nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Bad Cup of Tea
|
Chapman, Robert D. |
|
2007 |
|
2 |
p. 364-370 |
artikel |
2 |
A bull in a china shop: Netanyahu and Israel's intelligence community
|
Bar-Joseph, Uri |
|
1998 |
|
2 |
p. 154-174 |
artikel |
3 |
A critical evaluation of U.S. national intelligence capabilities
|
Steele, Robert David |
|
1993 |
|
2 |
p. 173-193 |
artikel |
4 |
A diamond is forever: Mandela Triumphs, Buthelezi and de Klerk Survive, and ANC on the U.S. payroll
|
Cummings, Richard |
|
1995 |
|
2 |
p. 155-177 |
artikel |
5 |
A European Union Intelligence Service for Confronting Terrorism
|
Nomikos, John M. |
|
2005 |
|
2 |
p. 191-203 |
artikel |
6 |
A Look at Intelligence Analysis
|
Lefebvre, Stephane |
|
2004 |
|
2 |
p. 231-264 |
artikel |
7 |
Ambivalent bedfellows: German-American intelligence relations, 1969-1991
|
Johnson, Loch K. |
|
1997 |
|
2 |
p. 165-179 |
artikel |
8 |
Analyzing Israel's Intelligence Failures
|
Kahana, Ephraim |
|
2005 |
|
2 |
p. 262-279 |
artikel |
9 |
Andropov's Counterintelligence State
|
Pringle, Robert W. |
|
2000 |
|
2 |
p. 193-203 |
artikel |
10 |
A Retrospective on John Masterman's The Double-Cross System
|
Campbell, John P. |
|
2005 |
|
2 |
p. 320-353 |
artikel |
11 |
A Review of: ““Alexander Pell”: Russian Terrorist”
|
Unsinger, Peter Charles |
|
2005 |
|
2 |
p. 379-381 |
artikel |
12 |
A Review of: “Castro's Fifth Column”
|
Goldman, Jan |
|
2008 |
|
2 |
p. 413-418 |
artikel |
13 |
A Review of: “David E. Murphy: What Stalin Knew: The Enigma of Barbarossa”
|
Peake, Hayden B. |
|
2006 |
|
2 |
p. 376-381 |
artikel |
14 |
A Review of: “Don Bohning: The Castro Obsession: U.S. Covert Operations Against Cuba 1959-1965”
|
Chapman, Robert D. |
|
2006 |
|
2 |
p. 368-376 |
artikel |
15 |
A Review of: “Keegan's Disputable Thesis”
|
West, Nigel |
|
2005 |
|
2 |
p. 360-363 |
artikel |
16 |
A Review of: “Keegan's Disputable Thesis”
|
West, Nigel |
|
2005 |
|
2 |
p. 360-363 |
artikel |
17 |
A Review of: “Krzysztof Persak and Lukasz Kaminski, editors: A Handbook of the Communist Security Apparatus in East Central Europe, 1944-1989”
|
Holland, Max |
|
2006 |
|
2 |
p. 365-367 |
artikel |
18 |
A Review of: “Missing the Mark on Intelligence Reform”
|
Wirtz, James J. |
|
2008 |
|
2 |
p. 409-412 |
artikel |
19 |
A Review of: “Patriot or Traitor?”
