Author: Abram N. Shulsky
Publisher: Potomac Books Inc.; 3 edition (May 15, 2002)
Posted on 2008-04-12, by masoodhashemy.
- Author: Abram N. Shulsky
- Publisher: Potomac Books Inc.; 3 edition (May 15, 2002)
- Pages: 285
Shulsky, who points out that government intelligence is becoming a recognized area of academic study, here offers the first introductory textbook in the field, a codification that will be appreciated by serious students. The author assesses the three means by which raw intelligence data are gathered--from human sources, by technical means and open-source collection--and describes missions, methods of analysis and practical applications of the "product." Shulsky, a senior fellow at the National Strategy Information Center in Washington, D.C., reviews the wide variety of activities that come under the heading "covert intelligence" and defines counterintelligence. His approach is basically theoretical and refers almost exclusively to the Anglo-American experience.
Copyright 1991 Reed Business Information, Inc. --This text refers to an out of print or unavailable edition of this title.
From Library Journal
Intended as a textbook to contribute to the academic study of this specialized field, this work also aims to counter some of the more alarmist and anti-intelligence books available. In eight chapters it explains the concepts, philosophies, and procedures of intelligence-gathering analysis and management. It examines how intelligence was used in various historical situations to explain a government's actions. It shows the importance of an individual's personality at every step of the process, particularly when it comes to acting on available intelligence. This easy-to-read-and-understand book should be considered by academic and large public libraries and those collections that support courses in security studies.
- Daniel K. Blewett, Loyola Univ. Lib., Chicago
Copyright 1991 Reed Business Information, Inc. --This text refers to an out of print or unavailable edition of this title
Download Link 2
- Download links and password may be in the description section, read description carefully!
- Do a search to find mirrors if no download links or dead links.