Handbook of Surveillance Technologies (3rd Ed) - The Real Faces of ...
Handbook of Surveillance Technologies (3rd Ed) - The Real Faces of ...
Handbook of Surveillance Technologies (3rd Ed) - The Real Faces of ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Chapter 1 - Introduction & Overview<br />
Saferstein, Richard, Criminalistics: An Introduction to Forensic Science, Englewood Cliffs: Prentice-<br />
Hall, 1997, 638 pages. Introductory text to the forensic sciences.<br />
Science at its Best | Security at its Worst: A Report on Security Problems at the U.S. Department <strong>of</strong> Energy,<br />
A Special Investigative Panel, President’s Foreign Intelligence Advisory Board (PFIAB), June 1999. A<br />
report on an inquiry requested by President Clinton on 18 March 1999 regarding “<strong>The</strong> security threat<br />
at the Department <strong>of</strong> Energy’s weapons labs and the adequacy <strong>of</strong> the measures that have been taken to<br />
address it....” including counterintelligence security threat and its evolution over the last two decades.<br />
Shane, Scott, Mixing business with spying; secret information is passed routinely to U.S., Baltimore<br />
Sun, 1 Nov. 1996.<br />
Shulsky, Abram N., Silent Warfare: Understanding the World <strong>of</strong> Intelligence, New York: Brassey’s,<br />
1993. A text that has been recommended for college courses on intelligence.<br />
Smith, Lester; Rushour, Lester, National Integrated Ballistics Information Network (NIBIN) for Law<br />
Enforcement, Denver DPD, March 2005.<br />
Smith, Walter Bedel, Proposed Survey <strong>of</strong> Communications Intelligence Activities, Report to the Secretary<br />
<strong>of</strong> State and the Secretary <strong>of</strong> Defense by a Special Committee, 1951.<br />
Swanson, Charles R.; Chamelin, Neil C.; Territo, Leonard Criminal Investigation, New York: Random<br />
House, 1981. Comprehensive text (used by some <strong>of</strong> the civil service programs) with practical introductory<br />
information on criminal investigation. Provides a framework for a variety <strong>of</strong> kinds <strong>of</strong> investigative<br />
activities. Includes illustrations and case studies.<br />
Taylor, L.B., Jr., Electronic <strong>Surveillance</strong>, New York: Franklin Watts/Impact Books, 1987, 128 pages. A<br />
former NASA employee, Taylor highlights key aspects <strong>of</strong> electronic surveillance in a style suitable for<br />
teen readers and adults looking for an illustrated introduction to the field.<br />
U.S. Government Manual, Washington, D.C. <strong>The</strong> <strong>of</strong>ficial handbook <strong>of</strong> the U.S. federal government<br />
that describes <strong>of</strong>fices and programs within the federal government, including top personnel and agency<br />
addresses and phone numbers. It is available for purchase for about $36 through the Superintendent <strong>of</strong><br />
Documents or can be found in public libraries.<br />
Wark, Wesley, Canada and the Intelligence Revolution, IIHSG 1996 annual conference presentation.<br />
Concepts relating to the Information Age and the Intelligence Revolution and Canada’s experience and<br />
role in the intelligence community.<br />
Weber, Ralph, Spymasters: Ten CIA Case Officers in <strong>The</strong>ir Own Words, Wilmington, Del.: SR Books,<br />
1999. A collection <strong>of</strong> interviews <strong>of</strong> almost a dozen CIA <strong>of</strong>ficials covering a range <strong>of</strong> topics from the<br />
early days <strong>of</strong> the NSC and the CIA to more recent events.<br />
Westerfield, H. Bradford (editor), Inside CIA’s Private World, London: Yale University Press, 1995.<br />
Yost, Graham, Spy-Tech, “A look at the fascinating tools <strong>of</strong> the espionage trade—what they are, how<br />
they work and who uses them—from the smple hand gun to the KH-11 satellite”, New York: Facts on<br />
File, 1987.<br />
Zegart, Amy B., Flawed by Design: <strong>The</strong> Evolution <strong>of</strong> the CIA, JCS, and NSC, Stanford: Stanford<br />
University Press, 1999, 342 pages. A critical analysis and discussion <strong>of</strong> the origins, development, and<br />
functions <strong>of</strong> the nation’s primary intelligence agencies.<br />
Articles<br />
Aviation Week and Space Technology <strong>Ed</strong>itors, Electronic Countermeasures: Special Report, Aviation<br />
Week and Space Technology, 21 Feb. 1972, pp. 38–107.<br />
Aviation Week and Space Technology <strong>Ed</strong>itors, Special Report on Electronic Warfare, Aviation Week and<br />
Space Technology, 27 Jan. 1975, pp. 41–144.<br />
Caravella, Frank J., Achieving Sensor-to-Shooter Synergy, Military Review, July–August 1998. This is<br />
a personal account <strong>of</strong> the use <strong>of</strong> surveillance technologies (sensors, UAVs, intelligence reports, infrared<br />
93