|
Chapman, Robert D. |
|
2005 |
|
2 |
p. 364-374 |
artikel |
20 |
A Review of: “Richard W. Cutler: CounterSpy: Memoirs of a Counterintelligence Officer in World War II and the Cold War”
|
West, Nigel |
|
2006 |
|
2 |
p. 381-383 |
artikel |
21 |
A Review of: “Spilling Blood Around the World”
|
Gendron, Angela |
|
2005 |
|
2 |
p. 374-378 |
artikel |
22 |
A Review of: “The Activity's Active Intelligence”
|
Skelly, Joseph Morrison |
|
2008 |
|
2 |
p. 418-427 |
artikel |
23 |
A Review of: “The Three Foes of Intelligence”
|
Liaropoulos, Andrew |
|
2008 |
|
2 |
p. 405-408 |
artikel |
24 |
A Review of: “To Tell the Truth”
|
Chapman, Robert D. |
|
2008 |
|
2 |
p. 401-405 |
artikel |
25 |
A Review of: “Wrongly Painting a Grim Picture”
|
Hulnick, Arthur S. |
|
2008 |
|
2 |
p. 395-400 |
artikel |
26 |
Art-Intelligence Programs: The Relevance of the Clandestine Art World to Foreign Intelligence
|
Nemeth, Erik |
|
2008 |
|
2 |
p. 355-374 |
artikel |
27 |
Assessing current intelligence studies
|
Thomas, Stafford T. |
|
1988 |
|
2 |
p. 217-244 |
artikel |
28 |
A Tarnished Approach to Scholarship
|
Peake, Hayden B. |
|
2007 |
|
2 |
p. 374-375 |
artikel |
29 |
Australia's Intelligence and Passenger Assessment Programs
|
Koc-Menard, Sergio |
|
2006 |
|
2 |
p. 218-236 |
artikel |
30 |
Bedell Smith's imprint on the CIA
|
Campbell, Kenneth J. |
|
1986 |
|
2 |
p. 45-62 |
artikel |
31 |
Between warning and response: The case of the Yom Kippur War
|
Ben-Zvi, Abraham |
|
1990 |
|
2 |
p. 227-242 |
artikel |
32 |
BOOK REVIEWS
|
|
|
2000 |
|
2 |
p. 215-264 |
artikel |
33 |
BOOK REVIEWS
|
Berkowitz, Bruce D. |
|
2003 |
|
2 |
p. 324-348 |
artikel |
34 |
BOOK REVIEWS
|
|
|
1999 |
|
2 |
p. 227-263 |
artikel |
35 |
BOOK REVIEWS
|
|
|
2002 |
|
2 |
p. 275-317 |
artikel |
36 |
BOOK REVIEWS
|
|
|
2004 |
|
2 |
p. 364-384 |
artikel |
37 |
Brief reviews
|
|
|
1993 |
|
2 |
p. 255 |
artikel |
38 |
British Intelligence and the Cyprus Insurgency, 1955-1959
|
Dimitrakis, Panagiotis |
|
2008 |
|
2 |
p. 375-394 |
artikel |
39 |
British intelligence: The rainbow enigma
|
Dedijer, Stevan |
|
1986 |
|
2 |
p. 73-90 |
artikel |
40 |
Canadian intelligence policy: The role and future of CSIS
|
Robertson, Kenneth G. |
|
1989 |
|
2 |
p. 225-248 |
artikel |
41 |
Churchill's Personal Spies
|
Hyde, Earl M. |
|
2005 |
|
2 |
p. 305-319 |
artikel |
42 |
CIA Publications: Serving the President with Daily Intelligence
|
Smith, Michael Douglas |
|
1999 |
|
2 |
p. 201-206 |
artikel |
43 |
CIA's men disingenuous
|
Audrey, I. |
|
1997 |
|
2 |
p. 206-217 |
artikel |
44 |
Citizens as Intelligence Volunteers: The Impact of Value Structures
|
Donovan, Leslie A. |
|
2005 |
|
2 |
p. 239-245 |
artikel |
45 |
COMMENTARY
|
West, Nigel |
|
2004 |
|
2 |
p. 358-363 |
artikel |
46 |
Congressional oversight of covert actions
|
Cohen, William S. |
|
1988 |
|
2 |
p. 155-162 |
artikel |
47 |
Controlling U.S. hired hands
|
Valcourt, Richard R. |
|
1988 |
|
2 |
p. 163-178 |
artikel |
48 |
Countering China's Threat to the Western Hemisphere
|
Mrozinski, Lawrence G. |
