their status and wealth, providing a
fresh new perspective on the Israeli occupation.
The concept of Crime Prevention Through Environmental Design
(CPTED) has undergone dramatic changes over the last several
decades since C. Ray Jeffery coined the term in the early 1970s,
and Tim Crowe wrote the first CPTED applications book. The second
edition of 21st Century Security and CPTED includes the latest
theory, knowledge, and practice of CPTED as it relates to the
current security threats facing the modern world: theft, violent
crime, terrorism, gang activity, and school and workplace violence.
This significantly expanded edition includes the latest coverage of
proper lighting, building design-both the interior and
exterior-physical security barriers, the usage of fencing,
bollards, natural surveillance, landscaping, and landscape design.
Such design concepts and security elements can be applied to
address a wide variety of threats including crime prevention, blast
mitigation, and CBRNE threat protection. Authored by one of the
U.S.'s renowned security experts-and a premiere architect and
criminologist-the book is the most comprehensive examination of
CPTED and CPTED principles available. This edition includes a
complete update of all chapters in addition to five new chapters,
over 700 figure illustrations and photos, numerous tables and
checklists, and a 20-page color plate section. This latest edition:
Features five new chapters including green and sustainable
buildings, infrastructure protection, and premises liability
Presents step-by-step guidelines and real-world applications of
CPTED concepts, principles and processes-from risk assessment to
construction and post-occupancy evaluation Outlines national
building security codes and standards Examines architectural surety
from the perspective of risk analysis and premises liability
Demonstrates CPTED implementation in high-security environments,
such as hospitals, parks, ATMs, schools, and public and private
sector buildings A practical resource for architects, urban
planners and designers, security managers, law enforcement, CPTED
practitioners, building and property managers, homeland security
professionals, and students, 21st Century Security and CPTED,
Second Edition continues to serve as the most complete and
up-to-date reference available on next-generation CPTED practices
today.
From the rising significance of non-state actors to the increasing
influence of regional powers, the nature and conduct of
international politics has arguably changed dramatically since the
height of the Cold War. Yet much of the literature on deterrence
and compellence continues to draw (whether implicitly or
explicitly) upon assumptions and precepts formulated in-and
predicated upon-politics in a state-centric, bipolar world.
Coercion moves beyond these somewhat hidebound premises and
examines the critical issue of coercion in the 21st century, with a
particular focus on new actors, strategies and objectives in this
very old bargaining game. The chapters in this volume examine
intra-state, inter-state, and transnational coercion and deterrence
as well as both military and non-military instruments of
persuasion, thus expanding our understanding of coercion for
conflict in the 21st century. ? Scholars have analyzed the causes,
dynamics, and effects of coercion for decades, but previous works
have principally focused on a single state employing conventional
military means to pressure another state to alter its behavior. In
contrast, this volume captures fresh developments, both theoretical
and policy relevant. This chapters in this volume focus on tools
(terrorism, sanctions, drones, cyber warfare, intelligence, and
forced migration), actors (insurgents, social movements, and NGOs)
and mechanisms (trilateral coercion, diplomatic and economic
isolation, foreign-imposed regime change, coercion of nuclear
proliferators, and two-level games) that have become more prominent
in recent years, but which have yet to be extensively or
systematically addressed in either academic or policy literatures.
Collect data and build trust. With the rise of data science and
machine learning, companies are awash in customer data and powerful
new ways to gain insight from that data. But in the absence of
regulation and clear guidelines from most federal or state
governments, it's difficult for companies to understand what
qualifies as reasonable use and then determine how to act in the
best interest of their customers. How do they build, not erode,
trust? Customer Data and Privacy: The Insights You Need from
Harvard Business Review brings you today's most essential thinking
on customer data and privacy to help you understand the tangled
interdependencies and complexities of this evolving issue. The
lessons in this book will help you develop strategies that allow
your company to be a good steward, collecting, using, and storing
customer data responsibly. Business is changing. Will you adapt or
be left behind? Get up to speed and deepen your understanding of
the topics that are shaping your company's future with the Insights
You Need from Harvard Business Review series. Featuring HBR's
smartest thinking on fast-moving issues—blockchain,
cybersecurity, AI, and more—each book provides the
foundational introduction and practical case studies your
organization needs to compete today and collects the best research,
interviews, and analysis to get it ready for tomorrow. You can't
afford to ignore how these issues will transform the landscape of
business and society. The Insights You Need series will help you
grasp these critical ideas—and prepare you and your
company for the future.
