Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             190 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Bad Cup of Tea Chapman, Robert D.
2007
2 p. 364-370
artikel
2 A bull in a china shop: Netanyahu and Israel's intelligence community Bar-Joseph, Uri
1998
2 p. 154-174
artikel
3 A critical evaluation of U.S. national intelligence capabilities Steele, Robert David
1993
2 p. 173-193
artikel
4 A diamond is forever: Mandela Triumphs, Buthelezi and de Klerk Survive, and ANC on the U.S. payroll Cummings, Richard
1995
2 p. 155-177
artikel
5 A European Union Intelligence Service for Confronting Terrorism Nomikos, John M.
2005
2 p. 191-203
artikel
6 A Look at Intelligence Analysis Lefebvre, Stephane
2004
2 p. 231-264
artikel
7 Ambivalent bedfellows: German-American intelligence relations, 1969-1991 Johnson, Loch K.
1997
2 p. 165-179
artikel
8 Analyzing Israel's Intelligence Failures Kahana, Ephraim
2005
2 p. 262-279
artikel
9 Andropov's Counterintelligence State Pringle, Robert W.
2000
2 p. 193-203
artikel
10 A Retrospective on John Masterman's The Double-Cross System Campbell, John P.
2005
2 p. 320-353
artikel
11 A Review of: ““Alexander Pell”: Russian Terrorist” Unsinger, Peter Charles
2005
2 p. 379-381
artikel
12 A Review of: “Castro's Fifth Column” Goldman, Jan
2008
2 p. 413-418
artikel
13 A Review of: “David E. Murphy: What Stalin Knew: The Enigma of Barbarossa” Peake, Hayden B.
2006
2 p. 376-381
artikel
14 A Review of: “Don Bohning: The Castro Obsession: U.S. Covert Operations Against Cuba 1959-1965” Chapman, Robert D.
2006
2 p. 368-376
artikel
15 A Review of: “Keegan's Disputable Thesis” West, Nigel
2005
2 p. 360-363
artikel
16 A Review of: “Keegan's Disputable Thesis” West, Nigel
2005
2 p. 360-363
artikel
17 A Review of: “Krzysztof Persak and Lukasz Kaminski, editors: A Handbook of the Communist Security Apparatus in East Central Europe, 1944-1989” Holland, Max
2006
2 p. 365-367
artikel
18 A Review of: “Missing the Mark on Intelligence Reform” Wirtz, James J.
2008
2 p. 409-412
artikel
19 A Review of: “Patriot or Traitor?” Chapman, Robert D.
2005
2 p. 364-374
artikel
20 A Review of: “Richard W. Cutler: CounterSpy: Memoirs of a Counterintelligence Officer in World War II and the Cold War” West, Nigel