|
2002 |
|
2 |
p. 195-210 |
artikel |
49 |
Counterintelligence for the 1990s
|
Kalaris, George |
|
1988 |
|
2 |
p. 179-187 |
artikel |
50 |
Covert Action: A Vital Option in U.S. National Security Policy
|
Gallo, Andre Le |
|
2005 |
|
2 |
p. 354-359 |
artikel |
51 |
Covert activities and intelligence operations: Congressional and executive roles redefined
|
Strong, J. Thompson |
|
1986 |
|
2 |
p. 63-72 |
artikel |
52 |
Crafting Intelligence in the Aftermath of Disaster
|
Steele, Robert David |
|
2002 |
|
2 |
p. 161-178 |
artikel |
53 |
Dark Waters: Britain and Italy's Invasion of Albania, 7 April 1939
|
Miller, Dawn M. |
|
2003 |
|
2 |
p. 290-323 |
artikel |
54 |
Defection and redefection
|
Polgar, Tom |
|
1986 |
|
2 |
p. 29-42 |
artikel |
55 |
“Defense in depth” for information systems survival
|
Schwartau, Winn |
|
1995 |
|
2 |
p. 229-234 |
artikel |
56 |
Deficiencies in military counterintelligence: A view from the field
|
Pine, Shawn M. |
|
1995 |
|
2 |
p. 221-227 |
artikel |
57 |
Determining U.S. intelligence policy
|
Hulnick, Arthur S. |
|
1989 |
|
2 |
p. 211-224 |
artikel |
58 |
Dick Kovar's Courage
|
Schwab, Stephen I. |
|
2008 |
|
2 |
p. 428 |
artikel |
59 |
Diplomatic solutions: German foreign office cry ptanalysis, 1919-1945
|
Alvarez, David |
|
1996 |
|
2 |
p. 169-185 |
artikel |
60 |
Editorial board
|
|
|
1990 |
|
2 |
p. 1 |
artikel |
61 |
Editorial board
|
|
|
1988 |
|
2 |
p. 1 |
artikel |
62 |
Editorial board
|
|
|
1995 |
|
2 |
p. 1 |
artikel |
63 |
Editorial board
|
|
|
1993 |
|
2 |
p. 1 |
artikel |
64 |
Editorial board
|
|
|
1994 |
|
2 |
p. 1 |
artikel |
65 |
Editorial board
|
|
|
1998 |
|
2 |
p. 1 |
artikel |
66 |
Editorial board
|
|
|
1997 |
|
2 |
p. 1 |
artikel |
67 |
Editorial board
|
|
|
1986 |
|
2 |
p. 1 |
artikel |
68 |
Editorial board
|
|
|
1991 |
|
2 |
p. 1 |
artikel |
69 |
Errata: Kramer and Heuer Article
|
|
|
2007 |
|
2 |
p. 376 |
artikel |
70 |
Erratum
|
|
|
1989 |
|
2 |
p. 297 |
artikel |
71 |
Erratum
|
|
|
1988 |
|
2 |
p. 303 |
artikel |
72 |
ERRATUM
|
|
|
1999 |
|
2 |
p. 266 |
artikel |
73 |
Espionage and sabotage in the computer world
|
Sakkas, Peter E. |
|
1991 |
|
2 |
p. 155-202 |
artikel |
74 |
Evidence, intelligence and the soviet threat
|
Donovan, G. Murphy |
|
1986 |
|
2 |
p. 1-28 |
artikel |
75 |
Foreign Intelligence Liaison: Devils, Deals, and Details
|
Sims, Jennifer E. |
|
2006 |
|
2 |
p. 195-217 |
artikel |
76 |
From Monarch Eagle to Modern Age: The consolidation of U.S. defense HUMINT
|
Richelson, Jeffrey T. |
|
1997 |
|
2 |
p. 131-164 |
artikel |
77 |
From the editor
|
Brown, F. Reese |
|
1990 |
|
2 |
p. 1 |
artikel |
78 |
From the editor...
|
Brown, F. Reese |
|
1989 |
|
2 |
p. 153-155 |
artikel |
79 |
German and Chilean agents in Peru: Entwined by a yen for espionage
|
Bisher, Jamie |
|
1993 |
|
2 |
p. 205-212 |
artikel |
80 |
Global Media Influence on the Operational Codes of Israel's Intelligence Services
|
Katz, Yaron |
|
2006 |
|
2 |
p. 316-334 |
artikel |
81 |
“Goodbye, Mr. President.” “enjoy your retirement, director.”