It is widely acknowledged that the size of the security industry
has increased in virtually every country around the world, often
eclipsing conventional police forces in personnel numbers and
expenditures. Security providers differ from law enforcement
officers in many ways, yet the nature of their crime reduction
activities brings them into frequent contact with citizens, drawing
to the forefront issues of training, professionalism and
accountability. Unlike police officers, whose training and
licensing standards are well established, regulations for security
providers are often minimalist or entirely absent. This volume
brings together research on regulatory regimes and strategies from
around the globe, covering both the large private security sector
and the expanding area of public sector 'non-police' protective
security. It examines the nature and extent of licensing and
monitoring, and the minimum standards imposed on the industry by
governments across the world. The chapters in this book were
originally published in the International Journal of Comparative
and Applied Criminal Justice.
The rise of China will undoubtedly be one of the great spectacles
of the twenty-first century. More than a dramatic symbol of the
redistribution of global wealth, the event has marked the end of
the unipolar international system and the arrival of a new era in
world politics. How the security, stability and legitimacy built
upon foundations that were suddenly shifting, adapting to this new
reality is the subject of Will China's Rise be Peaceful? Bringing
together the work of seasoned experts and younger scholars, this
volume offers an inclusive examination of the effects of historical
patterns-whether interrupted or intact-by the rise of China. The
contributors show how strategies among the major powers are guided
by existing international rules and expectations as well as by the
realities created by an increasingly powerful China. While China
has sought to signal its non-revisionist intent its extraordinary
economic growth and active diplomacy has in a short time span
transformed global and East Asian politics. This has caused
constant readjustments as the other key actors have responded to
the changing incentives provided by Chinese policies. Will China's
Rise be Peaceful? explores these continuities and discontinuities
in five areas: theory, history, domestic politics, regional
politics, and great power politics. Equally grounded in theory and
extensive empirical research, this timely volume offers a
remarkably lucid description and interpretation of our changing
international relations. In both its approach and its conclusions,
it will serve as a model for the study of China in a new era.
Privatising Justice takes a broad historical view of the role of
the private sector in the British state, from private policing and
mercenaries in the eighteenth century to the modern rise of the
private security industry in armed conflict, policing and the penal
system. The development of the welfare state is seen as central to
the decline of what the authors call 'old privatisation'. Its
succession by neoliberalism has created the ground for the
resurgence of the private sector. The growth of private military,
policing and penal systems is located within the broader global
changes brought about by neoliberalism and the dystopian future
that it portends. The book is a powerful petition for the reversal
of the increasing privatisation of the state and the neoliberalism
that underlies it.
2020 Foreword Indie Award Winner (Gold) in the "Science &
Technology" Category "Chilling, eye-opening, and timely, Cyber
Privacy makes a strong case for the urgent need to reform the laws
and policies that protect our personal data. If your reaction to
that statement is to shrug your shoulders, think again. As April
Falcon Doss expertly explains, data tracking is a real problem that
affects every single one of us on a daily basis." -General Michael
V. Hayden, USAF, Ret., former Director of CIA and NSA and former
Principal Deputy Director of National Intelligence You're being
tracked. Amazon, Google, Facebook, governments. No matter who we
are or where we go, someone is collecting our data: to profile us,
target us, assess us; to predict our behavior and analyze our
attitudes; to influence the things we do and buy-even to impact our
vote. If this makes you uneasy, it should. We live in an era of
unprecedented data aggregation, and it's never been more difficult
to navigate the trade-offs between individual privacy, personal
convenience, national security, and corporate profits. Technology
is evolving quickly, while laws and policies are changing slowly.
You shouldn't have to be a privacy expert to understand what
happens to your data. April Falcon Doss, a privacy expert and
former NSA and Senate lawyer, has seen this imbalance in action.
She wants to empower individuals and see policy catch up. In Cyber
Privacy, Doss demystifies the digital footprints we leave in our
daily lives and reveals how our data is being used-sometimes
against us-by the private sector, the government, and even our
employers and schools. She explains the trends in data science,
technology, and the law that impact our everyday privacy. She
tackles big questions: how data aggregation undermines personal
autonomy, how to measure what privacy is worth, and how society can
benefit from big data while managing its risks and being clear-eyed
about its cost. It's high time to rethink notions of privacy and
what, if anything, limits the power of those who are constantly
watching, listening, and learning about us. This book is for
readers who want answers to three questions: Who has your data? Why
should you care? And most important, what can you do about it?