2006
2 p. 381-383
artikel
21 A Review of: “Spilling Blood Around the World” Gendron, Angela
2005
2 p. 374-378
artikel
22 A Review of: “The Activity's Active Intelligence” Skelly, Joseph Morrison
2008
2 p. 418-427
artikel
23 A Review of: “The Three Foes of Intelligence” Liaropoulos, Andrew
2008
2 p. 405-408
artikel
24 A Review of: “To Tell the Truth” Chapman, Robert D.
2008
2 p. 401-405
artikel
25 A Review of: “Wrongly Painting a Grim Picture” Hulnick, Arthur S.
2008
2 p. 395-400
artikel
26 Art-Intelligence Programs: The Relevance of the Clandestine Art World to Foreign Intelligence Nemeth, Erik
2008
2 p. 355-374
artikel
27 Assessing current intelligence studies Thomas, Stafford T.
1988
2 p. 217-244
artikel
28 A Tarnished Approach to Scholarship Peake, Hayden B.
2007
2 p. 374-375
artikel
29 Australia's Intelligence and Passenger Assessment Programs Koc-Menard, Sergio
2006
2 p. 218-236
artikel
30 Bedell Smith's imprint on the CIA Campbell, Kenneth J.
1986
2 p. 45-62
artikel
31 Between warning and response: The case of the Yom Kippur War Ben-Zvi, Abraham
1990
2 p. 227-242
artikel
32 BOOK REVIEWS 2000
2 p. 215-264
artikel
33 BOOK REVIEWS Berkowitz, Bruce D.
2003
2 p. 324-348
artikel
34 BOOK REVIEWS 1999
2 p. 227-263
artikel
35 BOOK REVIEWS 2002
2 p. 275-317
artikel
36 BOOK REVIEWS 2004
2 p. 364-384
artikel
37 Brief reviews 1993
2 p. 255
artikel
38 British Intelligence and the Cyprus Insurgency, 1955-1959 Dimitrakis, Panagiotis
2008
2 p. 375-394
artikel
39 British intelligence: The rainbow enigma Dedijer, Stevan
1986
2 p. 73-90
artikel
40 Canadian intelligence policy: The role and future of CSIS Robertson, Kenneth G.
1989
2 p. 225-248
artikel
41 Churchill's Personal Spies Hyde, Earl M.
2005
2 p. 305-319
artikel
42 CIA Publications: Serving the President with Daily Intelligence Smith, Michael Douglas
1999
2 p. 201-206
artikel
43 CIA's men disingenuous Audrey, I.
1997
2 p. 206-217
artikel
44 Citizens as Intelligence Volunteers: The Impact of Value Structures Donovan, Leslie A.
2005
2 p. 239-245
artikel
45 COMMENTARY West, Nigel
2004
2 p. 358-363
artikel
46 Congressional oversight of covert actions Cohen, William S.
1988
2 p. 155-162
artikel
47 Controlling U.S. hired hands Valcourt, Richard R.
1988
2 p. 163-178
artikel
48 Countering China's Threat to the Western Hemisphere Mrozinski, Lawrence G.
2002
2 p. 195-210
artikel
49 Counterintelligence for the 1990s Kalaris, George
1988
2 p. 179-187
artikel
50 Covert Action: A Vital Option in U.S. National Security Policy Gallo, Andre Le
2005
2 p. 354-359
artikel
51 Covert activities and intelligence operations: Congressional and executive roles redefined Strong, J. Thompson
1986
2 p. 63-72
artikel
52 Crafting Intelligence in the Aftermath of Disaster Steele, Robert David
2002
2 p. 161-178
artikel
53 Dark Waters: Britain and Italy's Invasion of Albania, 7 April 1939 Miller, Dawn M.
2003
2 p. 290-323
artikel
54 Defection and redefection Polgar, Tom
1986
2 p. 29-42
artikel
55 “Defense in depth” for information systems survival Schwartau, Winn
1995
2 p. 229-234
artikel
56 Deficiencies in military counterintelligence: A view from the field Pine, Shawn M.
1995
2 p. 221-227
artikel
57 Determining U.S. intelligence policy Hulnick, Arthur S.
1989
2 p. 211-224
artikel
58 Dick Kovar's Courage Schwab, Stephen I.
2008
2 p. 428
artikel
59 Diplomatic solutions: German foreign office cry ptanalysis, 1919-1945 Alvarez, David
1996
2 p. 169-185
artikel
60 Editorial board 1990
2 p. 1
artikel
61 Editorial board 1988
2 p. 1
artikel
62 Editorial board 1995
2 p. 1
artikel
63 Editorial board 1993
2 p. 1
artikel
64 Editorial board 1994
2 p. 1
artikel
65 Editorial board 1998
2 p. 1
artikel
66 Editorial board 1997
2 p. 1
artikel
67 Editorial board 1986
2 p. 1
artikel
68 Editorial board 1991
2 p. 1
artikel
69 Errata: Kramer and Heuer Article 2007
2 p. 376
artikel
70 Erratum 1989
2 p. 297
artikel
71 Erratum 1988
2 p. 303
artikel
72 ERRATUM 1999
2 p. 266
artikel
73 Espionage and sabotage in the computer world Sakkas, Peter E.
1991
2 p. 155-202
artikel
74 Evidence, intelligence and the soviet threat Donovan, G. Murphy
1986
2 p. 1-28
artikel
75 Foreign Intelligence Liaison: Devils, Deals, and Details Sims, Jennifer E.
2006
2 p. 195-217
artikel
76 From Monarch Eagle to Modern Age: The consolidation of U.S. defense HUMINT Richelson, Jeffrey T.
1997
2 p. 131-164
artikel
77 From the editor Brown, F. Reese
1990
2 p. 1
artikel
78 From the editor... Brown, F. Reese
1989
2 p. 153-155
artikel
79 German and Chilean agents in Peru: Entwined by a yen for espionage Bisher, Jamie
1993
2 p. 205-212
artikel
80 Global Media Influence on the Operational Codes of Israel's Intelligence Services Katz, Yaron
2006
2 p. 316-334
artikel
81 “Goodbye, Mr. President.” “enjoy your retirement, director.” Phillips, David Atlee
