20.02.2013 Views

Handbook of intelligence studies / edited by

Handbook of intelligence studies / edited by

Handbook of intelligence studies / edited by

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Figures and Tables<br />

Figures<br />

10.1 Relationship between open and classified information operations 131<br />

10.2 Information continuum and the Seven Tribes 132<br />

10.3 OSINT relevance to global security threats 134<br />

10.4 OSINT and the four levels <strong>of</strong> analysis 136<br />

10.5 OSINT as a transformative catalyst for reform 137<br />

10.6 Fundamental functions for online analysis 139<br />

10.7 World Brain operational planning group virtual private network 140<br />

10.8 Standard OSINT cell 144<br />

24.1 Best practice to ensure ownership over parliamentary <strong>intelligence</strong> oversight<br />

procedures 319<br />

24.2 Best practice aimed at creating “embedded human rights” 322<br />

24.3 Best practice to ensure the political neutrality <strong>of</strong> the services 324<br />

26.1 The dominant pattern <strong>of</strong> <strong>intelligence</strong> oversight <strong>by</strong> lawmakers, 1975–2006 344<br />

Tables<br />

6.1 A map for theorising and researching <strong>intelligence</strong> 87<br />

18.1 Foreign Intelligence Surveillance Act Court Surveillance Orders issued annually 248<br />

26.1 Type <strong>of</strong> stimulus and <strong>intelligence</strong> oversight response <strong>by</strong> US lawmakers, 1975–2006 347<br />

26.2 The frequency <strong>of</strong> low- and high-threshold <strong>intelligence</strong> alarms, 1941–2006 349<br />

viii

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!