Some pundits claim cyber weaponry is the most important military
innovation in decades, a transformative new technology that
promises a paralyzing first-strike advantage difficult for
opponents to deter. Yet, what is cyber strategy? How do actors use
cyber capabilities to achieve a position of advantage against rival
states? This book examines the emerging art of cyber strategy and
its integration as part of a larger approach to coercion by states
in the international system between 2000 and 2014. To this end, the
book establishes a theoretical framework in the coercion literature
for evaluating the efficacy of cyber operations. Cyber coercion
represents the use of manipulation, denial, and punishment
strategies in the digital frontier to achieve some strategic end.
As a contemporary form of covert action and political warfare,
cyber operations rarely produce concessions and tend to achieve
only limited, signaling objectives. When cyber operations do
produce concessions between rival states, they tend to be part of a
larger integrated coercive strategy that combines network
intrusions with other traditional forms of statecraft such as
military threats, economic sanctions, and diplomacy. The books
finds that cyber operations rarely produce concessions in
isolation. They are additive instruments that complement
traditional statecraft and coercive diplomacy. The book combines an
analysis of cyber exchanges between rival states and broader event
data on political, military, and economic interactions with case
studies on the leading cyber powers: Russia, China, and the United
States. The authors investigate cyber strategies in their
integrated and isolated contexts, demonstrating that they are
useful for maximizing informational asymmetries and disruptions,
and thus are important, but limited coercive tools. This empirical
foundation allows the authors to explore how leading actors employ
cyber strategy and the implications for international relations in
the 21st century. While most military plans involving cyber
attributes remain highly classified, the authors piece together
strategies based on observations of attacks over time and through
the policy discussion in unclassified space. The result will be the
first broad evaluation of the efficacy of various strategic options
in a digital world.
How has India's foreign policy evolved in the seventy years since
Independence? For that matter, what is the country's foreign
policy? And what are the aspects that determine and shape it? If
you've had questions such as these, Rajendra Abhyankar's Indian
Diplomacy is the foreign policy primer you've been looking for.
Charting the country's interactions with other countries from the
early days of independence to now, Indian Diplomacy reviews the
changes in stance. Lucidly written and well argued, the book covers
these and other questions comprehensively, without fuss or bombast.
A much-needed book in light of the sweeping changes on the global
stage-and India's increasing role in them.
In 1960, President Kennedy warned of a dangerous future, rife with
nuclear-armed states and a widespread penchant for conflict by the
end of the century. Thankfully, his prediction failed to pass; in
fact, roughly three times as many countries have since opted to
give up their nuclear pursuit or relinquish existing weapons than
have maintained their arsenals. Nevertheless, clandestine
acquisition of nuclear materials and technology by states such as
Iraq, Syria, and Iran, and a nuclear North Korea, has reaffirmed
the need for United States' commitment to pursuing aggressive
counterproliferation strategies, particularly with rogue states.
This book looks at the experiences of countries that ventured down
the path of nuclear proliferation but were stopped short, and
examines how the international community bargains with
proliferators to encourage nuclear reversal. It asks why so many
states have relented to pressure to abandon their nuclear weapons
programs, and which counterproliferation policies have been
successful. Rupal N. Mehta argues that the international community
can persuade countries to reverse their weapons programs with
rewards and sanctions especially when the threat to use military
force remains "on the table". Specifically, nuclear reversal is
most likely when states are threatened with sanctions and offered
face-saving rewards that help them withstand domestic political
opposition. Historically, the United States has relied on a variety
of policy levers-including economic and civilian nuclear assistance
and, sometimes, security guarantees, as well as economic
sanctions-to achieve nuclear reversal. Underlying these
negotiations is the possibility of military intervention, which
incentivizes states to accept the agreement (often spearheaded by
the United States) and end their nuclear pursuit. The book draws on
interviews with current and former policymakers, as well as
in-depth case studies of India, Iran, and North Korea, to provide
policy recommendations on how best to manage nuclear proliferation
challenges from rogue states. It also outlines the proliferation
horizon, or the set of state and non-state actors that are likely
to have interest in acquiring nuclear technology for civilian,
military, or unknown purposes. The book concludes with implications
and recommendations for U.S. and global nuclear
counterproliferation policy.