|
Phillips, David Atlee |
|
1986 |
|
2 |
p. 127-132 |
artikel |
82 |
Hidden in Plain Sight: Searching for the CIA's "New Missions"
|
Thomas, Stafford T. |
|
2000 |
|
2 |
p. 144-159 |
artikel |
83 |
Hunters and Gatherers: The Intelligence Coalition Against Islamic Terrorism
|
Rudner, Martin |
|
2004 |
|
2 |
p. 193-230 |
artikel |
84 |
Impact and implications of the Iran-contra affair on congressional oversight of covert action
|
Kaiser, Frederick M. |
|
1994 |
|
2 |
p. 205-234 |
artikel |
85 |
Improving All-Source Intelligence Analysis: Elevate Knowledge in the Equation
|
Miller, Bowman H. |
|
2008 |
|
2 |
p. 337-354 |
artikel |
86 |
Information Peacekeeping and the Future of Intelligence1
|
Steele, Robert David |
|
2004 |
|
2 |
p. 265-285 |
artikel |
87 |
IN MEMORIAM
|
|
|
1999 |
|
2 |
p. 134 |
artikel |
88 |
Intelligence and economic security
|
Wright, Jeffrey W. |
|
1991 |
|
2 |
p. 203-221 |
artikel |
89 |
Intelligence and nuclear terrorism: Preventing “pain into power”
|
Beres, Louis Rene |
|
1996 |
|
2 |
p. 159-167 |
artikel |
90 |
Intelligence Challenges in Tracking Terrorist Internet Fund Transfer Activities
|
Winston, Thomas |
|
2007 |
|
2 |
p. 327-343 |
artikel |
91 |
Intelligence Games: Comparing the Intelligence Capabilities of Law Enforcement Agencies and Drug Trafficking Enterprises
|
Kenney, Michael C. |
|
2003 |
|
2 |
p. 212-243 |
artikel |
92 |
Intelligence is no laughing matter
|
Phillips, David Atlee |
|
1988 |
|
2 |
p. 267-272 |
artikel |
93 |
Intelligence Methodologies Applicable to the Madrid Train Bombings, 2004
|
Segell, Glen M. |
|
2005 |
|
2 |
p. 221-238 |
artikel |
94 |
Intelligence support of military operations: A perspective
|
Bullock, Joan G. |
|
1990 |
|
2 |
p. 181-198 |
artikel |
95 |
International technology transfer and economic espionage
|
Warner, William T. |
|
1994 |
|
2 |
p. 143-160 |
artikel |
96 |
Iran-contra and congressional oversight of the CIA
|
Currie, James T. |
|
1998 |
|
2 |
p. 185-210 |
artikel |
97 |
Israel caught unaware: Egypt's Sinai surprise of 1960
|
Bar-Joseph, Uri |
|
1995 |
|
2 |
p. 203-219 |
artikel |
98 |
Jumping to the right conclusion: The state department warning on operation “Barbarossa”
|
Dippel, John V. H. |
|
1993 |
|
2 |
p. 213-227 |
artikel |
99 |
Keegan's Disputable Thesis
|
West, Nigel |
|
2005 |
|
2 |
p. 360-381 |
artikel |
100 |
Leading a Behemoth
|
Richelson, Jeffrey T. |
|
2007 |
|
2 |
p. 357-364 |
artikel |
101 |
Lifting the Arms Embargo on the Bosnian Muslims: Secret Diplomacy or Covert Action?
|
Hicks, D. Bruce |
|
2005 |
|
2 |
p. 246-261 |
artikel |
102 |
Making intelligence smarter
|
Greenberg, Maurice R. |
|
1996 |
|
2 |
p. 135-144 |
artikel |
103 |
Mexico, the way of Iran?