1986
2 p. 127-132
artikel
82 Hidden in Plain Sight: Searching for the CIA's "New Missions" Thomas, Stafford T.
2000
2 p. 144-159
artikel
83 Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism Rudner, Martin
2004
2 p. 193-230
artikel
84 Impact and implications of the Iran-contra affair on congressional oversight of covert action Kaiser, Frederick M.
1994
2 p. 205-234
artikel
85 Improving All-Source Intelligence Analysis: Elevate Knowledge in the Equation Miller, Bowman H.
2008
2 p. 337-354
artikel
86 Information Peacekeeping and the Future of Intelligence1 Steele, Robert David
2004
2 p. 265-285
artikel
87 IN MEMORIAM 1999
2 p. 134
artikel
88 Intelligence and economic security Wright, Jeffrey W.
1991
2 p. 203-221
artikel
89 Intelligence and nuclear terrorism: Preventing “pain into power” Beres, Louis Rene
1996
2 p. 159-167
artikel
90 Intelligence Challenges in Tracking Terrorist Internet Fund Transfer Activities Winston, Thomas
2007
2 p. 327-343
artikel
91 Intelligence Games: Comparing the Intelligence Capabilities of Law Enforcement Agencies and Drug Trafficking Enterprises Kenney, Michael C.
2003
2 p. 212-243
artikel
92 Intelligence is no laughing matter Phillips, David Atlee
1988
2 p. 267-272
artikel
93 Intelligence Methodologies Applicable to the Madrid Train Bombings, 2004 Segell, Glen M.
2005
2 p. 221-238
artikel
94 Intelligence support of military operations: A perspective Bullock, Joan G.
1990
2 p. 181-198
artikel
95 International technology transfer and economic espionage Warner, William T.
1994
2 p. 143-160
artikel
96 Iran-contra and congressional oversight of the CIA Currie, James T.
1998
2 p. 185-210
artikel
97 Israel caught unaware: Egypt's Sinai surprise of 1960 Bar-Joseph, Uri
1995
2 p. 203-219
artikel
98 Jumping to the right conclusion: The state department warning on operation “Barbarossa” Dippel, John V. H.
1993
2 p. 213-227
artikel
99 Keegan's Disputable Thesis West, Nigel
2005
2 p. 360-381
artikel
100 Leading a Behemoth Richelson, Jeffrey T.
2007
2 p. 357-364
artikel
101 Lifting the Arms Embargo on the Bosnian Muslims: Secret Diplomacy or Covert Action? Hicks, D. Bruce
2005
2 p. 246-261
artikel
102 Making intelligence smarter Greenberg, Maurice R.
1996
2 p. 135-144
artikel
103 Mexico, the way of Iran? Horton, John
1986
2 p. 91-101
artikel
104 Michael Collins and the Craft of Intelligence Murphy, John F.
2004
2 p. 333-357
artikel
105 No U.S. intrigue Collins, J. Foster
1997
2 p. 222-226
artikel
106 Nuggets from intelligence history Sayle, Edward F.
1986
2 p. 115-126
artikel
107 “One of the biggest ears in the world:” East German SIGINT operations Fischer, Ben B.
