National Insecurity: U.S. Intelligence After the Cold WarCraig Eisendrath Temple University Press, 28 nov. 2000 - 240 sidor A drastic reform of intelligence activities is long overdue. The Cold War has been over for ten years. No country threatens this nation's existence. Yet we still spend billions of dollars on covert action and espionage. In National Insecurity ten prominent experts describe, from an insider perspective, what went wrong with U.S. intelligence and what will be necessary to fix it. Drawing on their experience in government administration, research, and the foreign service, they propose a radical rethinking of the United States' intelligence needs in the post-Cold War world. In addition, they offer a coherent and unified plan for reform that can simultaneously protect U. S. security and uphold the values of our democratic system. As we now know, even during the Cold War, when intelligence was seen as a matter of life and death, our system served us badly. It provided unreliable information, which led to a grossly inflated military budget, as it wreaked havoc around the world, supporting corrupt regimes, promoting the drug trade, and repeatedly violating foreign and domestic laws. Protected by a shroud of secrecy, it paid no price for its mistakes. Instead it grew larger and more insulated every year. Taking into consideration our strategic interests abroad as well as the price of covert operations in dollars, in reliability, and in good will, every American taxpayer can be informed by and will want to read this book. National Insecurity is essential for readers interested in contemporary political issues, international relations, U.S. history, public policy issues, foreign policy, intelligence reform, and political science. |
Från bokens innehåll
Resultat 1-5 av 37
Sida 5
... questions whether this need is the same as it was during the Cold War . In Chapter 2 , " Espionage and Covert Action , " Melvin A. Goodman , former division chief and senior analyst at the Office of Soviet Affairs of the CIA , spells ...
... questions whether this need is the same as it was during the Cold War . In Chapter 2 , " Espionage and Covert Action , " Melvin A. Goodman , former division chief and senior analyst at the Office of Soviet Affairs of the CIA , spells ...
Sida 8
... question is : Should essential gathering of information and influencing of actions rely as much on espionage and covert political action in the future as they did during the Cold War ? During the Cold War , more than 60 percent of the ...
... question is : Should essential gathering of information and influencing of actions rely as much on espionage and covert political action in the future as they did during the Cold War ? During the Cold War , more than 60 percent of the ...
Sida 10
... question by Under Secretary of State Strobe Talbott in February 1998 helped quiet fears . Recent ten- sions over Kosovo , however , suggest that such fears can easily reappear , with possibly dangerous consequences . Asia In Asia ...
... question by Under Secretary of State Strobe Talbott in February 1998 helped quiet fears . Recent ten- sions over Kosovo , however , suggest that such fears can easily reappear , with possibly dangerous consequences . Asia In Asia ...
Sida 24
... questions about the methodology of clandestine collection of intel- ligence used to justify military force.3 This discussion of clandestine operations will try to answer the fol- lowing questions : What are the long - term ramifications ...
... questions about the methodology of clandestine collection of intel- ligence used to justify military force.3 This discussion of clandestine operations will try to answer the fol- lowing questions : What are the long - term ramifications ...
Sida 27
... questions that tarnish our quest for international stability . Key third- world countries and leaders today , traditionally the primary targets of covert action , are far less vulnerable to U.S. manipulation than in the past , and our ...
... questions that tarnish our quest for international stability . Key third- world countries and leaders today , traditionally the primary targets of covert action , are far less vulnerable to U.S. manipulation than in the past , and our ...
Innehåll
1 | |
8 | |
23 | |
3 Too Many Spies Too Little Intelligence | 45 |
4 CIAForeign Service Relations | 61 |
The Blowback Problem | 76 |
US National Security and the New Openness Movement | 92 |
Narcotics as Fallout From the CIAs Covert Wars | 118 |
Priorities Managerial Changes and Funding | 172 |
10 Whos Watching the Store? ExecutiveBranch and Congressional Surveillance | 190 |
Conclusions | 212 |
Selected Bibliography | 223 |
About The Center for International Policy | 227 |
About the Contributors | 231 |
Index | 233 |
The NSA the NRO and NIMA | 149 |
Andra upplagor - Visa alla
National Insecurity: U.S. Intelligence After the Cold War Craig Eisendrath Begränsad förhandsgranskning - 2000 |
National Insecurity: U.S. Intelligence After the Cold War Craig Eisendrath Ingen förhandsgranskning - 2000 |
National Insecurity: U.S. Intelligence After the Cold War Craig Eisendrath Ingen förhandsgranskning - 1999 |
Vanliga ord och fraser
activities Afghan Afghanistan Agency's alliances Ambassador American analysis assassination authority Bay of Pigs billion blowback bomb budget Central America Central Intelligence Central Intelligence Agency CIA operations CIA's clandestine collection classified Clinton cocaine Cold Cold War communist Congress congressional covert action covert operations Defense democratic Department diplomatic Director of Central documents economic effort El Salvador embassy espionage funds gence Guatemala heroin Honduras imagery intel intelligence agencies Intelligence Committee intelligence community intelligence system investigation Iran Iraq leaders ligence ment military missile mission Narcotics National Security national-security Nicaragua NRO's nuclear Office opium oversight Pakistan paramilitary political President presidential priorities problems Reagan reform Robert Dreyfuss Robert Gates role Salvador satellites secrecy secret Senate sources Soviet Union targets TECHINT terrorist threat tion U.S. foreign U.S. government U.S. intelligence U.S. policy United Washington weapons White House York