31.12.2013 Views

Handbook of Surveillance Technologies (3rd Ed) - The Real Faces of ...

Handbook of Surveillance Technologies (3rd Ed) - The Real Faces of ...

Handbook of Surveillance Technologies (3rd Ed) - The Real Faces of ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 1 - Introduction & Overview<br />

Saferstein, Richard, Criminalistics: An Introduction to Forensic Science, Englewood Cliffs: Prentice-<br />

Hall, 1997, 638 pages. Introductory text to the forensic sciences.<br />

Science at its Best | Security at its Worst: A Report on Security Problems at the U.S. Department <strong>of</strong> Energy,<br />

A Special Investigative Panel, President’s Foreign Intelligence Advisory Board (PFIAB), June 1999. A<br />

report on an inquiry requested by President Clinton on 18 March 1999 regarding “<strong>The</strong> security threat<br />

at the Department <strong>of</strong> Energy’s weapons labs and the adequacy <strong>of</strong> the measures that have been taken to<br />

address it....” including counterintelligence security threat and its evolution over the last two decades.<br />

Shane, Scott, Mixing business with spying; secret information is passed routinely to U.S., Baltimore<br />

Sun, 1 Nov. 1996.<br />

Shulsky, Abram N., Silent Warfare: Understanding the World <strong>of</strong> Intelligence, New York: Brassey’s,<br />

1993. A text that has been recommended for college courses on intelligence.<br />

Smith, Lester; Rushour, Lester, National Integrated Ballistics Information Network (NIBIN) for Law<br />

Enforcement, Denver DPD, March 2005.<br />

Smith, Walter Bedel, Proposed Survey <strong>of</strong> Communications Intelligence Activities, Report to the Secretary<br />

<strong>of</strong> State and the Secretary <strong>of</strong> Defense by a Special Committee, 1951.<br />

Swanson, Charles R.; Chamelin, Neil C.; Territo, Leonard Criminal Investigation, New York: Random<br />

House, 1981. Comprehensive text (used by some <strong>of</strong> the civil service programs) with practical introductory<br />

information on criminal investigation. Provides a framework for a variety <strong>of</strong> kinds <strong>of</strong> investigative<br />

activities. Includes illustrations and case studies.<br />

Taylor, L.B., Jr., Electronic <strong>Surveillance</strong>, New York: Franklin Watts/Impact Books, 1987, 128 pages. A<br />

former NASA employee, Taylor highlights key aspects <strong>of</strong> electronic surveillance in a style suitable for<br />

teen readers and adults looking for an illustrated introduction to the field.<br />

U.S. Government Manual, Washington, D.C. <strong>The</strong> <strong>of</strong>ficial handbook <strong>of</strong> the U.S. federal government<br />

that describes <strong>of</strong>fices and programs within the federal government, including top personnel and agency<br />

addresses and phone numbers. It is available for purchase for about $36 through the Superintendent <strong>of</strong><br />

Documents or can be found in public libraries.<br />

Wark, Wesley, Canada and the Intelligence Revolution, IIHSG 1996 annual conference presentation.<br />

Concepts relating to the Information Age and the Intelligence Revolution and Canada’s experience and<br />

role in the intelligence community.<br />

Weber, Ralph, Spymasters: Ten CIA Case Officers in <strong>The</strong>ir Own Words, Wilmington, Del.: SR Books,<br />

1999. A collection <strong>of</strong> interviews <strong>of</strong> almost a dozen CIA <strong>of</strong>ficials covering a range <strong>of</strong> topics from the<br />

early days <strong>of</strong> the NSC and the CIA to more recent events.<br />

Westerfield, H. Bradford (editor), Inside CIA’s Private World, London: Yale University Press, 1995.<br />

Yost, Graham, Spy-Tech, “A look at the fascinating tools <strong>of</strong> the espionage trade—what they are, how<br />

they work and who uses them—from the smple hand gun to the KH-11 satellite”, New York: Facts on<br />

File, 1987.<br />

Zegart, Amy B., Flawed by Design: <strong>The</strong> Evolution <strong>of</strong> the CIA, JCS, and NSC, Stanford: Stanford<br />

University Press, 1999, 342 pages. A critical analysis and discussion <strong>of</strong> the origins, development, and<br />

functions <strong>of</strong> the nation’s primary intelligence agencies.<br />

Articles<br />

Aviation Week and Space Technology <strong>Ed</strong>itors, Electronic Countermeasures: Special Report, Aviation<br />

Week and Space Technology, 21 Feb. 1972, pp. 38–107.<br />

Aviation Week and Space Technology <strong>Ed</strong>itors, Special Report on Electronic Warfare, Aviation Week and<br />

Space Technology, 27 Jan. 1975, pp. 41–144.<br />

Caravella, Frank J., Achieving Sensor-to-Shooter Synergy, Military Review, July–August 1998. This is<br />

a personal account <strong>of</strong> the use <strong>of</strong> surveillance technologies (sensors, UAVs, intelligence reports, infrared<br />

93

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!