1998
2 p. 142-153
artikel
108 Operational Intelligence in Peace Enforcement and Stability Operations Cline, Lawrence E.
2002
2 p. 179-194
artikel
109 Operation PBHISTORY: The Aftermath of SUCCESS Holland, Max
2004
2 p. 300-332
artikel
110 Political risk reconsidered Theodorou, Jerry
1993
2 p. 147-171
artikel
111 Political Scrutiny and Control of Scandinavia's Security and Intelligence Services Weller, Geoffrey R.
2000
2 p. 171-192
artikel
112 Presidential powers and foreign intelligence operations Manget, Fred F.
1991
2 p. 131-153
artikel
113 Presidential styles and DCI selection Thomas, Stafford T.
1994
2 p. 175-198
artikel
114 Private Minnock's private war Gordon, Don E.
1990
2 p. 199-218
artikel
115 Reader's forum Pforzheimer, Walter
1990
2 p. 263-269
artikel
116 Reader's forum Hulnick, Arthur S.
1986
2 p. 133-135
artikel
117 READERS' FORUM 2002
2 p. 318-320
artikel
118 Reader's forum Breckenridge, Scott D.
1993
2 p. 229-239
artikel
119 READER'S FORUM 1999
2 p. 264-265
artikel
120 Reflections on Terrorism: A Sideline View Chapman, Robert D.
1999
2 p. 207-226
artikel
121 Reform and Transformation: The UK's Serious Organized Crime Agency Segell, Glen M.
2007
2 p. 217-239
artikel
122 Reinventing intelligence: Holy Grail or mission impossible? Steele, Robert D.
1994
2 p. 199-203
artikel
123 Reluctantly Serving the Reich Campbell, Kenneth J.
2007
2 p. 371-374
artikel
124 Reviews and commentary Valcourt, Richard R.
1989
2 p. 277-296
artikel
125 Reviews and commentary Valcourt, Richard R.
1990
2 p. 271-294
artikel
126 Reviews and commentary Wirtz, James J.
1993
2 p. 241-253
artikel
127 Reviews and Commentary Simmons, Robert Ruhl
1988
2 p. 273-301
artikel
128 Reviews and commentary Valcourt, Richard R.
1994
2 p. 235-249
artikel
129 Reviews and commentary Valcourt, Richard R.
1995
2 p. 235-258
artikel
130 Reviews and commentary Hood, William
1996
2 p. 233-248
artikel
131 Reviews and commentary Chapman, Robert D.
1998
2 p. 221-252
artikel
132 Reviews and commentary Henderson, Robert D'A.
1997
2 p. 227-255
artikel
133 Reviews and commentary Maertens, Thomas R.
1986
2 p. 137-179
artikel
134 Reviews and commentary Valcourt, Richard R.
1991
2 p. 223-254
artikel
135 Russia and the Intelligence Services of Central Asia Lefebvre, Stephane
2008
2 p. 251-301
artikel
136 Sex Again: The Smith-Leung Spy Case Lefebvre, Stephane
2005
2 p. 296-304
artikel
137 Sibling Rivalry: The Birth of the Post-War American Atomic Intelligence Community Goodman, Michael S.
2006
2 p. 289-301
artikel
138 South Africa's evolving intelligence and security structures O'brien, Kevin A.
1996
2 p. 187-232
artikel
139 South Korea's Intelligence Targets U.S. Technology Cochran, Edwin S.
2003
2 p. 179-201
artikel
140 Staffing the Intelligence Community: The Pros and Cons of an Intelligence Reserve Quinn, James L.
2000
2 p. 160-170
artikel
141 Strengthening the Shield: U.S. Homeland Security Intelligence Studeman, Michael W.
2007
2 p. 195-216
artikel
142 Susurluk: The connection between turkey's intelligence community and organized crime Gunter, Michael M.
1998
2 p. 119-141
artikel
143 Systematic Analysis in Counterterrorism: Messages on an Islamist Internet-Forum Renfer, Marc A.
2008
2 p. 314-336
artikel
144 The Ames case: HOW could it happen? Hulnick, Arthur S.
1995
2 p. 133-154
artikel
145 The British assault on J. Edgar Hoover: The tricycle case Troy, Thomas F.
1989
2 p. 169-209
artikel
146 The Bush administration and national security policymaking: A preliminary assessment Mulcahy, Kevin V.
1990
2 p. 167-180
artikel
147 The CDX: The Council of Ten and Intelligence in the Lion Republic Winchell, Sean P.
2006
2 p. 335-355
artikel
148 The Chekist Takeover of the Russian State Anderson, Julie
2006
2 p. 237-288
artikel
149 The Chesapeake Capes: American intelligence coup? O'Toole, G. J. A.
1997
2 p. 196-205
artikel
150 The CIA and the Security Challenges of the New Century Tenet, George J.
2000
2 p. 133-143
artikel
151 The CIA'S new openness Hedley, John Hollister
1994
2 p. 129-141
artikel