|
Horton, John |
|
1986 |
|
2 |
p. 91-101 |
artikel |
104 |
Michael Collins and the Craft of Intelligence
|
Murphy, John F. |
|
2004 |
|
2 |
p. 333-357 |
artikel |
105 |
No U.S. intrigue
|
Collins, J. Foster |
|
1997 |
|
2 |
p. 222-226 |
artikel |
106 |
Nuggets from intelligence history
|
Sayle, Edward F. |
|
1986 |
|
2 |
p. 115-126 |
artikel |
107 |
“One of the biggest ears in the world:” East German SIGINT operations
|
Fischer, Ben B. |
|
1998 |
|
2 |
p. 142-153 |
artikel |
108 |
Operational Intelligence in Peace Enforcement and Stability Operations
|
Cline, Lawrence E. |
|
2002 |
|
2 |
p. 179-194 |
artikel |
109 |
Operation PBHISTORY: The Aftermath of SUCCESS
|
Holland, Max |
|
2004 |
|
2 |
p. 300-332 |
artikel |
110 |
Political risk reconsidered
|
Theodorou, Jerry |
|
1993 |
|
2 |
p. 147-171 |
artikel |
111 |
Political Scrutiny and Control of Scandinavia's Security and Intelligence Services
|
Weller, Geoffrey R. |
|
2000 |
|
2 |
p. 171-192 |
artikel |
112 |
Presidential powers and foreign intelligence operations
|
Manget, Fred F. |
|
1991 |
|
2 |
p. 131-153 |
artikel |
113 |
Presidential styles and DCI selection
|
Thomas, Stafford T. |
|
1994 |
|
2 |
p. 175-198 |
artikel |
114 |
Private Minnock's private war
|
Gordon, Don E. |
|
1990 |
|
2 |
p. 199-218 |
artikel |
115 |
Reader's forum
|
Pforzheimer, Walter |
|
1990 |
|
2 |
p. 263-269 |
artikel |
116 |
Reader's forum
|
Hulnick, Arthur S. |
|
1986 |
|
2 |
p. 133-135 |
artikel |
117 |
READERS' FORUM
|
|
|
2002 |
|
2 |
p. 318-320 |
artikel |
118 |
Reader's forum
|
Breckenridge, Scott D. |
|
1993 |
|
2 |
p. 229-239 |
artikel |
119 |
READER'S FORUM
|
|
|
1999 |
|
2 |
p. 264-265 |
artikel |
120 |
Reflections on Terrorism: A Sideline View
|
Chapman, Robert D. |
|
1999 |
|
2 |
p. 207-226 |
artikel |
121 |
Reform and Transformation: The UK's Serious Organized Crime Agency
|
Segell, Glen M. |
|
2007 |
|
2 |
p. 217-239 |
artikel |
122 |
Reinventing intelligence: Holy Grail or mission impossible?
|
Steele, Robert D. |
|
1994 |
|
2 |
p. 199-203 |
artikel |
123 |
Reluctantly Serving the Reich
|
Campbell, Kenneth J. |
|
2007 |
|
2 |
p. 371-374 |
artikel |
124 |
Reviews and commentary
|
Valcourt, Richard R. |
|
1989 |
|
2 |
p. 277-296 |
artikel |
125 |
Reviews and commentary
|
Valcourt, Richard R. |
|
1990 |
|
2 |
p. 271-294 |
artikel |
126 |
Reviews and commentary
|
Wirtz, James J. |
|
1993 |
|
2 |
p. 241-253 |
artikel |
127 |
Reviews and Commentary
|
Simmons, Robert Ruhl |
|
1988 |
|
2 |
p. 273-301 |
artikel |
128 |
Reviews and commentary
|
Valcourt, Richard R. |
|
1994 |
|
2 |
p. 235-249 |
artikel |
129 |
Reviews and commentary
|
Valcourt, Richard R. |
|
1995 |
|
2 |
p. 235-258 |
artikel |
130 |
Reviews and commentary
|
Hood, William |
|
1996 |
|
2 |
p. 233-248 |
artikel |
131 |
Reviews and commentary
|
Chapman, Robert D. |
|
1998 |
|
2 |
p. 221-252 |
artikel |
132 |
Reviews and commentary
|
Henderson, Robert D'A. |
|
1997 |
|
2 |
p. 227-255 |
artikel |
133 |
Reviews and commentary
|
Maertens, Thomas R. |
|
1986 |
|
2 |
p. 137-179 |
artikel |
134 |
Reviews and commentary
|
Valcourt, Richard R. |
|
1991 |
|
2 |
p. 223-254 |
artikel |
135 |
Russia and the Intelligence Services of Central Asia
|
Lefebvre, Stephane |
|
2008 |
|
2 |
p. 251-301 |
artikel |
136 |
Sex Again: The Smith-Leung Spy Case
|
Lefebvre, Stephane |
|
2005 |
|
2 |
p. 296-304 |
artikel |
137 |
Sibling Rivalry: The Birth of the Post-War American Atomic Intelligence Community
|
Goodman, Michael S. |
|
2006 |
|
2 |
p. 289-301 |
artikel |
138 |
South Africa's evolving intelligence and security structures
|
O'brien, Kevin A. |
|
1996 |
|
2 |
p. 187-232 |
artikel |
139 |
South Korea's Intelligence Targets U.S. Technology
|
Cochran, Edwin S. |
|
2003 |
|
2 |
p. 179-201 |
artikel |
140 |
Staffing the Intelligence Community: The Pros and Cons of an Intelligence Reserve
|
Quinn, James L. |
|
2000 |
|
2 |
p. 160-170 |
artikel |
141 |
Strengthening the Shield: U.S. Homeland Security Intelligence
|
Studeman, Michael W. |
|
2007 |
|
2 |
p. 195-216 |
artikel |
142 |
Susurluk: The connection between turkey's intelligence community and organized crime
|
Gunter, Michael M. |
|
1998 |
|
2 |
p. 119-141 |
artikel |
143 |
Systematic Analysis in Counterterrorism: Messages on an Islamist Internet-Forum
|
Renfer, Marc A. |
|
2008 |
|
2 |
p. 314-336 |
artikel |
144 |
The Ames case: HOW could it happen?
|
Hulnick, Arthur S. |
|
1995 |
|
2 |
p. 133-154 |
artikel |
145 |
The British assault on J. Edgar Hoover: The tricycle case
|
Troy, Thomas F. |
|
1989 |
|
2 |
p. 169-209 |
artikel |
146 |
The Bush administration and national security policymaking: A preliminary assessment
|
Mulcahy, Kevin V. |
|
1990 |
|
2 |
p. 167-180 |
artikel |
147 |
The CDX: The Council of Ten and Intelligence in the Lion Republic
|
Winchell, Sean P. |
|
2006 |
|
2 |
p. 335-355 |
artikel |
148 |
The Chekist Takeover of the Russian State
|
Anderson, Julie |
|
2006 |
|
2 |
p. 237-288 |
artikel |
149 |
The Chesapeake Capes: American intelligence coup?
|
O'Toole, G. J. A. |
|
1997 |
|
2 |
p. 196-205 |
artikel |
150 |
The CIA and the Security Challenges of the New Century
|
Tenet, George J. |
|
2000 |
|
2 |
p. 133-143 |
artikel |
151 |
The CIA'S new openness
|
Hedley, John Hollister |
|
1994 |
|
2 |
p. 129-141 |
artikel |
152 |
The CIA'S office of policy coordination: From NSC 10/2 to NSC 68
|
Warner, Michael |
|
1998 |
|
2 |
p. 211-220 |
artikel |
153 |
The Company-Intelligence Interface and National Security
|
Trim, Peter R. J. |
|
2000 |
|
2 |
p. 204-214 |
artikel |
154 |
The DNI's Open Source Center: An Organizational Communication Perspective
|
Bean, Hamilton |
|
2007 |
|
2 |
p. 240-257 |
artikel |
155 |
The Family, Clan, and Tribal Dynamics of Saddam's Security and Intelligence Network
|
AL-MARASHI, Ibrahim |
|
2003 |
|
2 |
p. 202-211 |
artikel |
156 |
The heritage and future of the Russian intelligence community
|
Pringle, Robert W. |
|
1998 |
|
2 |
p. 175-184 |
artikel |
157 |
The HUMINT Offensive from Putin's Chekist State
|
Anderson, Julie |
|
2007 |
|
2 |
p. 258-316 |
artikel |
158 |
The Impact of Religion on Intelligence
|
Stempel, John D. |
|
2005 |
|
2 |
p. 280-295 |
artikel |
159 |
The Imperfect Spy
|
Hood, William |
|
1989 |
|
2 |
p. 271-276 |
artikel |
160 |
The Intelligence Reform Quandary
|
Vickers, Robert D. |
|
2006 |
|
2 |
p. 356-364 |
artikel |
161 |
The Intelligence War in Northern Ireland
|
Maguire, Keith |
|
1990 |
|
2 |
p. 145-165 |
artikel |
162 |
The Iraqi Opposition and the Failure of U.S. Intelligence
|
Gunter, Michael M. |
|
1999 |
|
2 |
p. 135-167 |
artikel |
163 |
The Italian Parliamentary Reports on the Mitrokhin Archive
|
Drake, Richard |
|
2007 |
|
2 |
p. 344-356 |
artikel |
164 |
The Japanese Army's Noborito Research Institute
|
Mercado, Stephen C. |
|
2004 |
|
2 |
p. 286-299 |
artikel |
165 |
The Journalist's Connections: How Israel Got Russia's Biggest Pre-glasnost Secret
|
Melman, Yossi |
|
1990 |
|
2 |
p. 219-225 |
artikel |
166 |
The Limits of OSINT: Diagnosing the Soviet Media, 1985-1989
|
Pringle, Robert W. |
|
2003 |
|
2 |
p. 280-289 |
artikel |
167 |
The malvinas/falkland affair: A new look
|
Cavallini, Enrique H. J. |
|
1988 |
|
2 |
p. 203-216 |
artikel |
168 |
The microdot: Then and now
|
White, William |
|
1989 |
|
2 |
p. 249-269 |
artikel |
169 |
The national security council and the shaping of U.S. foreign policy
|
Crabb, Cecil V. |
|
1989 |
|
2 |
p. 153-168 |
artikel |
170 |
The professionals: The Kahins' CIA fever
|
Tovar, B. Hugh |
|
1997 |
|
2 |
p. 218-221 |
artikel |
171 |
The quaintness of the U.S. intelligence community: Its origin, theory, and problems
|
Troy, Thomas F. |
|
1988 |
|
2 |
p. 245-266 |
artikel |
172 |
The saga of Xenophon Dmitrivich Kalamatiano
|
Mahoney, Harry Thayer |
|
1995 |
|
2 |
p. 179-201 |
artikel |
173 |
The Special Operations Executive (SOE) in Austria, 1940-1945
|
Steinacher, Gerald |
|
2002 |
|
2 |
p. 211-221 |
artikel |
174 |
The Strange Case of Sergius Riis
|
Spence, Richard B. |
|
2002 |
|
2 |
p. 222-242 |
artikel |
175 |
The use of disinformation by democracies
|
Bittman, Ladislav |
|
1990 |
|
2 |
p. 243-261 |
artikel |
176 |
The U.S. intelligence budget in the 1990s
|
Nelsen, Harvey |
|
1993 |
|
2 |
p. 195-203 |
artikel |
177 |
The vagaries of intelligence sharing: The political imbalance
|
Doron, Gideon |
|
1993 |
|
2 |
p. 135-146 |
artikel |
178 |
Tilting with Machiavelli: Fighting competitive espionage in the 1990s
|
Strong, J. Thompson |
|
1994 |
|
2 |
p. 161-174 |
artikel |
179 |
Toward a Theory of Deception
|
Bell, J. Bowyer |
|
2003 |
|
2 |
p. 244-279 |
artikel |
180 |
Tradecraft in ancient Greece
|
Sheldon, Rose Mary |
|
1988 |
|
2 |
p. 189-202 |
artikel |
181 |
Tricks of the trade: Counterintelligence interrogation
|
Johnson, William R. |
|
1986 |
|
2 |
p. 103-113 |
artikel |
182 |
"Truth Conquers All Chains": The U.S. Army Intelligence Support Activity, 1981-1989
|
Richelson, Jeffrey T. |
|
1999 |
|
2 |
p. 168-200 |
artikel |
183 |
Updating the Colombia Situation
|
Boraz, Stephen C. |
|
2006 |
|
2 |
p. 384 |
artikel |
184 |
U.S. covert action: Does it have a future?
|
Hulnick, Arthur S. |
|
1996 |
|
2 |
p. 145-157 |
artikel |
185 |
Using Economic Intelligence to Achieve Regional Security Objectives
|
Herzog, Jeffrey Owen |
|
2008 |
|
2 |
p. 302-313 |
artikel |
186 |
U.S. Intelligence Estimates of the Soviet Collapse: Reality and Perception
|
Berkowitz, Bruce D. |
|
2008 |
|
2 |
p. 237-250 |
artikel |
187 |
U.S. Intelligence Reform: Problems and Prospects
|
Hulnick, Arthur S. |
|
2006 |
|
2 |
p. 302-315 |
artikel |
188 |
Vietnam: Lessons for Intelligence in Wartime
|
Bird, Nancy E. |
|
2007 |
|
2 |
p. 317-326 |
artikel |
189 |
Virtual intelligence: Reengineering doctrine for the information age
|
Castagna, Michael J. |
|
1997 |
|
2 |
p. 180-195 |
artikel |
190 |
When Kindness Fails: Assassination as a National Security Option
|
Richelson, Jeffrey T. |
|
2002 |
|
2 |
p. 243-274 |
artikel |