'Unique and engaging characters woven into the fabric of a
fantastic plot. Jason Dean is one to watch' Marc Cameron, New York
Times bestselling author of Tom Clancy Code of Honor What is a
death sentence to a dead man?He was a man with many names. Moving
from country to country, changing his face constantly so as to
remain in the shadows, he was nothing more than a ghost. For now,
he is known simply as Korso. A covert salvage operative, he
recovers lost artefacts and items, often stolen, for rich
benefactors unable to operate through normal channels. But his
shadowy existence is shattered upon the arrival at his Bermuda home
of the man he had hoped never to see again... Tasked with
recovering a missing, one-of-a-kind shipment in only four days, his
elite skill set will be tested to its limits. Failure will result
in his identity being revealed to his former boss, the ruthless
Nikolic, who would stop at nothing to eliminate the one man who
walked away from his organisation. An exceptional, white-knuckle
thriller full of intrigue and suspense, perfect for fans of Rob
Sinclair, Mark Dawson and Adam Hamdy. Praise for Tracer 'Tracer,
Korso's first outing, is everything you could want in a thriller;
fast-pace, suspense, mystery, just the right amount of wickedness,
but above all else a protagonist who the reader will want to read
more and more of. A real page turner' Rob Sinclair, million copy
bestselling author of The Red Cobra 'Meet Korso, a mysterious and
unique character you won't be able to get enough of. In a thriller
novel I want tension, pace and ample action, and in Tracer, Jason
Dean has delivered by the bucketful' Matt Hilton, author of the Joe
Hunter thrillers 'A relentless round of fast and furious set
pieces, out-pacing Reacher for tension and with non-stop violence
and intrigue to satisfy any thriller fans' Adrian Magson, author of
The Watchman 'A thrilling, race-against-time ride ... a great start
to what I'm sure will be a hugely successful thriller series' A. A.
Chaudhuri, author of The Scribe 'The most explosive book I've read
in ages' D. L. Marshall, author of Anthrax Island 'A superb,
fast-paced thriller which literally ticks like a time-bomb' Nick
Oldham, author of the Henry Christie series
This book deals with the evolution, current status and potential of
U.S.-India strategic cooperation. From very modest beginnings, the
U.S.-India strategic partnership has developed significantly over
the last decade. In considerable part, this growth has stemmed from
overlapping concerns about the rise and assertiveness of the
People's Republic of China, as well as the instability of Pakistan.
Despite the emergence of this partnership, significant differences
remain, some of which stem from Cold War legacies, others from
divergent global strategic interests and institutional design. In
spite of these areas of discord, the overall trajectory of the
relationship appears promising. Increased cooperation and closer
policy coordination underscore a deepening of the relationship,
while fundamental differences in national approaches to strategic
challenges demand flexibility and compromise in the future. -- .
All democracies have had to contend with the challenge of
tolerating hidden spy services within otherwise relatively
transparent governments. Democracies pride themselves on privacy
and liberty, but intelligence organizations have secret budgets,
gather information surreptitiously around the world, and plan
covert action against foreign regimes. Sometimes, they have even
targeted the very citizens they were established to protect, as
with the COINTELPRO operations in the 1960s and 1970s, carried out
by the Federal Bureau of Investigation (FBI) against civil rights
and antiwar activists. In this sense, democracy and intelligence
have always been a poor match. Yet Americans live in an uncertain
and threatening world filled with nuclear warheads, chemical and
biological weapons, and terrorists intent on destruction. Without
an intelligence apparatus scanning the globe to alert the United
States to these threats, the planet would be an even more perilous
place. In Spy Watching, Loch K. Johnson explores the United States'
travails in its efforts to maintain effective accountability over
its spy services. Johnson explores the work of the famous Church
Committee, a Senate panel that investigated America's espionage
organizations in 1975 and established new protocol for supervising
the Central Intelligence Agency (CIA) and the nation's other
sixteen secret services. Johnson explores why partisanship has
crept into once-neutral intelligence operations, the effect of the
9/11 attacks on the expansion of spying, and the controversies
related to CIA rendition and torture programs. He also discusses
both the Edward Snowden case and the ongoing investigations into
the Russian hack of the 2016 US election. Above all, Spy Watching
seeks to find a sensible balance between the twin imperatives in a
democracy of liberty and security. Johnson draws on scores of
interviews with Directors of Central Intelligence and others in
America's secret agencies, making this a uniquely authoritative
account.
|
|