000 03890nam a22005775i 4500
001 183458
003 IT-RoAPU
005 20221214232037.0
006 m|||||o||d||||||||
007 cr || ||||||||
008 220302t20092009nyu fo d z eng d
010 _a2009019568
019 _a(OCoLC)1013937914
020 _a9780231154109
_qprint
020 _a9780231520881
_qPDF
024 7 _a10.7312/wals15410
_2doi
035 _a(DE-B1597)9780231520881
035 _a(DE-B1597)459424
035 _a(OCoLC)956785435
040 _aDE-B1597
_beng
_cDE-B1597
_erda
050 0 0 _aJF1525.I6
_bW38 2010
050 4 _aJF1525.I6
_b.W38 2010
072 7 _aPOL011010
_2bisacsh
082 0 4 _a327.12
_bW223in
_222
084 _aonline - DeGruyter
100 1 _aWalsh, James Igoe
_eautore
245 1 4 _aThe International Politics of Intelligence Sharing /
_cJames Igoe Walsh.
264 1 _aNew York, NY :
_bColumbia University Press,
_c[2009]
264 4 _c©2009
300 _a1 online resource (208 p.)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
505 0 0 _tFrontmatter --
_tContents --
_tAcknowledgments --
_t1. Understanding Intelligence Sharing: Curveball and KSM --
_t2. Transatlantic Intelligence Sharing During the Cold War --
_t3. Intelligence Sharing for Counterinsurgency: Vietnam and Colombia --
_t4. Intelligence Sharing in the European Union: Institutions Are Not Enough --
_t5. Intelligence Sharing and U.S. Counterterrorism Policy --
_t6. Findings and Implications --
_tNotes --
_tIndex
506 0 _arestricted access
_uhttp://purl.org/coar/access_right/c_16ec
_fonline access with authorization
_2star
520 _aThe cross-border sharing of intelligence is fundamental to the establishment and preservation of security and stability. The American invasion of Iraq in 2003 was based in part on flawed intelligence, and current efforts to defeat al Qaeda would not be possible without an exchange of information among Britain, Pakistan, Indonesia, and the United States. While critical to national security and political campaigns, intelligence sharing can also be a minefield of manipulation and maneuvering, especially when secrecy makes independent verification of sources impossible. In The International Politics of Intelligence Sharing, James Igoe Walsh advances novel strategies for securing more reliable intelligence. His approach puts states that seek information in control of other states' intelligence efforts. According to this hierarchical framework, states regularly draw agreements in which one power directly monitors and acts on another power's information-gathering activities-a more streamlined approach that prevents the dissemination of false "secrets." In developing this strategy, Walsh draws on recent theories of international cooperation and evaluates both historical and contemporary case studies of intelligence sharing. Readers with an interest in intelligence matters cannot ignore this urgent, timely, and evidence-based book.
530 _aIssued also in print.
538 _aMode of access: Internet via World Wide Web.
546 _aIn English.
588 0 _aDescription based on online resource; title from PDF title page (publisher's Web site, viewed 02. Mrz 2022)
650 0 _aCommunication in law enforcement -- International cooperation.
650 0 _aIntelligence service -- International cooperation.
650 0 _aIntelligence service
_xInternational cooperation.
650 7 _aPOLITICAL SCIENCE / International Relations / Diplomacy.
_2bisacsh
850 _aIT-RoAPU
856 4 0 _uhttps://doi.org/10.7312/wals15410
856 4 0 _uhttps://www.degruyter.com/isbn/9780231520881
856 4 2 _3Cover
_uhttps://www.degruyter.com/document/cover/isbn/9780231520881/original
942 _cEB
999 _c183458
_d183458