152 The CIA'S office of policy coordination: From NSC 10/2 to NSC 68 Warner, Michael
1998
2 p. 211-220
artikel
153 The Company-Intelligence Interface and National Security Trim, Peter R. J.
2000
2 p. 204-214
artikel
154 The DNI's Open Source Center: An Organizational Communication Perspective Bean, Hamilton
2007
2 p. 240-257
artikel
155 The Family, Clan, and Tribal Dynamics of Saddam's Security and Intelligence Network AL-MARASHI, Ibrahim
2003
2 p. 202-211
artikel
156 The heritage and future of the Russian intelligence community Pringle, Robert W.
1998
2 p. 175-184
artikel
157 The HUMINT Offensive from Putin's Chekist State Anderson, Julie
2007
2 p. 258-316
artikel
158 The Impact of Religion on Intelligence Stempel, John D.
2005
2 p. 280-295
artikel
159 The Imperfect Spy Hood, William
1989
2 p. 271-276
artikel
160 The Intelligence Reform Quandary Vickers, Robert D.
2006
2 p. 356-364
artikel
161 The Intelligence War in Northern Ireland Maguire, Keith
1990
2 p. 145-165
artikel
162 The Iraqi Opposition and the Failure of U.S. Intelligence Gunter, Michael M.
1999
2 p. 135-167
artikel
163 The Italian Parliamentary Reports on the Mitrokhin Archive Drake, Richard
2007
2 p. 344-356
artikel
164 The Japanese Army's Noborito Research Institute Mercado, Stephen C.
2004
2 p. 286-299
artikel
165 The Journalist's Connections: How Israel Got Russia's Biggest Pre-glasnost Secret Melman, Yossi
1990
2 p. 219-225
artikel
166 The Limits of OSINT: Diagnosing the Soviet Media, 1985-1989 Pringle, Robert W.
2003
2 p. 280-289
artikel
167 The malvinas/falkland affair: A new look Cavallini, Enrique H. J.
1988
2 p. 203-216
artikel
168 The microdot: Then and now White, William
1989
2 p. 249-269
artikel
169 The national security council and the shaping of U.S. foreign policy Crabb, Cecil V.
1989
2 p. 153-168
artikel
170 The professionals: The Kahins' CIA fever Tovar, B. Hugh
1997
2 p. 218-221
artikel
171 The quaintness of the U.S. intelligence community: Its origin, theory, and problems Troy, Thomas F.
1988
2 p. 245-266
artikel
172 The saga of Xenophon Dmitrivich Kalamatiano Mahoney, Harry Thayer
1995
2 p. 179-201
artikel
173 The Special Operations Executive (SOE) in Austria, 1940-1945 Steinacher, Gerald
2002
2 p. 211-221
artikel
174 The Strange Case of Sergius Riis Spence, Richard B.
2002
2 p. 222-242
artikel
175 The use of disinformation by democracies Bittman, Ladislav
1990
2 p. 243-261
artikel
176 The U.S. intelligence budget in the 1990s Nelsen, Harvey
1993
2 p. 195-203
artikel
177 The vagaries of intelligence sharing: The political imbalance Doron, Gideon
1993
2 p. 135-146
artikel
178 Tilting with Machiavelli: Fighting competitive espionage in the 1990s Strong, J. Thompson
1994
2 p. 161-174
artikel
179 Toward a Theory of Deception Bell, J. Bowyer
2003
2 p. 244-279
artikel
180 Tradecraft in ancient Greece Sheldon, Rose Mary
1988
2 p. 189-202
artikel
181 Tricks of the trade: Counterintelligence interrogation Johnson, William R.
1986
2 p. 103-113
artikel
182 "Truth Conquers All Chains": The U.S. Army Intelligence Support Activity, 1981-1989 Richelson, Jeffrey T.
1999
2 p. 168-200
artikel
183 Updating the Colombia Situation Boraz, Stephen C.
2006
2 p. 384
artikel
184 U.S. covert action: Does it have a future? Hulnick, Arthur S.
1996
2 p. 145-157
artikel
185 Using Economic Intelligence to Achieve Regional Security Objectives Herzog, Jeffrey Owen
2008
2 p. 302-313
artikel
186 U.S. Intelligence Estimates of the Soviet Collapse: Reality and Perception Berkowitz, Bruce D.
2008
2 p. 237-250
artikel
187 U.S. Intelligence Reform: Problems and Prospects Hulnick, Arthur S.
2006
2 p. 302-315
artikel
188 Vietnam: Lessons for Intelligence in Wartime Bird, Nancy E.
2007
2 p. 317-326
artikel
189 Virtual intelligence: Reengineering doctrine for the information age Castagna, Michael J.
1997
2 p. 180-195
artikel
190 When Kindness Fails: Assassination as a National Security Option Richelson, Jeffrey T.
2002
2 p. 243-274
artikel
                             190 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland