As experienced by the United States, competition has played out in three distinct types of threat activity: sabotage (the destruction of capabilities), espionage (the theft of specific capabilities), and defection (the carrying of knowledge out of the country). Today, the changing innovation environment has created new challenges. Significant advances are being made in start-ups as well as larger companies who no longer rely on U.S. government contracts. Not only does this place a key element of national power in the hands of the private sector, but it often leaves Washington at an...
As experienced by the United States, competition has played out in three distinct types of threat activity: sabotage (the destruction of capabilities)...
As experienced by the United States, competition has played out in three distinct types of threat activity: sabotage (the destruction of capabilities), espionage (the theft of specific capabilities), and defection (the carrying of knowledge out of the country). Today, the changing innovation environment has created new challenges. Significant advances are being made in start-ups as well as larger companies who no longer rely on U.S. government contracts. Not only does this place a key element of national power in the hands of the private sector, but it often leaves Washington at an...
As experienced by the United States, competition has played out in three distinct types of threat activity: sabotage (the destruction of capabilities)...
Much has been written about U.S. intelligence operations. However, intelligence, as it is conducted in the U.S. domestic environment, has usually been treated in a fractured and sensationalistic manner. This book dispassionately assesses the U.S. domestically oriented intelligence enterprise by first examining its individual components and then showing how those components, both federal and non-federal, work in conjunction to form an often unacknowledged structure that is more than the sum of its parts.
The U.S. Domestic Intelligence Enterprise: History, Development, and...
Much has been written about U.S. intelligence operations. However, intelligence, as it is conducted in the U.S. domestic environment, has usually b...
Between overt diplomacy and armed conflict is a more subtle game of policy influence. Nation-states and non-state actors use a variety of means to encourage preferred decisions by the U.S. government. This book moves beyond sensationalist accounts of foreign influence over U.S. policy making to address a growing issue in security and intelligence.
Between overt diplomacy and armed conflict is a more subtle game of policy influence. Nation-states and non-state actors use a variety of means to enc...
Between overt diplomacy and armed conflict is a more subtle game of policy influence. Nation-states and non-state actors use a variety of means to encourage preferred decisions by the U.S. government. This book moves beyond sensationalist accounts of foreign influence over U.S. policy making to address a growing issue in security and intelligence.
Between overt diplomacy and armed conflict is a more subtle game of policy influence. Nation-states and non-state actors use a variety of means to enc...